43003851129556acea15539a1dc0d4350d54cac8 |
|
26-Feb-2018 |
Sumit Bose <sbose@redhat.com> |
ipa: remove SYSDB_USER_CERT from sub-domain users
If there are no certificates returned for a sub-domain user from the IPA
server to the client we should make sure they are not present in the
client's cache anymore and remove the whole attribute from the cached
user entry.
Related to https://pagure.io/SSSD/sssd/issue/3603
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
56f015ef6a161e01681f79e4ea0d1b642f9737b4 |
|
23-Jan-2018 |
Fabiano Fidêncio <fidencio@redhat.com> |
IPA: Remove sshPublicKey attribute when it's not set
Similary to what has been for the SSSD's server, we have to explicitly
remove the 'sshPublicKey' attribute from an override in case it's not
set, otherwise we may end up in a situation where a ssh key is removed
from IPA but it'll still be present in the SSSD's client cache, allowing
then users to ssh to a machine even having a key that has already been
removed from IPA.
Related: https://pagure.io/SSSD/sssd/issue/3602
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
a52226c651308a0a7732544b492eb4db56b84f1d |
|
01-Dec-2017 |
Sumit Bose <sbose@redhat.com> |
ipa: compare DNs instead of group names in ipa_s2n_save_objects()
If group names are used to compare the current list of group memberships
returned by the server with the one from the cache some groups might end
up in the wrong result list if group names are overridden. This
ambiguity can be resolved by using the DNs of the cached objects.
Related to https://pagure.io/SSSD/sssd/issue/3579
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
f29040342a6d69e170f4543662621f2e27221f91 |
|
01-Dec-2017 |
Sumit Bose <sbose@redhat.com> |
IPA: use cache searches in get_groups_dns()
If the group name is overridden in the default view we have to search
for the name and cannot construct it because the extdom plugin will
return the overridden name but the DN of the related group object in the
cache will contain the original name.
Related to https://pagure.io/SSSD/sssd/issue/3579
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
919b5d76057d31877e0c25ca495711ff76c713d6 |
|
01-Dec-2017 |
Sumit Bose <sbose@redhat.com> |
ipa: check for SYSDB_OVERRIDE_DN in process_members and get_group_dn_list
process_members() and get_group_dn_list() are used on an IPA client to
determine a list of users or groups which are missing in the cache and
are needed to properly add a group or user object to the cache
respectively.
If a non-default view is assigned to the client the SYSDB_OVERRIDE_DN
must be set for all user and group objects to indicate that it was
already checked if there is an id-override defined for the object or
not. There a circumstances were SYSDB_OVERRIDE_DN is not set, e.g. after
a view name change. To make sure the cache is in a consistent state with
this patch user and group entries without SYSDB_OVERRIDE_DN are
considered as missing is a non-default view is assigned to the client.
Related to https://pagure.io/SSSD/sssd/issue/3579
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
eb404bcdbbff7e080a93d816e17b8cec04f79fc4 |
|
25-May-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Return from function after marking a request as finished
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
3e3034199b44e01899ec7ba8152fef3738a0e093 |
|
25-May-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Avoid using uninitialized ret value when skipping entries from the joined domain
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
eb7095099b2dd0afb1d028dbc15d8c5a897d90f8 |
|
24-May-2017 |
Sumit Bose <sbose@redhat.com> |
ipa: filter IPA users from extdom lookups by certificate
The extdom lookup by certificate will return the names of all matching
users, both from the IPA and trusted domains. The IPA users from the
list should not be looked up via the extdom plugin because they are
already lookup up directly. Additionally the lookup might fail and cause
an error which might prevent that the remaining users from the list are
looked up.
Resolves https://pagure.io/SSSD/sssd/issue/3407
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
0c5f463e9629ac08d647c70cffb30bccdd57ae96 |
|
28-Apr-2017 |
Justin Stephenson <jstephen@redhat.com> |
IPA: Improve s2n debug message for missing ipaNTSecurityIdentifier
This patch improves the log message to be more information for
the SSSD user troubleshooting issues.
