5e04cbb8b6a10a794b698184fc84f9d359350253 |
|
26-Feb-2018 |
Sumit Bose <sbose@redhat.com> |
ipa: add SYSDB_USER_MAPPED_CERT for certs in idoverrides
Recent changes to support a rule based mapping between users and
certificates were not properly added for the case where a certificate
was added to an idoverride for a user. As a result authentication with
the certificate from the idoveride was not possible. With this patch the
certificate from to idoveride is properly added to the cache.
Related to https://pagure.io/SSSD/sssd/issue/3603
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
d4a6579a99b8cdeab31f69dfa3b88c145dd9e845 |
|
29-Jan-2018 |
Thorsten Scherf <tscherf@redhat.com> |
IPA: Fixed subdomain typo
Reviewed-by: Amith Kumar <apeetham@redhat.com> |
dc49e07a0dbbbf3d69d09a7c6f236d82c86c7def |
|
08-Dec-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Include SYSDB_OBJECTCATEGORY, not OBJECTCLASS in cache search results
The function get_object_from_cache() returns an ldb_message that is
passed to apply_subdomain_homedir() which expects SYSDB_OBJECTCATEGORY
to be present in the message, otherwise it errors out.
However, get_object_from_cache() was reading only SYSDB_OBJECTCLASS.
This patch changes get_object_from_cache() to ready
SYSDB_OBJECTCATEGORY.
Resolves:
https://pagure.io/SSSD/sssd/issue/3599
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
0e238c259c066cf997aaa940d33d6bda96c15925 |
|
27-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
sysdb: do not use objectClass for users and groups
The majority of the object in the SSSD cache are users and groups. If
there are many user and groups in the cache the index objects of the
objectclass attributes 'user' and 'group' become large because the
must hold references to all objects of those object classes.
As a result the management of these index objects becomes costly because
they must be parsed and split apart quite often. Additionally they are
mostly useless because user and groups are lookup up by more specific
attributes in general.
Only when enumerating all user or groups this kind of index might be
useful.
There are two way of removing this kind of index from the user and group
objects. Either by removing objectClass from the list of indexes and add
a new attribute to all other type of object we want and index for. Or by
replacing objectClass with a different attribute for the user and group
objects. After some testing I think the latter one is the more reliable
one and implemented it in this patch.
Related to https://pagure.io/SSSD/sssd/issue/3503
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
82843754193b177275ce16f2901edac2060a3998 |
|
29-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
IPA: enable AD user lookup by certificate
Without this the lookup by certificate for AD users on an IPA client
will just error out.
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
16c9d63d96ce8dc7517ae16502e9ec72d6a58d6c |
|
10-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
PAM: allow muliple users mapped to a certificate
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
afadeb1a530ff010a2f9a7552562576b843c874b |
|
03-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: When searching for UPNs, search either the whole DB or only the given domain
The search-by-UPN functions always searched for the whole domain. In
some cases, the caller depends on the result coming from the domain
specified by the 'domain' parameter. This is the case in the cache_req
code at least. Even though it should be safe to just switch to always
searching the whole domain, in order to allow us to examine the code
carefully and test each codepath, let's introduce a boolean option to
the search functions. Currently it defaults to false in all codepaths
and as we test the individual ones, we can flip the option to true until
we finally remove the option altogether.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
ca68b1b4ba06b1cda316ae8af470647bd7015a5a |
|
16-Jan-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
DP: Remove unused attr_type from struct dp_id_data
Structure member attr_type was set to BE_ATTR_CORE on all places
and there was a single place src/providers/ldap/ldap_id.c where
we checked to other values. It is not used anymore; it's better to
remove it.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
b9941359b3181c42f415530d5ccad0f4664d85fa |
|
21-Sep-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove double semicolon at the end of line
