dacfe74113dde62ddaaa7f9abf9d2b6448d89db6 |
|
06-Dec-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Only run the POSIX check with a GC connection
Previously, we used to run the POSIX check also with an LDAP connection.
This was wasteful, but worked, so the waste wasn't the biggest problem
-- the approach would only cause problems with the following patch which
uses a NULL search base to search the Global Catalog, because searching
with a SUBTREE scope and a NULL base returns a referral with an LDAP
connection.
Instead, this patch uses a heuristics (whether the connection ignores
the offline state) to check if the connection is a POSIX one and if it
is NOT, then skips the POSIX check.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
8e93ebb2a6f7644c389c1d1f4e92a21c4d0b2b45 |
|
06-Dec-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Extract the check whether to run a POSIX check to a function
This will reduce the code duplication in the following patches and will
allow to keep all the logic on one place so that when/if we change the
code in the future, we only have to change the single place.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
2c10819750a8d920ab755eba1278e6e20e684e93 |
|
28-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
krb5: show error message for krb5_init_context() failures
If there are typos in /etc/krb5.conf (or one of the included config
snippets) krb5_init_context(), the initial call always needed to do any
other operation with libkrb5, fails because /etc/krb5.conf cannot be
parsed.
Currently the related debug/syslog messages might be misleading, e.g.
failed to read keytab. This is because SSSD does not use a global krb5
context but creates a fresh one for every new request or operation (to
always use the latest settings from /etc/krb5.conf) and typically there
is an error message indicating that the related operation failed but not
giving more details.
Since krb5_init_context() is fundamental for Kerberos support this patch
tries to add as much details as libkrb5 provides in the logs if the call
fails.
Resolves:
https://pagure.io/SSSD/sssd/issue/3586
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Robbie Harwood <rharwood@redhat.com> |
91141c6ae6e6a255cfd66266581671ddd16086b3 |
|
08-Jun-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Remove signal.h from util/util.h
signal.h is not used directly by util/util.h. The header file signal.h
must be included in 19 files and after removing it from util.h it had to be
added only to 12 missing files. And util.util.h is included in 381 files
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
9a2f018c0f68a3ada4cea4128a861a7f85893f22 |
|
12-Jan-2016 |
Sumit Bose <sbose@redhat.com> |
ldap: remove originalMeberOf if there is no memberOf
Since originalMemerberOf is not mapped directly to an original attribute
and is handled specially it is not automatically removed if there is no
memberOf in the original object anymore. This patch put
originalMemerberOf on the list of attribute which should be removed in
that case.
Resolves https://fedorahosted.org/sssd/ticket/2917
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ba17e124aa7003a92680eda5df0a9b5292c8c19c |
|
02-Nov-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
SDAP: Remove unused sdap_id_ctx from sdap_id_conn_cache_create
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
63fb0857378c450d9806b1a3c6bb5657f00a8ba1 |
|
11-Sep-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
SDAP: Remove unused function
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
7abec79ff6eeaff043c995bbb0a152ca3e0744e7 |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Consolidate SDAP_SASL_REALM/SDAP_KRB5_REALM behaviour
Reviewed-by: Sumit Bose <sbose@redhat.com> |
16d6c2d2030f0869eed2a8d163cc1cc1bd788838 |
|
04-Jun-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Fix DEBUG message
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
82a4f022ec1cbb9530ffa21d95474152b24acf50 |
|
18-Feb-2014 |
Pavel Březina <pbrezina@redhat.com> |
ldap: move domain related content from ldap_common.c to sdap_domain.c
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ce35bb272d25926b8fa0f9450c8b74064f25c816 |
|
18-Feb-2014 |
Pavel Březina <pbrezina@redhat.com> |
ldap: move options related content from ldap_common.c to ldap_options.c
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
430cc9ad62e0d7d1bd8dc7c65be2bfcf087c5e5c |
|
18-Feb-2014 |
Pavel Březina <pbrezina@redhat.com> |
sdap: move sdap_get_id_specific_filter() to sdap_utils.c
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
83bf46f4066e3d5e838a32357c201de9bd6ecdfd |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Update DEBUG* invocations to use new levels
Use a script to update DEBUG* macro invocations, which use literal
numbers for levels, to use bitmask macros instead:
grep -rl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e 'use strict;
use File::Slurp;
my @map=qw"
SSSDBG_FATAL_FAILURE
SSSDBG_CRIT_FAILURE
SSSDBG_OP_FAILURE
SSSDBG_MINOR_FAILURE
SSSDBG_CONF_SETTINGS
SSSDBG_FUNC_DATA
SSSDBG_TRACE_FUNC
SSSDBG_TRACE_LIBS
SSSDBG_TRACE_INTERNAL
SSSDBG_TRACE_ALL
";
my $text=read_file(\*STDIN);
my $repl;
$text=~s/
^
(
.*
\b
(DEBUG|DEBUG_PAM_DATA|DEBUG_GR_MEM)
\s*
\(\s*
)(
[0-9]
)(
\s*,
)
(
\s*
)
(
.*
)
$
/