If the IDM POSIX group used for AD trust HBAC/SUDO operation is missing
the ipaNTSecurityIdentifier it can cause client s2n operations failures
resolving the group which resulted in the inability to login for the AD
user.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
ef019268d2d112ebff3577e551cd19478d73d93b |
|
24-Apr-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Improve DEBUG message if a group has no ipaNTSecurityIdentifier
There was an issue in a production deployment where the admin selected a
GID outside the IDM range for a group that contained a user from the
trusted domain. This resulted in not adding a SID for the IPA group,
which in turn meant the group couldn't be resolved on the client.
This patch just improves the DEBUG message so that it's clearer for the
admins where the issue is.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
b07bcd8b99590bd404733fa7ff1add37c55126bc |
|
03-Apr-2017 |
Pavel Březina <pbrezina@redhat.com> |
ipa_s2n_get_acct_info_send: provide correct req_input name
To avoid crash.
Resolves:
https://pagure.io/SSSD/sssd/issue/3358
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
2cf7becc05996eb6d8a3352d3d7b97c75652e590 |
|
29-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
IPA: lookup AD users by certificates on IPA clients
Get a list of users mapped to a certificate back from the IPA server,
look them up and store them together with the certificate used for the
search as mapped attribute to the cache.
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
415d93196533a6fcd90889c67396ef5af5bf791a |
|
29-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
IPA: add mapped attributes to user from trusted domains
Allow the usage of the mapped attribute for the lookup of AD users on
IPA clients as already used for the normal LDAP lookup.
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
cd83aead3c9799ac05d8f8977dbb92bbd399c6d5 |
|
23-Mar-2017 |
Justin Stephenson <jstephen@redhat.com> |
IPA: Enhance debug logging for ipa s2n operations
Add log messages to provide useful debug logging surrounding
IPA client extended operations to the IPA Server during AD trust
requests to retrieve information. Print more details about the
objects requested and received during the ipa_s2n operations.
This will improve log analysis and troubleshooting efforts during AD
trust user and group resolution failures on IPA clients, such as missing
groups.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
a04bef313508c423ed06cc54805a3b8106ab90cd |
|
23-Mar-2017 |
Justin Stephenson <jstephen@redhat.com> |
IPA: Add s2n request to string function
Add a function to convert request_types to string allowing the
ability to print request type information for ipa_s2n functions during
IPA client operations.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
0302e3e7b3b06b809bd63c7911a42ab3e0a7ebf9 |
|
26-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Parse qualified names when guessing AD user principal
Most AD users store their UPN in an attribute. If they don't, or the sssd
was configured (typically in earlier versions to work around a bug) to not
look at the principal attribute, then sssd is supposed to guess
the attribute.
That currently doesn't work in 1.14, because the username is already
qualified and then we also append the realm name to it. We need to parse
the simple username from the qualified name first.
The issue can be reproduced simply by authenticating as the Administrator
account in IPA-AD trust setups.
Resolves:
https://fedorahosted.org/sssd/ticket/3127
Reviewed-by: Sumit Bose <sbose@redhat.com> |
9a310913d696d190db14c625080678db853a33fd |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
LDAP/IPA: add local email address to aliases
Adding email-addresses from the local domain to the alias names is
strictly not needed by might help to speed up lookups in the NSS
responder.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3d29430867cf92b2d71afa95abb679711231117c |
|
15-Jul-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: rename be_acct_req to dp_id_data
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
c125e741d3111e2f9b56866ba00835ca05c6f349 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Use internal fqname format instead of parsing NSS names
Parsing the extdom plugin output is an "input" operation from the point
of the IPA provider, so we need to parse the name and conversely,
internally use only the qualified name.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
accff8ebe158251b1d25a95b3b035fe7e08fd1ee |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: expand_homedir_template manages usernames internally
expand_homedir_template() can be considered an outward-facing interface,
therefore the function and its input structure will accept the internal
name format and parse it internally into a username and domain
component.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
21513e51a4a2eb08f245333bf8f223713a3d7cb3 |
|
09-Jun-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: allow lookups by cert in sub-domains on the client
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
cf89f552f06b95bd69d8c61aaa55a330a5d9f6e6 |
|
09-Jun-2016 |
Sumit Bose <sbose@redhat.com> |
ipa: save cert as blob in the cache
The IPA extdom plugin returns the user certificate base64 encoded.