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
858c7b713bc4cb33e3339949ca43c9fba9f85a65 |
|
08-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Check the return value of sss_parse_internal_fqname
We should fail the request if sss_parse_internal_fqname() fails.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
530458a4ef7cd8429d1db2f3dfae92d9c44e38ef |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: fix lookup by UPN for subdomains
Currently the user name used in the extdom exop request is
unconditionally set to the short name. While this is correct for the
general name based lookups it breaks UPN/email based lookups where the
name part after the @-sign might not match to domain name. I guess this
was introduce during the sysdb refactoring.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
160ba891ec483c5b7d2a3fcca5bd992fc790efe0 |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: expand ghost members of AD groups in server-mode
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3d29430867cf92b2d71afa95abb679711231117c |
|
15-Jul-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: rename be_acct_req to dp_id_data
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
0ad1bcec60a2ec67a602e0ad1888f859d6009d54 |
|
07-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: make get_object_from_cache() aware of UPN searches
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
59032b8de713f038803e91b14d5df51384d64d2c |
|
07-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: add missing user name to homedir_ctx
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c125e741d3111e2f9b56866ba00835ca05c6f349 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Use internal fqname format instead of parsing NSS names
Parsing the extdom plugin output is an "input" operation from the point
of the IPA provider, so we need to parse the name and conversely,
internally use only the qualified name.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
accff8ebe158251b1d25a95b3b035fe7e08fd1ee |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: expand_homedir_template manages usernames internally
expand_homedir_template() can be considered an outward-facing interface,
therefore the function and its input structure will accept the internal
name format and parse it internally into a username and domain
component.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
21513e51a4a2eb08f245333bf8f223713a3d7cb3 |
|
09-Jun-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: allow lookups by cert in sub-domains on the client
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a1210c8db81a1cc0b45eb62a8450abcdea3afc7b |
|
09-Jun-2016 |
Sumit Bose <sbose@redhat.com> |
ipa: add support for certificate overrides
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c371993cce13edb9185a5f0db76fbee03f0edc04 |
|
13-Apr-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: resolve PAC for trusted users on IPA clients
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
e2d96566aeb881bd89e5c9236d663f6a9a88019a |
|
24-Feb-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Add interface to call into IPA provider from LDAP provider
https://fedorahosted.org/sssd/ticket/2522
Adds a pluggable interface that is able to resolve the IPA group's
external members. At the moment, the request calls the full be_
interface to make sure all corner cases like id-views are handled
internally.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
309aa83d16b5919f727af04850bcd0799ba0962f |
|
07-Oct-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Provide common connection list construction functions
https://fedorahosted.org/sssd/ticket/2810
Provides a new AD common function ad_ldap_conn_list() that creates a
list of AD connection to use along with properties to avoid mistakes
when manually constructing these lists.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
42bd89dbe77846b6ee60365bba50da521745bca1 |
|
23-Sep-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Retry fetching keytab if IPA user lookup fails
Required for:
https://fedorahosted.org/sssd/ticket/2639
Instead of calling ipa_get_ad_acct_send directly, call a new request
ipa_srv_ad_acct_send. The new request wraps ipa_get_ad_acct_send and
either tries to request a new keytab every time the lookup fails but the
domain is online.
be_mark_dom_offline() is called when the retry fails with the new code.