$repl = $1.$map[$3].$4.$5.$6,
length($repl) <= 80
? $repl
: $1.$map[$3].$4."\n".(" " x length($1)).$6
/xmge;
print $text;
' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
f8407faaeb6726bef6463d84f183f2b0ad1f99d4 |
|
29-Jan-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Pass a private context to enumeration ptask instead of hardcoded connection
Previously, the sdap-domain enumeration request used a single connection context to
download all the data. Now we'd like to use different connections to
download different objects, so the ID context is passed in and the
request itself decides which connection to use for the sdap-domain
enumeration. |
630329785c4d6400a3df2fba29ee0fa9a6bb29ef |
|
20-Jan-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Fix error check
https://fedorahosted.org/sssd/ticket/2199 |
2743db79b1d1f72ba7aaafde02e3f0b888e6dacd |
|
29-Nov-2013 |
Pavel Reichl <pavel.reichl@redhat.com> |
SSSD: Improved domain detection
A bit more elegant way of detection of what domain the group member belongs to
Resolves:
https://fedorahosted.org/sssd/ticket/2132 |
7d8d8854d0e2bc7a038a87ea6b69b5da01128fc3 |
|
12-Nov-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove unused variable |
3242dd4a49c3869c9b066a63afb81cebf1a35b7d |
|
12-Nov-2013 |
Simo Sorce <simo@redhat.com> |
Signals: Refactor termination of processes
sig_term() was never used as a real signal handler, but only called by tevent
signal handlers in the kerberos and ldap children.
Also the same code was duplicated with separate local guard variables in other
functions.
Unify orderly termination handling, between all these functions. |
407123c67114bf010cdad4418f291f9fb3762f4a |
|
12-Nov-2013 |
Cove Schneider <cove@ilm.com> |
Add ldap_autofs_map_master_name option |
d81ce5550ba1fdebd958483d7322052c8b39c33b |
|
30-Oct-2013 |
Pavel Březina <pbrezina@redhat.com> |
sdap: add sdap_domain_get_by_dn()
This function will find sdap domain by comparing object dn
with domain base dn.
Resolves:
https://fedorahosted.org/sssd/ticket/2064 |
c704c35ae7ab3861c78371437e3a9ed06ba93d8b |
|
30-Oct-2013 |
Pavel Březina <pbrezina@redhat.com> |
sdap: store base dn in sdap_domain
Groups may contain members from different domains. Remembering
base dn in domain object gives us the ability to simply lookup
correct domain by comparing object dn with domain base dn.
Resolves:
https://fedorahosted.org/sssd/ticket/2064 |
ed2f9b9b444f146429a28d02b1e3b7c97a5cfad7 |
|
30-Oct-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: Return correct error code
If talloc_array return NULL we should return right error code from function
sdap_domain_subdom_add. It might happen that we could return either wrong error
code or uninitialized variable ret. |
6e3f79799ce7e736dd19ae2e05a60dc1901613f1 |
|
25-Oct-2013 |
Pavel Březina <pbrezina@redhat.com> |
dp: convert cleanup task to be_ptask
Resolves:
https://fedorahosted.org/sssd/ticket/1968 |
efe6b4a9d374339cac2528cdeb43720957c6b7c9 |
|
25-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Use the ad_access_filter if it's set
Related:
https://fedorahosted.org/sssd/ticket/2082
Currently the AD access control only checks if an account has been
expired. This patch amends the logic so that if ad_access_filter is set,
it is used automatically. |
794bfc68c39ce19e66eb20083adb19d5079d0431 |
|
20-Sep-2013 |
Sumit Bose <sbose@redhat.com> |
sdap_domain_add: remove too strict consistency check
The check worked for simple setups but fails e.g. in environment with
trusts. |
9dc153a402a36eeb6edbbf23ef489d957b9a76d0 |
|
20-Sep-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Deprecate ldap_{user,group}_search_filter |
21f749c9300a1a51f3eb83d7f1483ec2fe15b3cc |
|
18-Sep-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: sdap_id_setup_tasks accepts a custom enum request
AD provider will override the default with its own. |
57cd3443dcb7c073c5a00a9f2c3c3a3030ae2d3e |
|
11-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix formating of variables with type: long |
1c4144a6ce68dbd54c7c08a517d1f982ea57f19a |
|
28-Aug-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Make sdap_id_setup_tasks reusable for subdomains
Instead of always performing the setup for the main domain, the setup
can now be performed for subdomains as well. |
66edf42c51f8591c93204b6490c103fa51346f47 |
|
28-Aug-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Make the cleanup task reusable for subdomains
Instead of always performing the cleanup on the main domain, the task
now accepts a sdap_domain structure to perform the cleanup on. This
change will make the cleanup task reusable for subdomains. |
5894f059b6f97a9dfd63f6e9ab544c636dd58665 |
|
28-Aug-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Convert enumeration to the ptask API
https://fedorahosted.org/sssd/ticket/1942
Identity providers other than LDAP need to customize the enumeration in
different ways while sharing the way the task is scheduled etc. The
easiest way to accomplish it is to leverage the recently introduced
ptask framework. |
4e3ba17a3376b635cb0d9ae60a6d4e712ded01a0 |
|
28-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Move storing sdap_domain for subdomain to generic LDAP code
Makes creating the sdap_domain structure for a subdomain reusable
outside AD subdomain code where it was created initially.