Before the IPA client can store it in the cache it must be decoded so
that it is stored as a binary as the certificate from other sources.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c371993cce13edb9185a5f0db76fbee03f0edc04 |
|
13-Apr-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: resolve PAC for trusted users on IPA clients
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
1df6751f81f7d9c225463f76b9789b0cc7a0de8b |
|
13-Apr-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: ipa_s2n_get_list_send() allow other list types
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
aa0f39c7c09a55efc8d2282ca56e0e93e220aeba |
|
13-Apr-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: rename ipa_s2n_get_fqlist* to ipa_s2n_get_list*
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
9a2f018c0f68a3ada4cea4128a861a7f85893f22 |
|
12-Jan-2016 |
Sumit Bose <sbose@redhat.com> |
ldap: remove originalMeberOf if there is no memberOf
Since originalMemerberOf is not mapped directly to an original attribute
and is handled specially it is not automatically removed if there is no
memberOf in the original object anymore. This patch put
originalMemerberOf on the list of attribute which should be removed in
that case.
Resolves https://fedorahosted.org/sssd/ticket/2917
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
acce97e8d97e81a9e660d46c4e3c00bcb423c035 |
|
06-Jan-2016 |
Sumit Bose <sbose@redhat.com> |
ipa_s2n_save_objects(): use configured user and group timeout
Resolves https://fedorahosted.org/sssd/ticket/2899
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
aedc71fe8360a51785933523f14bb5c4e7e2c38b |
|
20-Nov-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: fix override with the same name
If the user name of a AD user is overridden with the name itself in an
IPA override object SSSD adds this name twice to the alias list causing
an ldb error when trying to write the user object to the cache. As a
result the user is not available.
This patch makes sure that there are no duplicated alias names.
Resolves https://fedorahosted.org/sssd/ticket/2874
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
6fe057efb981ee4b45dcadf131c03f8501fce28d |
|
31-Jul-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Remove MPG groups if getgrgid was called before getpw()
https://fedorahosted.org/sssd/ticket/2724
This bug only affects IPA clients that are connected to IPA servers with
AD trust and ID mapping in effect.
If an IPA client calls getgrgid() for an ID that matches a user, the
user's private group would be returned and stored as a group entry.
Subsequent queries for that user would fail, because MPG domains impose
uniqueness restriction for both the ID and name space across groups and
users.
To work around that, we remove the UPG groups in MPG domains during a
group lookup.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
9ac2a33f4cdc4941fa63118dcffe8058854f33c4 |
|
02-Jul-2015 |
Michal Židek <mzidek@redhat.com> |
views: Add is_default_view helper function
Ticket:
https://fedorahosted.org/sssd/ticket/2641
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
3fe2e555edd3963d72483600e5d9616873afd00a |
|
06-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: do not add domain name unconditionally
Depending on the server-side configuration the extdom plugin can return
short or fully qualified names for IPA objects. The client must handle
the names according to its own configuration and not add the domain part
of the fully-qualified name unconditionally.
Resolves https://fedorahosted.org/sssd/ticket/2647
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
cffe3135f29c737f2598f3c1384bfba1694fb843 |
|
05-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: update initgr expire timestamp conditionally
Newer versions of the extdom plugin return the full list of
group-memberships during user lookups. As a result the lifetime of the
group-membership data is updates in those cases. But if the user is not
looked up directly but is resolved as a group member during a group
lookup SSSD does not resolve all group-membership of the user to avoid
deep recursion and eventually a complete enumeration of the user and
group base. In this case the lifetime of the group-memberships should
not be updated because it might be incomplete.
Related to https://fedorahosted.org/sssd/ticket/2633
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
e87badc0f6fb20a443cf12bde9582ecbc2aef727 |
|
05-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: do initgroups if extdom exop supports it
Newer versions of the extdom plugin return the full list of
group-memberships during a user lookup request. With these version there
is no need to reject a initgroups request for sub/trusted-domain users
anymore. This is e.g. useful for callers which call getgrouplist()
directly without calling getpwnam() before. Additionally it helps if for
some reasons the lifetime of the user entry and the lifetime of the
initgroups data is different.