The retry tries to re-setup the trusted domain. With two-way setups, the
request is a no-op. With one-way trust setups, the request re-fetches
new keytab unconditionally.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
20162352030d1c577bb69d44e967d2c5839e5c0e |
|
21-Sep-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Do not allow the AD lookup code to set backend as offline in server mode
https://fedorahosted.org/sssd/ticket/2637
In server mode, we should not allow the AD lookups to set the backend
offline. Rather just let them report an error and deal with the error
separately.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
afa6ac75f97951ea5ea4b6e96c607acc3c5fafcc |
|
07-Aug-2015 |
Pavel Reichl <preichl@redhat.com> |
IPA: Improve messages about failures
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
caacea0dbfdc92613ae992681053b1d2665b80ca |
|
19-Jun-2015 |
Sumit Bose <sbose@redhat.com> |
LDAP/IPA: add user lookup by certificate
Related to https://fedorahosted.org/sssd/ticket/2596
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
979e8d8d6ed444007eeff6be5269e8dc5d2bdf68 |
|
14-Jun-2015 |
Pavel Reichl <preichl@redhat.com> |
IPA: Don't override homedir with subdomain_homedir
Resolves:
https://fedorahosted.org/sssd/ticket/2583
Reviewed-by: Michal Židek <mzidek@redhat.com> |
2263c6dd1242c92253240f4998c86a04b6a0ca3a |
|
05-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: search for overrides during initgroups in sever mode
After the group memberships of a user from a trusted domain are read it
must be checked if there are overrides for the discovered groups to be
able to return the right gid or name to the caller.
Related to https://fedorahosted.org/sssd/ticket/2633
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
e87badc0f6fb20a443cf12bde9582ecbc2aef727 |
|
05-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: do initgroups if extdom exop supports it
Newer versions of the extdom plugin return the full list of
group-memberships during a user lookup request. With these version there
is no need to reject a initgroups request for sub/trusted-domain users
anymore. This is e.g. useful for callers which call getgrouplist()
directly without calling getpwnam() before. Additionally it helps if for
some reasons the lifetime of the user entry and the lifetime of the
initgroups data is different.
Related to https://fedorahosted.org/sssd/ticket/2633
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f70a1adbfc30b9acc302027439fb8157e0c6ea2a |
|
29-Apr-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: allow initgroups by SID for AD users
If a user from a trusted AD domain is search with the help of an
override name the SID from the override anchor is used to search the
user in AD. Currently the initgroups request only allows searches by
name. With this patch a SID can be used as well.
Resolves https://fedorahosted.org/sssd/ticket/2632
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
561ed2fd03bab04cfdddbc09c4b48563c9d9b87e |
|
30-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
AD: use GC for SID requests as well
If a universal group is looked up by SID the cross-domain members must
be resolved with the help of the Global Catalog.
Related to https://fedorahosted.org/sssd/ticket/2514
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
63748c69a2c6785d949c82f94749704e0408e5a7 |
|
26-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: resolve IPA group-memberships for AD users
So far only for initgroups requests the IPA group memberships where
resolved for AD users and due to
6fac5e5f0c54a0f92872ce1450606cfcb577a920 those memberships are not
overridden by other request. But it turned out that the originalMemberOf
attributes related to the IPA group memberships can be overridden by
user lookups. Since the originalMemberOf attribute is important in the
HBAC evaluation this patch makes sure that the originalMemberOf
attribute is not removed but updated during user lookups.
Related to https://fedorahosted.org/sssd/ticket/2560
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
765d9075bb1e10ae0f09b6c2701bfd50aeb423d4 |
|
13-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: resolve ghost members if a non-default view is applied
Related to https://fedorahosted.org/sssd/ticket/2481
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
acebf94a16c91b17c7c082538ab3083ee26aa992 |
|
20-Nov-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: check overrrides for IPA users as well
Currently overrides were only available for sub-domains, e.g. trusted AD
domains. With this patch overrides can be used for IPA users as well.
Related to https://fedorahosted.org/sssd/ticket/2481
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f1436acde39da5f1400a51153cf7fd370682a4c8 |
|
20-Nov-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: make get_object_from_cache() public
Related to https://fedorahosted.org/sssd/ticket/2481
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3256bd11e64c12c10ccac7192063e60ec68a2ad9 |
|
30-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Rename user_dom into obj_dom
There was a variable in the IPA subdomain code named user_dom, however,
it was used in code that processes both users and groups, which was
confusing.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
0636276cbc6e53022b84bf1a7e4d82dee62160a9 |
|
30-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Don't fail the request when BE doesn't find the object
The IPA subdomain code treated ENOENT as a fatal error, which resulted
in a loud error message and the whole request being aborted. This patch
ignores ENOENT.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
44329653f423c632b027065a9c0ea0bf4199396a |
|
22-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
ipa: fix issues with older servers not supporting views
Older FreeIPA servers which do not know about the ipaAssignedIDView
attribute will return an error during the LDAP dereference request
because SSSD marks LDAP extensions as critical. In this case we keep the
view name empty and skip override lookups.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ed4a9bd4d0f7fb359bed66a8d63a92e7be633aae |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
views: search overrides for user and group requests
If the name or the POSIX ID of a user or a group is overridden the
search request for those objects have to check the overide objects first
before looking up the original objects.
