0f6b5b02afb35caae774ff4d52854a844d49f52e |
|
04-Apr-2018 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Qualify the externalUser sudo attribute
We broke the externalUser support with the introduction of the fully
qualified attributes, because the provider was saving the data verbatim,
but the sudo responder expects a fully qualified name.
Reproducer:
on the server:
ipa sudocmd-add --desc='For reading log files' /usr/bin/less
ipa sudorule-add readfiles
ipa sudorule-add-user --users=lcluser
ipa sudorule-mod --hostcat=all readfiles
then on the client:
configure sssd with:
id_provider = files
sudo_provider = ipa
ipa_domain = ipa.test
run:
sudo useradd lcluser
sudo passwd lcluser
su - lcluser
sudo -l
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
60a715a0dd79873d2d2607eab8fdfaf0ffd2e7d3 |
|
09-Feb-2018 |
Hristo Venev <hristo@venev.name> |
providers: Move hostid from ipa to sdap, v2
In the ldap provider, all option names are renamed to ldap_host_*. In
the ipa provider the names haven't been changed.
Host lookups for both ipa and ldap are handled in the ldap provider.
sss_ssh_knownhostsproxy works but hostgroups are still only available
in the ipa provider.
I've also added some documentation for the ldap provider.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
bc854800cc67271205d63136daaf68d7863cea6b |
|
19-Oct-2017 |
Justin Stephenson <jstephen@redhat.com> |
IPA: Add threshold for sudo searches
Apply the sudo threshold to IPA provider sudo command and command
group searches to prevent SSSD from creating large search filters.
The IPA sudo threshold value will utilize the sudo responder
sudo_threshold value. If the threshold is exceeded, a basic search
filter will be used as a fallback to retrieve all IPA sudo commands or
command groups.
Resolves:
https://pagure.io/SSSD/sssd/issue/3507
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
334029028e566fab3dce5ce4b1b53cc4809c21b8 |
|
16-Feb-2017 |
Petr Čech <pcech@redhat.com> |
IPA_SUDO: Unused value fix
Unused value was immediately overwritten.
Resolves:
https://fedorahosted.org/sssd/ticket/3309
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
d0aae3c1e87e2e51ab178b7b343261443094a974 |
|
07-Feb-2017 |
Justin Stephenson <jstephen@redhat.com> |
SUDO: Add skip_entry boolean to sudo conversions
Add boolean to convert_attributes function and pass boolean as argument
to sudo conversion functions to add logic for skipping unexpected
entries like replication conflicts.
Resolves:
https://fedorahosted.org/sssd/ticket/3288
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b9941359b3181c42f415530d5ccad0f4664d85fa |
|
21-Sep-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove double semicolon at the end of line
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
64497d479e92ebc34717c20c3d017f1823f9e630 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Save sudoUser qualified in the cache
When converting from the native IPA schema to the sysdb sudo schema,
qualify sudoUser attributes that contain user and group names.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
e547eb597ade731f49b679ce264bbfd907363ff8 |
|
18-Apr-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
IPA_SUDO: Prevent dereference of NULL pointer
Error: NULL_RETURNS (CWE-476): [#def31]
sssd-1.13.4/src/providers/ipa/ipa_sudo_conversion.c:964:
returned_null: "ipa_sudo_conv_lookup" returns null.
sssd-1.13.4/src/providers/ipa/ipa_sudo_conversion.c:149:9:
return_null: Explicitly returning null.
sssd-1.13.4/src/providers/ipa/ipa_sudo_conversion.c:964:
var_assigned: Assigning: "cmdgroup" = null return value
from "ipa_sudo_conv_lookup".
sssd-1.13.4/src/providers/ipa/ipa_sudo_conversion.c:966:
dereference: Dereferencing a null pointer "cmdgroup".
# 964| cmdgroup = ipa_sudo_conv_lookup(conv->cmdgroups, listitem->dn);
# 965|
# 966|-> ret = add_strings_lists(mem_ctx, values, cmdgroup->expanded,
# 967| false, discard_const(&values));
# 968| if (ret != EOK) {
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
84060f52e782b079337ee7a99bb7ad17e8c84fbb |
|
14-Mar-2016 |
Pavel Březina <pbrezina@redhat.com> |
IPA SUDO: support old ipasudocmd rdn
FreeIPA versions older than 3.1 have rdn sudoCmd instead of ipaUniqueID.
Resolves:
https://fedorahosted.org/sssd/ticket/2969
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b0c4eb194cf1414d3440e0cccfb9af9074388c08 |
|
14-Mar-2016 |
Pavel Březina <pbrezina@redhat.com> |
IPA SUDO: fix typo
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
991c9f47fcb24704b880f60ab8ee77cfda056e2c |
|
09-Mar-2016 |
Pavel Březina <pbrezina@redhat.com> |
IPA SUDO: download externalUser attribute
This allows configuration with id_provider = proxy
and sudo_provider = ipa when someone needs to fetch
rules for local users.
https://fedorahosted.org/sssd/ticket/2972
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a7d2b4f157194c14bc4a40c74f6416b82befa460 |
|
19-Jan-2016 |
Pavel Březina <pbrezina@redhat.com> |
IPA SUDO: Add support for ipaSudoRunAsExt* attributes
Reviewed-by: Sumit Bose <sbose@redhat.com> |
9630a4614ba4d5f68e967d4e108893550a996f30 |
|
19-Jan-2016 |
Pavel Březina <pbrezina@redhat.com> |
IPA SUDO: Implement rules refresh
Reviewed-by: Sumit Bose <sbose@redhat.com> |
a641a13889d617aca6bd998025e9087e822ff7f0 |
|
19-Jan-2016 |
Pavel Březina <pbrezina@redhat.com> |
IPA SUDO: Implement full refresh
Reviewed-by: Sumit Bose <sbose@redhat.com> |