Related to https://fedorahosted.org/sssd/ticket/2633
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c520f40d1a2d77cf1d413451b5682297733521ed |
|
29-Apr-2015 |
Aron Parsons <parsonsa@bit-sys.com> |
IPA: fix segfault in ipa_s2n_exop
can be triggered on demand by assigning a POSIX group
with external members sudo privileges, then dropping
the cache and doing a sudo -U <user> -l.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
625cff0b0938538e51fdd3b2d985e6082b492ea5 |
|
27-Apr-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: use sysdb_attrs_add_string_safe to add group member
The member list returned by the extdom plugin might contain some entries
more than once. Although this is an issue on the server side to avoid
ldb errors duplicates should be filtered out on the client as well.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
2ab9a4538eb2e1a255e645f7efdcfd6bb722d265 |
|
27-Apr-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: do not try to save override data for the default view
For the default view all override data is available in the cached user
or group object. Even if separate override data is available it should
not be written into the cache.
Resolves https://fedorahosted.org/sssd/ticket/2630
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
131da4d9f40e0e407d7bcae18ff16507976bc6c7 |
|
19-Mar-2015 |
Pavel Reichl <preichl@redhat.com> |
IPA: set EINVAL if dn can't be linearized
Reviewed-by: Sumit Bose <sbose@redhat.com> |
abb093b4ae10f2a5748bf9f194bf76794002eba0 |
|
19-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: make sure output variable is set
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
8be0cf3eea892e13410c13abb030322599ca1b4f |
|
17-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
IPA idviews: check if view name is set
When working with older FreeIPA releases the view name might not always
been set. This patch add checks to might sure it is only dereferenced
when set.
Resolves https://fedorahosted.org/sssd/ticket/2604
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
7ee9ac32485483beece872d6fcb3096fa77a004b |
|
13-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
ipa: make sure extdom expo data is available
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3e9712c2fdbba8f9cd25886943331e76e0b2cedd |
|
13-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
ipa: do not treat missing sub-domain users as error
Resolves: https://fedorahosted.org/sssd/ticket/2444
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
9ad346318dc2cc5d5a340d8d981ddfdcc6f632da |
|
30-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
ipa_s2n_save_objects: properly handle fully-qualified group names
Check if the given name is already fully-qualified instead of adding a
domain name unconditionally.
Related to https://fedorahosted.org/sssd/ticket/2529
and https://fedorahosted.org/sssd/ticket/2524
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b2c5e98def89a0c3d16f5cf7e07ce2020338b540 |
|
26-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Use attr's dom for users, too
The 'dom' pointer points to domain of the main object being saved. In
case of group, dom points to the domain where the group resides. But
when saving members, each members might be from a different domain, so we
need to find every member's domain based on the attributes.
Also don't use Yoda style in conditions.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
60f11e2fa1f63cd40ebace525ad823b0360fac94 |
|
26-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: process_members() add ghosts only once
Since ghost entries might not be properly removed on the IPA server
(https://fedorahosted.org/sssd/ticket/2567) chances are that during
extdom group lookups a single user is returned multiple time. This patch
removes the duplicates before trying to write the data to the cache.
Related to https://fedorahosted.org/sssd/ticket/2159
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
dd5ebcde05442422f39084acb49b28cf47002d1e |
|
23-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: properly handle mixed-case trusted domains
In the SSSD cache domain names are handled case-sensitive. As a result
fully-qualified names in RDN contain the domain part in the original
spelling. When IPA client lookup up group-memberships on the IPA server
via the extdom plugin the names returned are all lower case. To make
sure new DNs are generated correctly the domain part must adjusted.