This patch adds a new request for the IPA sub-domain users which checks
the overrides first if
- SSSD is running in ipa-server-mode and a name or a POSIX ID is
searched, since we do not override the SIDs we can skip the search in
the override tree here
- if the responder indicates it has not found the corresponding object
in the cache and the input might be an override name or ID and not the
original one of an object.
If an override object was found the SID is extracted from the anchor
attribute and the original object is search by its SID. If no override
object was found the original object is search with the original input
and finally it is checked if an override object exits for the found
object.
Relates to https://fedorahosted.org/sssd/ticket/2375
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
9c8db0a17a66c58c36966b17d004142a4aaace8d |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
views: get overrides during user and group lookups
With this patch the IPA provider will check if overrides exists for the
given view during the lookup of users and groups from trusted domains.
In ipa-server-mode the default view is automatically applied and written
to the cache. On IPA clients which use the extdom plugin for user and
group lookups the override data is saved separately and the original
object and the override data are linked with DN attributes for faster
reference.
Related to https://fedorahosted.org/sssd/ticket/2375
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
00c283ca719717ed483958571982d0e9ff95c4b1 |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: make IPA ID context available to extdom client code
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
a20ce8cd43d72c89e2ea1d65aefe24ba270f040f |
|
25-Sep-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Use GC for group lookups in server mode
https://fedorahosted.org/sssd/ticket/2412
Even though AD trusts often work with POSIX attributes which are
normally not replicated to GC, our group lookups are smart since commit
008e1ee835602023891ac45408483d87f41e4d5c and look up the group itself using
the LDAP connection and only use the GC connection to look up the members.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
82347f452febe3cbffc36b0a3308ffb462515442 |
|
19-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: handle searches by SID in apply_subdomain_homedir
https://fedorahosted.org/sssd/ticket/2391
apply_subdomain_homedir() didn't handle the situation where an entity
that doesn't match was requested from the cache. For user and group
lookups this wasn't a problem because the negative match was caught
sooner.
But SID lookups can match either user or group. When a group SID was
requested, the preceding LDAP request matched the SID and stored the
group in the cache. Then apply_subdomain_homedir() only tried to search
user by SID, didn't find the entry and accessed a NULL pointer.
A simple reproducer is:
$ python
>>> import pysss_nss_idmap
>>> pysss_nss_idmap.getnamebysid(group_sid)
The group_sid can be anything, including Domain Users (XXX-513)
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
db18dda869bc6c52a41797b2066cf121cf10f49c |
|
22-Jul-2014 |
Pavel Reichl <preichl@redhat.com> |
UTIL: rename find_subdomain_by_name
The function was named "find_subdomain" yet it could find both main
domain and subdomain.
sed 's/find_subdomain_by_name/find_domain_by_name/' -i `find . -name "*.[ch]"`
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ae0a5011e2644eaa482ea1b9e1451eff05c676b9 |
|
02-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
NSS: Add option to expand homedir template format
LDAP server can contain template for home directory instead of plain string.
This patch adds new expand option "%H", which will be replaced with value
from configuration option homedir_substring (from sssd.conf)
Resolves:
https://fedorahosted.org/sssd/ticket/1853 |
5cd660aaa885bca95ac3dca660bb77e5786d5f8e |
|
02-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
NSS: Refactor expand_homedir_template
Function expand_homedir_template had lot of parameters.