Subtask of:
https://fedorahosted.org/sssd/ticket/1962 |
14452cd066b51e32ca0ebad6c45ae909a1debe57 |
|
10-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
A new option krb5_use_kdcinfo
https://fedorahosted.org/sssd/ticket/1883
The patch introduces a new Kerberos provider option called
krb5_use_kdcinfo. The option is true by default in all providers. When
set to false, the SSSD will not create krb5 info files that the locator
plugin consumes and the user would have to set up the Kerberos options
manually in krb5.conf |
556040eac686265f8a3b20e2a744210607cba95c |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: split a function to create search bases
This function will be used later to fill the sdap_domain structures with
search bases. |
749cfb5d3270b5daf389d51a0dbd3fd2aec6e05d |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: new SDAP domain structure
Previously an sdap_id_ctx was always tied to one domain with a single
set of search bases. But with the introduction of Global Catalog
lookups, primary domain and subdomains might have different search
bases.
This patch introduces a new structure sdap_domain that contains an sssd
domain or subdomain and a set of search bases. With this patch, there is
only one sdap_domain that describes the primary domain. |
dcb44c39dda9699cdd6488fd116a51ced0687de3 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: sdap_id_ctx might contain several connections
With some LDAP server implementations, one server might provide
different "views" of the identites on different ports. One example is
the Active Directory Global catalog. The provider would contact
different view depending on which operation it is performing and against
which SSSD domain.
At the same time, these views run on the same server, which means the same
server options, enumeration, cleanup or Kerberos service should be used.
So instead of using several different failover ports or several
instances of sdap_id_ctx, this patch introduces a new "struct
sdap_id_conn_ctx" that contains the connection cache to the particular
view and an instance of "struct sdap_options" that contains the URI.
No functional changes are present in this patch, currently all providers
use a single connection. Multiple connections will be used later in the
upcoming patches. |
7119f0c483049a8850d3075c0b1062f35200a538 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Do not obfuscate calls with booleans
Instead of using boolean variables to denote whether the call is adding
a primary or a secondary server, use a function wrapper that tells what
it's doing by its name. |
a157a30729b3733e72b8a344ea79558613349bf6 |
|
27-May-2013 |
Sumit Bose <sbose@redhat.com> |
Handle SID strings in sdap_attrs_get_sid_str() as well
This patch add a basic check if the SID returned by the LDAP server is
in a string representation. If not it is assumed that a binary SID was
returned by the LDAP server which is converted into a string
representation which is returned to the caller. |
8e5549e453558d4bebdec333a93e215d5d6ffaec |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Introduce be_req_terminate() helper
Call it everywhere instead of directly dereferencing be_req->fn
This is in preparation of making be_req opaque. |
df0596ec12bc5091608371e2977f3111241e8caf |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove sysdb as a be context structure member
The sysdb context is already available through the 'domain' structure. |
80c6afa474d8a1e0198832bddfe5da75a9818b29 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_has/set_enumerated() |
04759b59e71c78ab23b84d13dd29d9c6dd680adb |
|
02-Jan-2013 |
Michal Zidek <mzidek@redhat.com> |
failover: Protect against empty host names
Added new parameter to split_on_separator that allows to skip
empty values.
The whole function was rewritten. Unit test case was added to
check the new implementation.
https://fedorahosted.org/sssd/ticket/1484 |
24c3186d01d8d1c11832baab24ab3f0de121c666 |
|
19-Nov-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Make it possible to use full principal in ldap_sasl_authid again |
459f70d567c211f860244f75f2878c3a446c2a38 |
|
19-Nov-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Checking the principal should not be considered fatal
The check is too restrictive as the select_principal_from_keytab can
return something else than user requested right now.