Related to https://fedorahosted.org/sssd/ticket/2159
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ba818cc39dfe94c2b8613f4badf7912811f0f737 |
|
21-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
views: fix GID overrride for mpg domains
When adding a user sysdb internally adds a value to SYSDB_GIDNUM for
mpg domain which might cause conflicts with the one we added to users
git GID overrides. With this patch the override GID is added after the
user is created but in the same transaction
Releted to https://fedorahosted.org/sssd/ticket/2514
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
62d919aea98edd1095f6a22241903d4c045b46ed |
|
14-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: set SYSDB_INITGR_EXPIRE for RESP_USER_GROUPLIST
Since RESP_USER_GROUPLIST contains all group memberships it is
effectively an initgroups request hence SYSDB_INITGR_EXPIRE will be set.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3cd287313d93e29f9754feb46017dba2a039affd |
|
14-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: resolve missing members
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f1f22df95996390f63266ebacb624e521d934592 |
|
14-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: rename ipa_s2n_get_groups_send() to ipa_s2n_get_fqlist_send()
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
942ebb62c8df766a22271103abd518ddae02ea3a |
|
14-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: process_members() optionally return missing members list
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
e6046d23b3e90102fb3c796737ced03fb5a60fea |
|
14-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: add missing break
The current request already returned the SID, we do not need to request
it separately.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
2fc12875f7d51248799016c19c1298b85e06a286 |
|
14-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: make version check more precise
The call protected by the check does not only expect the version 1 of
the extdom plugin is used but a specific response type as well. Since
version 1 can return older response types as well we want to be on the
safe side.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
d8ceb194023a2cdc8bc183acc322e9a7fb6fe2b1 |
|
14-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: do not look up overrides on client with default view
The IPA extdom plugin returns the data with the default view already
applied hence it is on needed to look up the override data if the client
has the default view assigned.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
034dcabb40e654a95f3714d871db471ff7bf97f8 |
|
17-Dec-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: handle GID overrides for MPG domains on clients
Resolves https://fedorahosted.org/sssd/ticket/2514
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
8f9d7684a47cd4715dce22c8254ddde205db9afe |
|
17-Dec-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
IPA: properly handle groups from different domains
When groups are resolved on IPA clients as part of a user lookup not all
groups have to be from the same domain as the used. This has to be
checked to store the group object properly in the cache.
Related to https://fedorahosted.org/sssd/ticket/2529
and https://fedorahosted.org/sssd/ticket/2524
Reviewed-by: Sumit Bose <sbose@redhat.com> |
ad463501d3bdea4c24c17d792efc1c3e65c08c19 |
|
17-Dec-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: verify group memberships of trusted domain users
Depending on the state of the cache group object a freshly created or
updates user entry for a trusted domain user might already be a member
of the group or not. This cache makes sure the requested user is a
member of all groups returned from the extdom request. Special care has
to be taken to cover cross-domain group-memberships properly.
Resolves https://fedorahosted.org/sssd/ticket/2529
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
1b2a9e3f17e54bcbe5c9bee82a91ae694b7ea0eb |
|
24-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Handle IPA groups returned from extop plugin
Reviewed-by: Sumit Bose <sbose@redhat.com> |
35863245aa8b8404caedfc95e68b3aa5af14542e |
|
22-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Handle NULL members in process_members()
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
bc85b7e2b7b1569e64d8832c52cab9ad165e6fc1 |
|
22-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
ipa: improve error reporting for extdom LDAP exop
This patch fixes a typo when calling ldap_parse_result() which prevented
the server-side error message to be used and adds a hint that more
information might be available on the server side.
Fixes: https://fedorahosted.org/sssd/ticket/2456
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ed4a9bd4d0f7fb359bed66a8d63a92e7be633aae |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
views: search overrides for user and group requests
If the name or the POSIX ID of a user or a group is overridden the
search request for those objects have to check the overide objects first
before looking up the original objects.
This patch adds a new request for the IPA sub-domain users which checks
the overrides first if
- SSSD is running in ipa-server-mode and a name or a POSIX ID is
searched, since we do not override the SIDs we can skip the search in
the override tree here
- if the responder indicates it has not found the corresponding object
in the cache and the input might be an override name or ID and not the
original one of an object.
If an override object was found the SID is extracted from the anchor
attribute and the original object is search by its SID. If no override
object was found the original object is search with the original input
and finally it is checked if an override object exits for the found
object.