After adding new expand option, all function call should be rewritten,
(usually argument NULL will be added)
This patch wraps all necessary arguments to structure. |
33d70148eac28c548b10eb3aa36ab23169cedc5a |
|
21-May-2014 |
Alexander Bokovoy <abokovoy@redhat.com> |
ipa subdomains provider: make sure search by SID works for homedir
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
17cd7b7233ff6d84786de316eee307a1c1baf7a7 |
|
10-Mar-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: Use GC for AD initgroup requests
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
48b1db73639135dd4a15ee153f958c912836c621 |
|
03-Mar-2014 |
Sumit Bose <sbose@redhat.com> |
ipa-server-mode: use lower-case user name for home dir
In older IPA server versions where the AD users where looked up by
winbind the user name component of the home directory path was always
lower case. This still holds for IPA clients as well. To avoid
regression this patch makes the user name component lower case as well.
Fixes https://fedorahosted.org/sssd/ticket/2263
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
26786da26706aeedbda4caea0383c143ed4e59dc |
|
20-Feb-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Don't fail if apply_subdomain_homedir returns ENOENT
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
6d4574a8dd1a9cafbb15631e7d01bdf6e67f821b |
|
20-Feb-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Don't call tevent_req_post outside _send
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
e81deec535d11912b87954c81a1edd768c1386c9 |
|
12-Feb-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Detect the presence of POSIX attributes
When the schema is set to AD and ID mapping is not used, there is a one-time
check ran when searching for users to detect the presence of POSIX
attributes in LDAP. If this check fails, the search fails as if no entry
was found and returns a special error code.
The sdap_server_opts structure is filled every time a client connects to
a server so the posix check boolean is reset to false again on connecting
to the server.
It might be better to move the check to where the rootDSE is retrieved,
but the check depends on several features that are not known to the code
that retrieves the rootDSE (or the connection code for example) such as what
the attribute mappings are or the authentication method that should be used.
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
8263ecef6f5c6dab802fdabaf57c25fd2fcf692e |
|
05-Feb-2014 |
Pavel Reichl <preichl@redhat.com> |
AD: support for subdomain_homedir
Homedir is defaultly set accordingly to subdomain_homedir for users from AD.
Resolves:
https://fedorahosted.org/sssd/ticket/2169 |
caee9828ee30609e9f433957dbb3d0163390a207 |
|
28-Aug-2013 |
Sumit Bose <sbose@redhat.com> |
ipa-server-mode: add IPA group memberships to AD users
When IPA trusts an AD domain the AD user or groups can be placed into
IPA groups e.g. to put AD users under the control of HBAC. Since IPA
group can only have members from the IPA directory tree and the AD users
and groups are not stored there a special IPA object called external
group was introduced. SIDs of users and groups can be added to the
external group and since the external groups are in the IPA directory
tree they can be member of IPA groups.
To speed things up and to remove some load from the IPA servers SSSD
reads all external groups and stores them in memory for some time before
rereading the data.
Enhances https://fedorahosted.org/sssd/ticket/1962 |
bbb7ba8890908613b1b723746e091aed740af9f9 |
|
23-Jul-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix possible dereference of a NULL pointer.
We check if function ipa_get_ad_id_ctx returns NULL,
but function ipa_get_ad_id_ctx could never return NULL.
This issue was found by scan-build. |
3d28e0e560b787b5c57ed7327d184310342a7e38 |
|
28-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Look up AD users directly if IPA server mode is on
https://fedorahosted.org/sssd/ticket/1962
If the ipa_server_mode is selected IPA subdomain user and group lookups
are not done with the help of the extdom plugin but directly against AD
using the AD ID code. |
b8d703cf3aba81800cf1b8ccca64bb00ef0b30f7 |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Replace new_subdomain() with find_subdomain_by_name()
new_subdomain() will create a new domain object and should not be used
anymore in the priovder code directly. Instead a reference to the domain
from the common domain object should be used. |
dcb44c39dda9699cdd6488fd116a51ced0687de3 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: sdap_id_ctx might contain several connections
With some LDAP server implementations, one server might provide
different "views" of the identites on different ports. One example is
the Active Directory Global catalog. The provider would contact
different view depending on which operation it is performing and against
which SSSD domain.