Consider that user query for host/myserver@EXAMPLE.COM, then the
select_principal_from_keytab function will return "myserver" in primary and
"EXAMPLE.COM" in realm. So the caller needs to add logic to also break
down the principal to get rid of the host/ part. The heuristics would
simply get too complex.
select_principal_from_keytab will error out anyway if there's no
suitable principal at all. |
e0d861963e10c5aba79ad87f8c48b0ce1bec06ca |
|
19-Nov-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Provide a common sdap_set_sasl_options init function
The AD and IPA initialization functions shared the same code. This patch
moves the code into a common initialization function. |
245c6b5db07249ecead23263f15c5c68c641134d |
|
10-Oct-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix segfault when ID-mapping an entry without a SID
If there was no SID attribute, then we would have detected it by
checking the number of values of an element. We would however happily
return EOK in that case and save garbage into the sid_str.
This was causing segfault when the entry was supposed to be ID-mapped by
had no SID. |
507521d5a753aaa800bd0ca25beb509c0f20b9b4 |
|
24-Sep-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
AUTOFS: Do not fail if search base is not provided |
b1caacb098ae99ad65144120fdec4d0fd98ad9d5 |
|
17-Sep-2012 |
Pavel Březina <pbrezina@redhat.com> |
Failover: use _srv_ when no primary server is defined
https://fedorahosted.org/sssd/ticket/1521 |
b096321a5a02dda0b6b71ba0f9c4d8feacd979e4 |
|
23-Aug-2012 |
Michal Zidek <mzidek@redhat.com> |
Fix: IPv6 address with square brackets doesn't work.
https://fedorahosted.org/sssd/ticket/1365 |
9ab243b369ba317cc964080786dbcdebaf23d6be |
|
15-Aug-2012 |
Michal Zidek <mzidek@redhat.com> |
Duplicate detection in fail over did not work.
https://fedorahosted.org/sssd/ticket/1472 |
4a1e58d85409fbb7a12ac244c3dbef8c0c1b15df |
|
09-Aug-2012 |
Michal Zidek <mzidek@redhat.com> |
SRV resolution for backup servers should not be permitted.
https://fedorahosted.org/sssd/ticket/1463 |
abd079e56ca59ce8d6a04fe132d8c7c60f7e3b63 |
|
06-Aug-2012 |
Pavel Březina <pbrezina@redhat.com> |
shadow attributes can contain -1
https://fedorahosted.org/sssd/ticket/1393 |
07b7b76d7cd494cbd26263503ba2732c21819941 |
|
01-Aug-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Primary server support: new options in krb5 provider
This patch adds support for new config options krb5_backup_server and
krb5_backup_kpasswd. The description of this option's functionality
is included in man page in one of previous patches. |
d7e3035f018828fcd41b0cc1c0012fab6012f782 |
|
01-Aug-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Primary server support: LDAP adaptation
This patch adds support for the primary server functionality into LDAP
provider. No backup servers are added at the moment, just the basic
support is in place. |
bbd33e46aa6194c1086939f7cf8538c067186455 |
|
01-Aug-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Primary server support: basic support in failover code
Now there are two list of servers for each service. If currently
selected server is only backup, then an event will be scheduled which
tries to get connection to one of primary servers and if it succeeds,
it starts using this server instead of the one which is currently
connected to. |
42aeb975864c3c3ba971fd04c61a1aaf6e69905b |
|
06-Jul-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Rename user and group maps for AD
This will eliminate ambiguity for the AD provider |
69905bf968003216d444fc68d8597e139362f2e6 |
|
06-Jul-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Drop memctx parameter of krb5_try_kdcip
This function is not supposed to return any newly-allocated memory
directly. It was actually leaking the memory for krb5_servers if
krb5_kdcip was being used, though it was undetectable because it
was allocated on the provided memctx.
This patch removes the memctx parameter and allocates krb5_servers
temporarily on NULL and ensures that it is freed on all exit
conditions. It is not necessary to retain this memory, as
dp_opt_set_string() performs a talloc_strdup onto the appropriate
context internally.
It also updates the DEBUG messages for this function to the
appropriate new macro levels. |
5f73b623fc72e3b9b3590420825f30e618b4d4dd |
|
29-Jun-2012 |
Pavel Březina <pbrezina@redhat.com> |
sudo ldap provider: load host filter configuration on init
We need to load host information during provider initialization.