Relates to https://fedorahosted.org/sssd/ticket/2375
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
9c8db0a17a66c58c36966b17d004142a4aaace8d |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
views: get overrides during user and group lookups
With this patch the IPA provider will check if overrides exists for the
given view during the lookup of users and groups from trusted domains.
In ipa-server-mode the default view is automatically applied and written
to the cache. On IPA clients which use the extdom plugin for user and
group lookups the override data is saved separately and the original
object and the override data are linked with DN attributes for faster
reference.
Related to https://fedorahosted.org/sssd/ticket/2375
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
00c283ca719717ed483958571982d0e9ff95c4b1 |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: make IPA ID context available to extdom client code
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
abee3216261e3378430e472f0c992470b33976f0 |
|
14-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
add_v1_group_data: fix for empty members list
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
210e57203a1502f78a16b05010d52c9121b644e3 |
|
12-Oct-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
IPA: Fix error handling after talloc_ber_flatten
The function talloc_ber_flatten can return EFAULT, ENOMEM, EOK.
But it was tested for -1.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
28c70f003c7b330ab1d998a4eff1248d272a6ba9 |
|
30-Sep-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: add support for new extdom plugin version
Initially the extdom plugin was only used to translate SIDs of AD user
and groups to names or POSIX IDs. On IPA clients group memberships were
resolved with the help of the PAC in the Kerberos ticket which required
that the user has logged in at least once. Home directory and the login
shell were auto generated.
The new version of the extdom plugin can return the complete list of
group memberships of a user and the list of all members of a group.
Additionally the gecos field, home directory and login shell are
returned together with an optional list of key-value pairs for arbitrary
data which is written unmodified to the cache.
Fixes https://fedorahosted.org/sssd/ticket/2159
and https://fedorahosted.org/sssd/ticket/2041
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ae0a5011e2644eaa482ea1b9e1451eff05c676b9 |
|
02-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
NSS: Add option to expand homedir template format
LDAP server can contain template for home directory instead of plain string.
This patch adds new expand option "%H", which will be replaced with value
from configuration option homedir_substring (from sssd.conf)
Resolves:
https://fedorahosted.org/sssd/ticket/1853 |
5cd660aaa885bca95ac3dca660bb77e5786d5f8e |
|
02-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
NSS: Refactor expand_homedir_template
Function expand_homedir_template had lot of parameters.
After adding new expand option, all function call should be rewritten,
(usually argument NULL will be added)
This patch wraps all necessary arguments to structure. |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
c9124effceb40890bc9dd157155618067a7b8d2f |
|
19-Dec-2013 |
Sumit Bose <sbose@redhat.com> |
Use sysdb_attrs_add_lc_name_alias to add case-insensitive alias |
d115f40c7a3999e3cbe705a2ff9cf0fd493f80fb |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter - module sysdb_ops (part 2) |
5cd4414fce1e0eb4133dfc6fc828bf25c8a959f9 |
|
24-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Include header file in implementation module.