At the same time, these views run on the same server, which means the same
server options, enumeration, cleanup or Kerberos service should be used.
So instead of using several different failover ports or several
instances of sdap_id_ctx, this patch introduces a new "struct
sdap_id_conn_ctx" that contains the connection cache to the particular
view and an instance of "struct sdap_options" that contains the URI.
No functional changes are present in this patch, currently all providers
use a single connection. Multiple connections will be used later in the
upcoming patches. |
e2f6326ea56217afab7623c542a237ee84eb74da |
|
03-May-2013 |
Sumit Bose <sbose@redhat.com> |
Add SID related lookups to IPA subdomains
This patch add the functionality to handle lookup by SIDs and lookups
for SIDs to the subdomain branch of the IPA ID provider. |
2962b3d1e072ff2ebbe343095812dad697d6bf1d |
|
02-May-2013 |
Sumit Bose <sbose@redhat.com> |
Use struct to hold different types of request parameters
Currently the POSIX ID or the user name are passed in different
parameters to some calls. The method will get cumbersome and error-prone
if new parameters like, e.g. the SID, are added. This patch adds a union
to hold the different kind of parameters. |
44c379a27a2d8de0ad933ebb2558b5e82b05fd56 |
|
02-May-2013 |
Sumit Bose <sbose@redhat.com> |
Remove unused attribute list |
b8dcd1216e5ea7065213c750a92dabfe01fa3b70 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Add realm info to sss_domain_info |
e11c7dc43f4ff9897e37cc0d793f8e1fb3b8453a |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Use an entry type mask macro to filter entry types
Avoids hardcoding magic numbers everywhere and self documents why a
mask is being applied. |
791abc91fd8b2a7f73511ab8051df1065f9f54b2 |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Fix ipa_subdomain_id names and tevent_req style |
f49848d3b32b97b9199f0e06dd7cb6992ff6eecb |
|
08-Nov-2012 |
Sumit Bose <sbose@redhat.com> |
Clarify debug message about initgroups and subdomains
The initgroups request is not handled by the IPA provider for
subdomain users on purpose because the group membership information is
not available on the IPA server but will be directly written to the
cache when the PAC of the user is processed. The old generic debug
message "Invalid sub-domain request type" might be misleading.
This patch adds a specific message for the initgroups case "Initgroups
requests are not handled by the IPA provider but are resolved by the
responder directly from the cache." and increase the debug level so
that typically this message is not shown anymore because it is expected
behaviour.
Fixes https://fedorahosted.org/sssd/ticket/1610 |
70eaade10feedd7845e39170d0b7eebf3a030af1 |
|
12-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
Allow extdom exop to return flat domain name as well
There are case where the extdom extended operation will return the flat
or NetBIOS name of a domain instead of the DNS domain name. If this name
is available for the current domain we accept it as well.
Related to https://fedorahosted.org/sssd/ticket/1561 |
64ddff90c7fcc02ccb06824ac93af7d5f361a88f |
|
31-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add support for filtering atributes
This patch adds support for filtering attributes when constructing
attribute list from a map for LDAP query. |
ca4b7b92738f3dd463914e3de5757cd98d37a983 |
|
10-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add attr_count return value to build_attrs_from_map()
This is necessary because in several places in the code, we are
appending to the attrs returned from this value, and if we relied
on the map size macro, we would be appending after the NULL
terminator if one or more attributes were defined as NULL. |
881c4ba834b23ae651ac01db667801f314eb0a5d |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add ID operations in subdomains |