Currently it loads only values from configuration files, but it is
implemented as an asynchrounous request as it will later try to
autodetect these settings (which will need to contact DNS). |
387349ae092f6dbeb8e4bca291a772695836629c |
|
20-Jun-2012 |
Stef Walter <stefw@gnome.org> |
Move some debug lines to new debug log levels
* These are common lines of debug output when starting
up sssd
https://bugzilla.redhat.com/show_bug.cgi?id=811113 |
64ddff90c7fcc02ccb06824ac93af7d5f361a88f |
|
31-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add support for filtering atributes
This patch adds support for filtering attributes when constructing
attribute list from a map for LDAP query. |
ca4b7b92738f3dd463914e3de5757cd98d37a983 |
|
10-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add attr_count return value to build_attrs_from_map()
This is necessary because in several places in the code, we are
appending to the attrs returned from this value, and if we relied
on the map size macro, we would be appending after the NULL
terminator if one or more attributes were defined as NULL. |
58d02e0d3d6d48c97fccdb2ad7212e065671ad6d |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add helper routine to convert LDAP blob to SID string |
65e8f538ad35ba7d86cd9e60a3d86aec34537027 |
|
28-Mar-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Put dp_option maps in their own file
There is no functional change due to this patch. |
5b9c04e210aaf36d45d346dac38b8f7f70e17025 |
|
16-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix uninitialized variable |
5363682fb2f4ed7fd0112ac46bb603424179acb7 |
|
14-Mar-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add AD 2008r2 schema
https://fedorahosted.org/sssd/ticket/1031 |
e840b9da42d696eb86307c641f5196f12ec4b9c4 |
|
01-Mar-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
IPA: Set the DNS discovery domain to match ipa_domain
https://fedorahosted.org/sssd/ticket/1217 |
3ff729e6c8a371e7a52914772816c39ca73c50a9 |
|
24-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Modifications to simplify list_missing_attrs |
087219897d8b8a92d7d33da3fa30883d40ad8cdb |
|
23-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
IPA: Add ipa_parse_search_base()
Previously, we were using sdap_parse_search_base() for setting up
the search_base objects for use in IPA. However, this was
generating unfriendly log messages about unknown search base
types. This patch creates a new common_parse_search_base() routine
that can be used with either LDAP or IPA providers.
https://fedorahosted.org/sssd/ticket/1151 |
3bea01f01d76e1e95a8239c0d3f67073992136a1 |
|
22-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Don't give memory context in confdb where not needed |
bbee21a2b99ebd1eca24d0a3d48c998747d68fdc |
|
13-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Add missing breaks to switch statements
Coverity #12525 and #12524 |
af5a58fc3811af8521721f731d8234d983042cea |
|
07-Feb-2012 |
Jan Cholasta <jcholast@redhat.com> |
LDAP: Add support for SSH user public keys |
c9750312bfb4196b49ba6f91b26489f630958452 |
|
06-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Update shadowLastChanged attribute during LDAP password change
https://fedorahosted.org/sssd/ticket/1019 |
cc84fd46f356c4a36a721ab135a33ec77c93e34d |
|
06-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
AUTOFS: LDAP provider |
5d00ee0e07dea78806df780db69e94900e5bb8c0 |
|
04-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Move BUILD_SUDO outside the generic LDAP source files
Avoid #ifdefs in the general part of the code |
bd92e8ee315d4da9350b9ef0358c88a7b54aeebe |
|
04-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
NSS: Add individual timeouts for entry types
https://fedorahosted.org/sssd/ticket/1016 |
169fa5bd3edd34aa0db35681832bd7406e423c1b |
|
04-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Do not fail if RootDSE check cannot determine search bases
https://fedorahosted.org/sssd/ticket/1152 |
796463906a54e259bd5b582ce84af4297a58eafc |
|
31-Jan-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add support for service lookups (non-enum) |
8270b1b8505e4bce5ec065daa8fcdf985e1fc9f5 |
|
18-Jan-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add option to disable paging control
Fixes https://fedorahosted.org/sssd/ticket/967 |
4e19af30cbaf819bdd88f7d0390aeabeb2797a60 |
|
18-Jan-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Do not use sudo symbols in LDAP provider unconditionally |
eb54e05c9658a7274e3238813c54dd0c6577d3ec |
|
17-Jan-2012 |
Pavel Březina <pbrezina@redhat.com> |
SUDO Integration - periodical update of rules in data provider
https://fedorahosted.org/sssd/ticket/1110
Adds new configuration options:
- ldap_sudo_refresh_enabled - enable/disable periodical updates
- ldap_sudo_refresh_timeout - rules timeout (refresh period) |
f643754db81eeade60485bbe3d80324d889cc4f3 |
|
17-Jan-2012 |
Pavel Březina <pbrezina@redhat.com> |
SUDO Integration review issues |
10b6b1fc57bb7c2edb4cfd0a0038303bd33722bc |
|
16-Dec-2011 |
Pavel Březina <pbrezina@redhat.com> |
SUDO Integration - LDAP configuration options |
75a43c7f91fcb27dee75976cc7c094dd5fa589f6 |
|