Declarations of public functions was in header files,
but header files was not included in implementation file. |
83b5a69a90dd74aaef01d48846a5504789a28317 |
|
19-Aug-2013 |
Sumit Bose <sbose@redhat.com> |
ipa_s2n_get_user_done: make sure ALIAS name is lower case
Fixes https://fedorahosted.org/sssd/ticket/1630 |
a9a619a4adb00ee60973050297b1b1c57e275016 |
|
19-Aug-2013 |
Sumit Bose <sbose@redhat.com> |
ipa_s2n_get_user_done: free group_attrs as well |
68c26d9ec785b8af0b45247705b20e82656bfd05 |
|
29-Jul-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Use GID if subdomain is not MPG
https://fedorahosted.org/sssd/ticket/2032
In non-MPG subdomains (such as those that manage their IDs manually with
POSIX attributes), we need to set the GID ourself. |
1987bff88e01c74d647dd2db4f541ac311537e1a |
|
30-May-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Add utility functions for formatting fully-qualified names
Instead of using printf-like functions directly, provide two wrappers
that would encapsulate formatting the fully-qualified names. No
functional change is present in this patch. |
e2f6326ea56217afab7623c542a237ee84eb74da |
|
03-May-2013 |
Sumit Bose <sbose@redhat.com> |
Add SID related lookups to IPA subdomains
This patch add the functionality to handle lookup by SIDs and lookups
for SIDs to the subdomain branch of the IPA ID provider. |
2962b3d1e072ff2ebbe343095812dad697d6bf1d |
|
02-May-2013 |
Sumit Bose <sbose@redhat.com> |
Use struct to hold different types of request parameters
Currently the POSIX ID or the user name are passed in different
parameters to some calls. The method will get cumbersome and error-prone
if new parameters like, e.g. the SID, are added. This patch adds a union
to hold the different kind of parameters. |
44c379a27a2d8de0ad933ebb2558b5e82b05fd56 |
|
02-May-2013 |
Sumit Bose <sbose@redhat.com> |
Remove unused attribute list |
6fc4702a3037d9bb5b27bcb58f70edf1802b7b19 |
|
10-Apr-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Allow using flatname for subdomain home dir template
https://fedorahosted.org/sssd/ticket/1609 |
233a3c6c48972b177e60d6ef4cecfacd3cf31659 |
|
19-Mar-2013 |
Simo Sorce <simo@redhat.com> |
Use common error facility instead of sdap_result
Simplifies and consolidates error reporting for ldap authentication paths.
Adds 3 new error codes:
ERR_CHPASS_DENIED - Used when password constraints deny password changes
ERR_ACCOUNT_EXPIRED - Account is expired
ERR_PASSWORD_EXPIRED - Password is expired |
9f37bb2012faa136ef7c1f9fe93689ce2be85637 |
|
13-Mar-2013 |
Ondrej Kos <okos@redhat.com> |
Fix initialization of multiple variables |
2cbb879c517f2c756a2eb3962527979bac01ddab |
|
10-Feb-2013 |
Stephen Gallagher <sgallagh@redhat.com> |
NSS: Add original homedir to home directory template options
https://fedorahosted.org/sssd/ticket/1805 |
99c0cfdc5f065ba38f1ee91701d1d27f9e4fdb96 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_store_group()
Also remove sysdb_store_domgroup() |
6ac396bebb4cd3124711d26dce54263f6f9c7c45 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_store_user()
Also remove sysdb_store_domuser() |
8d9e0547a864cee05ab36bc988300c0cfa986025 |
|
19-Nov-2012 |
Simo Sorce <simo@redhat.com> |
Refactor the way subdomain accounts are saved
The original sysdb code had a strong assumption that only users from one
domain are saved in the databse, with the subdomain feature, we have
changed reality, but have not adjusted all the code arund the sysdb calls
to not rely on the original assumption.
One of the side effects of this incongrunece is that currently group
memberships do not return fully qualified names for subdomain users as they
should.
In oreder to fix this and other potential issues surrounding the violation
of the original assumption, we need to fully qualify subdomain user names.
By savin them fully qualified we do not risk aliasing local users and have
group memberhips or other name based matching code mistake a domain user
with subdomain usr or vice versa. |
ac7a7ee3d1e138818a1ed78758f7dd3c3306a56b |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
Make sub-domains case-insensitive
Currently the only type of supported sub-domains are AD domains which
are not case-sensitive. To make it easier for Windows user we make
sub-domains case-insensitive as well which allows to write the username
in any case at the login prompt.
If support for other types of sub-domains is added it might be necessary
to set the case-sensitive flag based on the domain type. |
4cf3bc3b94ccf1e60d29c0eb765f02cb49fbac2d |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
subdomain-id: Generate homedir only for users not groups |
70eaade10feedd7845e39170d0b7eebf3a030af1 |
|
12-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
Allow extdom exop to return flat domain name as well
There are case where the extdom extended operation will return the flat
or NetBIOS name of a domain instead of the DNS domain name. If this name
is available for the current domain we accept it as well.
Related to https://fedorahosted.org/sssd/ticket/1561 |
36a12aea020a935ffa40505fa02860c3d921ad0c |
|
24-Apr-2012 |
Sumit Bose <sbose@redhat.com> |
Add s2n extended operation |