16-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Export the function to convert ldb_result to sysdb_attrs
It will be reused later in the sudo responder |
440d7fb430f83b3547f98f79c67a232ab2220296 |
|
12-Dec-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Add sdap_connection_expire_timeout option
https://fedorahosted.org/sssd/ticket/1036 |
8c60644bd8f2d739ff7a58b3717929254d09dfbe |
|
08-Dec-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Add ldap_sasl_minssf option
https://fedorahosted.org/sssd/ticket/1075 |
9f761434e5fbc5c033a85fb69d6e360e3ba4db58 |
|
23-Nov-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Modified sdap_parse_search_base() |
ed80a7f8ff76089bdcfae7007dbdef42d05e2cc8 |
|
02-Nov-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Support to request canonicalization in LDAP/IPA provider
https://fedorahosted.org/sssd/ticket/957 |
357efd33759fd1297723d9956a7f77226fe26871 |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Convert ldap_*_search_filter
Instead of making this a global option for all user lookups, make
it only used if the search base is passed without an explicit
filter. |
09b663e6dfd2ed09cead04f926d3e99e9ac01894 |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add parser for multiple search bases |
82962098e3848ed039a57522d74fc500bc6df8ad |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Make sdap_get_id_specific_filter() more strict |
fa3db4695a82b09cab30d0499114159b836e6357 |
|
20-Sep-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix uninitialized pointer read in sdap_gssapi_get_default_realm()
https://fedorahosted.org/sssd/ticket/1003 |
7452c325c1440feae92ac9862ea0121ea2446af4 |
|
26-Aug-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use the default Kerberos realm for LDAP with GSSAPI auth
https://fedorahosted.org/sssd/ticket/970 |
a2e6bd6ed16c92799d435043450f6156a773a6dc |
|
26-Aug-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Add LDAP provider option to set LDAP_OPT_X_SASL_NOCANON
https://fedorahosted.org/sssd/ticket/978 |
8a1738f9379a1b8fb5c95c3df649e014ff5a1434 |
|
15-Aug-2011 |
Jan Zeleny <jzeleny@redhat.com> |
sysdb refactoring: deleted domain variables in sysdb API
The patch also updates code using modified functions. Tests have also
been adjusted. |
9b85268eabe33d624b9d184251e89c0c7ae829a2 |
|
21-Jul-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
fo_get_server_name() getter for a server name
Allows to be more concise in tests and more defensive in resolve
callbacks |
363d2fba991eae199d017f5b2d1b458f070fac6b |
|
21-Jul-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Rename fo_get_server_name to fo_get_server_str_name |
a9fac774429097a8cf8c945fab94768fc7e87c05 |
|
21-Jul-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Do not add a NULL host parsed from LDAP URI
https://fedorahosted.org/sssd/ticket/911 |
37e7e93f1996cf50677cf59fd8af6938dd5d85b2 |
|
08-Jul-2011 |
Sumit Bose <sbose@redhat.com> |
Add LDAP access control based on NDS attributes |
31442edcf62c284d5d983bda48e51ae55b70ebdf |
|
08-Jul-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Add helper function msgs2attrs_array
This function converts a list of ldb_messages into a list of
sysdb_attrs. |
fda9ee900387d9d793e3696cd32b73c253097fe3 |
|
30-Jun-2011 |
Sumit Bose <sbose@redhat.com> |
Use name based URI instead of IP address based URIs |
7087d51975f4059591c04718def24ba7b753644c |
|
30-Jun-2011 |
Sumit Bose <sbose@redhat.com> |
Add sockaddr_storage to sdap_service |
1240496176a07e804c57d43926509d5ccbf0fc41 |
|
15-Jun-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Switch resolver to using resolv_hostent and honor TTL |
65d6947bc1f6bbe59c95ff3120b435a8acccc1d3 |
|
02-Jun-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use escaped IP addresses in LDAP provider |
34000a9baa70a9414330dc07b1fbdb8173a7961c |
|
24-May-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Make "password" the default for ldap_default_authtok_type |
7bdaf2a712d73763e7c3d25f6bb544b18f7028eb |
|
20-May-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use dereference when processing RFC2307bis nested groups
Instead of issuing N LDAP requests when processing a group with N users,
utilize the dereference functionality to pull down all the members in a
single LDAP request.
https://fedorahosted.org/sssd/ticket/799 |
b35da26911249aa48052655eef02f16e12930cf9 |
|
27-Apr-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Add ldap_page_size configuration option |
e81a816cddab4a62f263d1a0274d5d3f101e8e0f |
|
25-Apr-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Modify principal selection for keytab authentication
Currently we construct the principal as host/fqdn@REALM. The problem
with this is that this principal doesn't have to be in the keytab. In
that case the provider fails to start. It is better to scan the keytab
and find the most suitable principal to use. Only in case no suitable
principal is found the backend should fail to start.
The second issue solved by this patch is that the realm we are
authenticating the machine to can be in general different from the realm
our users are part of (in case of cross Kerberos trust).
The patch adds new configuration option SDAP_SASL_REALM.
https://fedorahosted.org/sssd/ticket/781 |
361b29ff4cc0eac948074cb0f54fdc7bd556a1b6 |
|
19-Apr-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Add user and group search LDAP filter options
https://fedorahosted.org/sssd/ticket/647 |
68c5b7f6cb855c5742db2502533d02c92847fca3 |
|
12-Apr-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Never remove gecos from the sysdb cache
Now that gecos can come from either the 'gecos' or 'cn' attributes,
we need to ensure that we never remove it from the cache. |
3612c73e7957721bcbf31d0118e2ac210eb46b88 |
|
24-Mar-2011 |
Pierre Ossman <pierre@ossman.eu> |
Add host access control support
https://fedorahosted.org/sssd/ticket/746 |
cc2b267e14db7073e7247b52cc9d82dfdf280076 |
|
16-Feb-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Do not attempt to use START_TLS on SSL connections
Not all LDAP servers are capable of handling dual-encryption with
both TLS and SSL.
https://fedorahosted.org/sssd/ticket/795 |
a1af9beb915e96da634b7d17762bf42146104d45 |
|
27-Jan-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Add option to disable TLS for LDAP auth
Option is named to discourage use in production environments and
is intentionally not listed in the SSSDConfig API. |
c6257286e9a31dfd42d28c99a22a69e2c4717a61 |
|
21-Jan-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Delete attributes that are removed from LDAP
Sometimes, a value in LDAP will cease to exist (the classic
example being shadowExpire). We need to make sure we purge that
value from SSSD's sysdb as well.
https://fedorahosted.org/sssd/ticket/750 |
3c13b616108d4c0a413380ba72189947898eee57 |
|
20-Jan-2011 |
Tyson Whitehead <twhitehead@gmail.com> |
Add ldap_tls_{cert,key,cipher_suite} config options
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com> |
d73fcc5183a676aed4fd040714b87274248b784c |
|
19-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Add LDAP expire policy base RHDS/IPA attribute
The attribute nsAccountLock is used by RHDS, IPA and other directory
servers to indicate that the account is locked. |
22f4c1b86dcf5589e63f2ae043dc65a8f72f6f18 |
|
19-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Add LDAP expire policy based on AD attributes
The second bit of userAccountControl is used to determine if the account
is enabled or disabled. accountExpires is checked to see if the account
is expired. |
29993ce4fbdf08f28077f4b6824c8b6b8d616cb8 |
|
17-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Add ldap_search_enumeration_timeout config option |
52b703a4c7cc43ae908300795569e27b64186ec8 |
|
06-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Convert obfuscated password once at startup |
2a2f642aae37e3f41cbbda162a74c2b946a4521f |
|
21-Dec-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add authorizedService support
https://fedorahosted.org/sssd/ticket/670 |
6c4661b78edafbd5b44e0c6319243e6671260bd0 |
|
17-Dec-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Start first enumeration immediately
Previously, we would wait for ten seconds before starting an
enumeration. However, this meant that on the first startup (before
we had run our first enumeration) there was a ten-second window
where clients would immediately get back a response with no
entries instead of blocking until the enumeration completed.
With this patch, SSSD will now run an enumeration immediately upon
startup. Further startups will retain the ten-second delay so as
not to slow down system bootups.
https://fedorahosted.org/sssd/ticket/616 |
42165bd9ada160e68ab0dbdeb21ed397486aa830 |
|
14-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Fix uninitialized value error in sdap_account_expired_shadow()
https://fedorahosted.org/sssd/ticket/726 |
8d163c0a088318ed9fc0b22def2649e27992ea53 |
|
07-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Replace krb5_kdcip by krb5_server in LDAP provider |
85abff7f43e8006de2c2fa35612884d377b9a036 |
|
07-Dec-2010 |
Simo Sorce <ssorce@redhat.com> |
ldap: Use USN entries if available.
Otherwise fallback to the default modifyTimestamp indicator |
1d9eec9e868fbc2d996f1030a43675be9a840133 |
|
07-Dec-2010 |
Simo Sorce <ssorce@redhat.com> |
ldap: add checks to determine if USN features are available. |
33b8fa8693df109fb33b6051bb29cb0cf5bc4d19 |
|
06-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add ldap_chpass_uri config option |
32266b2c1c6b8bf95f3ba8fd7f3ff2ef63d8fb9a |
|
06-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add new account expired rule to LDAP access provider
Two new options are added to the LDAP access provider to allow a broader
range of access control rules to be evaluated.
'ldap_access_order' makes it possible to run more than one rule. To keep
compatibility with older versions the default is 'filter'. This patch
adds a new rule 'expire'.
'ldap_account_expire_policy' specifies which LDAP attribute should be
used to determine if an account is expired or not. Currently only
'shadow' is supported which evaluates the ldap_user_shadow_expire
attribute. |
39875788b552ed157e68156e64e95dda5dc6aa43 |
|
06-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Make string_to_shadowpw_days() public |
40def28805f9df3ff640209def765723cd8e2de3 |
|
01-Dec-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Allow protocol fallback for SRV queries
https://fedorahosted.org/sssd/ticket/691 |
4f5824cf9b80dede79a6eddbcbb48f4ac75e5de4 |
|
15-Nov-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Properly document ldap_purge_cache_timeout
Also allow it to be disabled entirely |
38064e75ff70a5d740e02a511217cdbc5584ffd2 |
|
04-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Make ldap_search_base a non-mandatory option |
4534c103b193b74452ea81bf12ffaceb1901728a |
|
22-Oct-2010 |
Sumit Bose <sbose@redhat.com> |
Add ldap_deref option |
9932622f615a783f276a83389a37e65ffcdfc5da |
|
18-Oct-2010 |
Simo Sorce <ssorce@redhat.com> |
Add option to limit nested groups |
d9ed57c641b91c9c499a53329d606d5061ed47d1 |
|
13-Oct-2010 |
Sumit Bose <sbose@redhat.com> |
Add infrastructure to LDAP provider for netgroup support |
93109c5f1d85c028ce5cf6e31e2249ca90a7f746 |
|
13-Oct-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Initialize kerberos service for GSSAPI |
6e88b0dcd0352ac1280c1bd8dd0753b90e4014f2 |
|
13-Oct-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Add KDC to the list of LDAP options |
09c170c5b5cf0d62e7302ef284a1e35072ef1d95 |
|
09-Jul-2010 |
eindenbom <eindenbom@gmail.com> |
Remove remainder of now unused global LDAP connection handle. |
780ffc9f6d5e1fcd4df3d390b56cb98878223cc0 |
|
30-Jun-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Add dns_discovery_domain option
The service discovery used to use the SSSD domain name to perform DNS
queries. This is not an optimal solution, for example from the point of
view of authconfig.
This patch introduces a new option "dns_discovery_domain" that allows to set
the domain part of a DNS SRV query. If this option is not set, the
default behavior is to use the domain part of the machine's hostname.
Fixes: #479 |
7bfc287b693d3696bd5b3c60bdb7e543eb230f9b |
|
09-Jun-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Disable connection callbacks when going online
Under certain circumstances, the openldap libraries will continue
internally trying to reconnect to a connection lost (as during a
cable-pull test). We need to drop the reconnection callbacks when
marking the backend offline in order to guarantee that they are
not called with an invalid sdap_handle. |
35480afaefafb77b28d35b29039989ab888aafe9 |
|
27-May-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add ldap_access_filter option
This option (applicable to access_provider=ldap) allows the admin
to set an additional LDAP search filter that must match in order
for a user to be granted access to the system.
Common examples for this would be limiting access to users by in a
particular group, for example:
ldap_access_filter = memberOf=cn=access_group,ou=Groups,dc=example,dc=com |
8bb6aa3fd81a3c195b92270ddf189296abae65eb |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add offline callback to disconnect global SDAP handle |
ebb6e30d687a4d6626c735234c85cbb5b06a26aa |
|
16-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add ldap_krb5_ticket_lifetime option |
66da80489c0114878043b40592c5f47d41eb0ffd |
|
07-May-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Use service discovery in backends
Integrate the failover improvements with our back ends. The DNS domain
used in the SRV query is always the SSSD domain name.
Please note that this patch changes the default value of ldap_uri from
"ldap://localhost" to "NULL" in order to use service discovery with no
server set. |
270a0a1b6182ef1fbff2a93af6731788cf954874 |
|
03-May-2010 |
Simo Sorce <ssorce@redhat.com> |
Better handle sdap_handle memory from callers.
Always just mark the sdap_handle as not connected and let later _send()
functions to take care of freeing the handle before reconnecting.
Introduce restart functions to avoid calling _send() functions in _done()
functions error paths as this would have the same effect as directly freeing
the sdap_handle and cause access to freed memory in sdap_handle_release()
By freeing sdap_handle only in the connection _recv() function we
guarantee it can never be done within sdap_handle_release() but only
in a following event. |
980020c1ad798b79e7bb2c1618a04dd5cb7dd5cd |
|
25-Feb-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix check for values of expiration limits
There were inconsistencies between what sssd.conf manpage said
and what the code enforces. |
af81aaa57f82eab78647113c391bd84247f96150 |
|
23-Feb-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Better cleanup task handling
Implements a different mechanism for cleanup task. Instead of just
deleting expired entries, this patch adds a new option
account_cache_expiration for domains. If an entry is expired and the last
login was more days in the past that account_cache_expiration, the entry is
deleted.
Groups are deleted if they are expired and and no user references them
(no user has memberof: attribute pointing at that group).
The parameter account_cache_expiration is not LDAP-specific, so that other
future backends might use the same timeout setting.
Fixes: #391 |
170cd083e3a9738b35de03b8e63743a8f2516ca8 |
|
23-Feb-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Do not check entries during cleanup task
Do not attempt to validate expired entries in cache, just delete them.
Also increase the cache timeouts.
Fixes: #331 |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |