4a9c1047354dbe5a4ed41e5951ae623e3772e113 |
|
29-Jan-2018 |
René Genz <liebundartig@freenet.de> |
Fix minor spelling mistakes in providers/*
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
ba8a92bbd59f189bd1323dd0c4010cdfc694be35 |
|
06-Dec-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SDAP: Rename sdap_posix_check to sdap_gc_posix_check
Because searching the LDAP port of Active Directory server with a NULL
search base yields an error:
https://technet.microsoft.com/en-us/library/cc755809(v=ws.10).aspx
we changed the POSIX check request to only run against a GC connection
in a previous patch. To make it clearer to the caller that this request
should only be used with a GC connection, this patch renames the
request.
There are no functional changes in this patch.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
6ae22d9adc0b075361defc99b8f14480ba8e7b46 |
|
06-Dec-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SDAP: Search with a NULL search base when looking up an ID in the Global Catalog
The posix_check request is used to determine whether domains in the forest
replicate the POSIX attributes into the Global Catalog. And since the
schema modification that replicates the attributes is not per-domain, but
per-forest, we don't need to iterate over search bases when checking for
the POSIX attribute presence. It is OK to just search with a NULL search
base (and it's what Windows clients do, too).
Additionally, searching over the whole GC will come handy when implementing
the request that located an account's domain.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
dacfe74113dde62ddaaa7f9abf9d2b6448d89db6 |
|
06-Dec-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Only run the POSIX check with a GC connection
Previously, we used to run the POSIX check also with an LDAP connection.
This was wasteful, but worked, so the waste wasn't the biggest problem
-- the approach would only cause problems with the following patch which
uses a NULL search base to search the Global Catalog, because searching
with a SUBTREE scope and a NULL base returns a referral with an LDAP
connection.
Instead, this patch uses a heuristics (whether the connection ignores
the offline state) to check if the connection is a POSIX one and if it
is NOT, then skips the POSIX check.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
8e93ebb2a6f7644c389c1d1f4e92a21c4d0b2b45 |
|
06-Dec-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Extract the check whether to run a POSIX check to a function
This will reduce the code duplication in the following patches and will
allow to keep all the logic on one place so that when/if we change the
code in the future, we only have to change the single place.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
057e8af379aa32f7d9ea48bfff22a3304c59444b |
|
26-Oct-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Turn group request into user request for MPG domains if needed
If the primary group GID or the group name is requested before the user
is, we need to also search the user space to save the user in the back
end which then allows the responder to generate the group from the
user entry.
Related:
https://pagure.io/SSSD/sssd/issue/1872
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
f2e70ec742cd7aab82b74d7e4b424ba3258da7aa |
|
14-Sep-2017 |
Sumit Bose <sbose@redhat.com> |
IPA: fix handling of certmap_ctx
This patch fixes a use-after-free in the AD provider part and
initializes the certmap_ctx with data from the cache at startup.
Related to https://pagure.io/SSSD/sssd/issue/3508
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
29ee3e0945f8935a2eb01913ba00b540e0a94f01 |
|
31-May-2017 |
Sumit Bose <sbose@redhat.com> |
ldap: handle certmap errors gracefully
Currently the LDAP user lookup request errors out if e.g. there is no
matching rule for a certificate. This might cause the related domain to
go offline.
With this patch the request returns that no user was found for the given
certificate but overall result is that the request finishes
successfully.
Resolves:
https://pagure.io/SSSD/sssd/issue/3405
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3e39806177e1cd383743ff596cb96df44a6ce8c9 |
|
30-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Relax search filters in application domains
Related to:
https://pagure.io/SSSD/sssd/issue/3310
If a request comes towards an application domain, we can drop the part
of the filter that asserts that the object has a valid UID/GID. Instead,
we just search by name.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
c44728a02d5e2c9eaced11e74820a6ae6a985f61 |
|
23-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
IPA: add certmap support
Read certificate mapping data from the IPA server and configure the
certificate mapping library accordingly.
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
b341ee51cffd98b642b9c68a417f8a7504e303a1 |
|
23-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
sss_cert_derb64_to_ldap_filter: add sss_certmap support
Use certificate mapping library if available to lookup a user by
certificate in LDAP.
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
81c564a0692aa4b719af2219f52894e6cd4bdf9f |
|
23-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
LDAP: always store the certificate from the request
Store the certificate used to lookup a user as mapped attribute in the
cached user object.
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
70c0648f021ded3d31313eb962e1ad140f242673 |
|
23-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
sdap_get_users_send(): new argument mapped_attrs
mapped_attrs can be a list of sysdb_attrs which are not available on
the server side but should be store with the cached user entry. This is
needed e.g. when the input to look up the user in LDAP is not an
attribute which is stored in LDAP but some data where LDAP attributes
are extracted from. The current use case is the certificate mapping
library which can create LDAP search filters based on content of the
certificate. To allow upcoming cache lookup to use the input directly it
is stored in the user object in the cache.
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
afadeb1a530ff010a2f9a7552562576b843c874b |
|
03-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: When searching for UPNs, search either the whole DB or only the given domain
The search-by-UPN functions always searched for the whole domain. In
some cases, the caller depends on the result coming from the domain
specified by the 'domain' parameter. This is the case in the cache_req
code at least. Even though it should be safe to just switch to always
searching the whole domain, in order to allow us to examine the code
carefully and test each codepath, let's introduce a boolean option to
the search functions. Currently it defaults to false in all codepaths
and as we test the individual ones, we can flip the option to true until
we finally remove the option altogether.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
ca68b1b4ba06b1cda316ae8af470647bd7015a5a |
|
16-Jan-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
DP: Remove unused attr_type from struct dp_id_data
Structure member attr_type was set to BE_ATTR_CORE on all places
and there was a single place src/providers/ldap/ldap_id.c where
we checked to other values. It is not used anymore; it's better to
remove it.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
823d8292c4658b51821514adf21939e04b7423ed |
|
16-Jan-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: Remove unused parameter attr_type from groups_get_send
Reviewed-by: Michal Židek <mzidek@redhat.com> |
2df7a1fe47a2a4af9c83087fb9369aa28b5ce59c |
|
16-Jan-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: Removed unused attr_type from users_get_send
Reviewed-by: Michal Židek <mzidek@redhat.com> |
64344539bcda4d3c25ddc0c2d77a543345f33a77 |
|
16-Jan-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: Fix debug messages after errors in *_get_send
Reviewed-by: Michal Židek <mzidek@redhat.com> |
50a7a92f92e1584702bf25e61a50cb1c09c7e260 |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
SDAP: add enterprise principal strings for user searches
Unfortunately principal aliases with an alternative realm are stored in
IPA as the string representation of an enterprise principal, i.e.
name\@alt.realm@IPA.REALM. To be able to lookup the alternative
principal in LDAP properly the UPN search filter is extended to search
for this type of name as well.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ba9ebfc49ab3bacb96213c8620411128c09f39da |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
LDAP: include email in UPN searches
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3d29430867cf92b2d71afa95abb679711231117c |
|
15-Jul-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: rename be_acct_req to dp_id_data
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
d48036e33249ad29aad45f7de5b78532233c669e |
|
07-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
LDAP: fix typo
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
5e87a8bd1f577f503b59d35eee1443f64a74f372 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Delete cache entry if not found by UPN
Previously, the user account was only looked by name when the LDAP
provider didn't match any entry on the server side. This patch removes
the entry from the cache with the matching function, either by name or
by UPN.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
c4eb21582937362e09aa34e6a18b7f33815d4940 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Use shortname for LDAP queries
When looking up users or groups by name, we need to user the plain
username in the filter. The domain is typically signified by the search
base.
When looking up by UPN, we can keep using the raw value from the DP.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
9b29f86df7a29249ef8f485eedb8db515381c0de |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Rename DP filter value from name to filter_value
filter_value is a better name, because we don't look just by name, the
same variable is used to look up certificates etc.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
630f3ff08c1d17c7900b9bde814922f775ca2703 |
|
10-Jun-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Decorate the hot paths in the LDAP provider with systemtap probes
During performance analysis, the LDAP provider and especially its nested
group code proved to be the place where we spend the most time during
account requests. Therefore, I decorated the LDAP provider with
systemtap probes to be able to observe where the time is spent.
The code allows passing of search properties (base, filter, ...) from
marks to probes. Where applicable, the probes pass on these arguments to
functions and build a human-readable string representation.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
659232f194f83ec7c450ce89c3fd41e4e74409f2 |
|
01-Mar-2016 |
Pavel Březina <pbrezina@redhat.com> |
remove user certificate if not found on the server
If the user is not found by cert lookup when the user is already
cached, two things may happen:
1) cert was removed from the user object
2) user was removed
Instead of issuing another cert lookup we will just remove cert
attribute from the cache not touching the expiration timestamp so
the user may be updated later when needed.
Resolves:
https://fedorahosted.org/sssd/ticket/2934
Reviewed-by: Sumit Bose <sbose@redhat.com> |
a0c764a36f2f432e6063de84be6f6af7e96ec159 |
|
11-Feb-2016 |
Sumit Bose <sbose@redhat.com> |
Just return NULL if tevent_req_create() fails
In general we just return NULL if tevent_req_create() fails because
there is nothing we can do with the request anyway. Especially
tevent_req_error() should not be called because it tries to dereference
req.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
8b789d6f0a39cd497d1115203db2f1f8dc195456 |
|
12-Oct-2015 |
Pavel Reichl <preichl@redhat.com> |
LDAP: remove unused param. in sdap_fallback_local_user
Remove unused sdap_options parameter.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
890ae77c52e36f222655d710439d2fe25f15101b |
|
17-Jul-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
Update few debug messages
It reduces a noise caused by canonicalization of non-existing user.
Resolves:
https://fedorahosted.org/sssd/ticket/2678
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
1f2fc55ecf7b5e170b2c0752304d1a2ecebc5259 |
|
15-Jul-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Add sdap_lookup_type enum
Related:
https://fedorahosted.org/sssd/ticket/2553
Change the boolan parameter of sdap_get_users_send and sdap_get_groups_send
to a tri-state that controls whether we expect only a single entry
(ie don't use the paging control), multiple entries with a search limit
(wildcard request) or multiple entries with no limit (enumeration).
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
2922461ea5357f4035a5ca7bdd84013db8767376 |
|
15-Jul-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Fetch users and groups using wildcards
Related:
https://fedorahosted.org/sssd/ticket/2553
Adds handler for the BE_FILTER_WILDCARD in the LDAP provider. So far
it's the same code as if enumeration was used, so there are no limits.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
9fc96a4a2b07b92585b02dba161ab1eb2dbdad98 |
|
19-Jun-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
SDAP: Remove user from cache for missing user in LDAP
Function sysdb_get_real_name overrode reurned code LDAP
and thus user was not removed from cache after removing it from LDAP.
This patch also do not try to set initgroups flag if user
does not exist. It reduce some error message.
Resolves:
https://fedorahosted.org/sssd/ticket/2681
Reviewed-by: Michal Židek <mzidek@redhat.com> |
caacea0dbfdc92613ae992681053b1d2665b80ca |
|
19-Jun-2015 |
Sumit Bose <sbose@redhat.com> |
LDAP/IPA: add user lookup by certificate
Related to https://fedorahosted.org/sssd/ticket/2596
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
d0b7e5fcfca7d0db9e3d19be7b51f34d03d3d720 |
|
01-Jun-2015 |
Sumit Bose <sbose@redhat.com> |
ldap: use proper sysdb name in groups_by_user_done()
In a recent change set_initgroups_expire_attribute() was added to
groups_by_user_done() to make sure that the initgroups timeout is only
added to the user object until all groups added to the cache.
This change (and the original code in groups_by_user_done() as well)
didn't took sub-domain users into account where the name in sysdb might
different form the original request and the domain is not the configured
domain. This patch tries to ensure that the right name and domain are
used.
https://fedorahosted.org/sssd/ticket/2663
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
40bc389bc79bc41429b5a92d5ce75955f8eefaf5 |
|
01-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
Skip enumeration requests in IPA and AD providers as well
Checking the enum request in the underlying LDAP provider to skip it
might be too late as the richer IPA or AD providers depend on having a
useful result when the sdap request finishes.
Move the enumeration check earlier instead and allow directly in the IPA
or AD handler.
Related:
https://fedorahosted.org/sssd/ticket/2659
Reviewed-by: Sumit Bose <sbose@redhat.com> |
dca741129d221558a4325479aefc617240f1ab08 |
|
22-May-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
SDAP: Remove unnecessary argument from sdap_save_user
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
d0cc678d20d8bde829450eb50bec1b7397cea3e1 |
|
22-May-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
SDAP: Set initgroups expire attribute at the end
Initgrups consisted of two main steps:
1. store user to cache
2. store all user groups to cache.
Previously the attribute SYSDB_INITGR_EXPIRE was set in the first step.
So in case of epmty cache and parallel initgroups request in responders
there was a small period when SYSDB_INITGR_EXPIRE was valid but groups were
not cached. Therefore sometime responder could return zero supplementary
groups.
This patch moves the setting of initgroups expire attribute from 1st step
to the end of 2nd step.
In case of parallel initgroups requests in responder there are two
other ways how we could get correct results even thought there was a bug.
a) Time between two request was too small. User was not stored in cache
yet and 2nd request waited for response from DP.
b) Time between two request was big enough. All users groups were
successfully stored in cache and 2nd request returned correct results.
Resolves:
https://fedorahosted.org/sssd/ticket/2634
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
0f9c28eb52d2b45c8a97f709308dc11377831b8c |
|
06-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: allow initgroups by UUID for FreeIPA users
If a FreeIPA user is searched with the help of an override name the UUID
from the override anchor is used to search the user. Currently the
initgroups request only allows searches by SID or name. With this patch
a UUID can be used as well.
Related to https://fedorahosted.org/sssd/ticket/2642
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f70a1adbfc30b9acc302027439fb8157e0c6ea2a |
|
29-Apr-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: allow initgroups by SID for AD users
If a user from a trusted AD domain is search with the help of an
override name the SID from the override anchor is used to search the
user in AD. Currently the initgroups request only allows searches by
name. With this patch a SID can be used as well.
Resolves https://fedorahosted.org/sssd/ticket/2632
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
87f8bee53ee1b4ca87b602ff8536bc5fd5b5b595 |
|
17-Mar-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
Add missing new lines to debug messages
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
d81d8d3dc151ebc95cd0e3f3b14c1cdaa48980f1 |
|
17-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
LDAP/AD: do not resolve group members during tokenGroups request
During initgroups requests we try to avoid to resolve the complete
member list of groups if possible, e.g. if there are no nested groups.
The tokenGroups LDAP lookup return the complete list of memberships for
a user hence it is not necessary lookup the other group member and
un-roll nested groups. With this patch only the group entry is looked up
and saved as incomplete group to the cache.
This is achieved by adding a new boolean parameter no_members to
groups_get_send() and sdap_get_groups_send(). The difference to config
options like ldap_group_nesting_level = 0 or ignore_group_members is
that if no_members is set to true groups which are missing in the cache
are created a incomplete groups. As a result a request to lookup this
group will trigger a new LDAP request to resolve the group completely.
This way no information is ignored but the time needed to read all data
is better distributed between different requests.
https://fedorahosted.org/sssd/ticket/2601
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a849d848d53f305a90613a74c1767a42b250deda |
|
08-Mar-2015 |
Pavel Březina <pbrezina@redhat.com> |
sdap_handle_acct_req_send: remove be_req
be_req was used only as a talloc context for subreq. This memory context
was replace by state of the parent request which is more suitable for
tevent coding style.
This change will allow us to use this function in be_refresh where
none be_req is available.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
35808a6c8cea7baef659192dbb981872f95337ea |
|
23-Feb-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: Conditional jump depends on uninitialised value
==31767== at 0x5B66CFC: users_get_posix_check_done (ldap_id.c:346)
==31767== by 0x4DCC6AA: _tevent_req_notify_callback (tevent_req.c:112)
==31767== by 0x4DCC724: tevent_req_finish (tevent_req.c:149)
==31767== by 0x4DCC782: _tevent_req_error (tevent_req.c:167)
==31767== by 0x5B7ED43: sdap_posix_check_done (sdap_async.c:2486)
==31767== by 0x4DCC6AA: _tevent_req_notify_callback (tevent_req.c:112)
==31767== by 0x4DCC724: tevent_req_finish (tevent_req.c:149)
==31767== by 0x4DCC782: _tevent_req_error (tevent_req.c:167)
==31767== by 0x5B7DE37: sdap_get_generic_op_finished (sdap_async.c:1523)
==31767== by 0x5B7D62B: sdap_process_result (sdap_async.c:357)
==31767== by 0x4DCFC1C: tevent_common_loop_timer_delay (tevent_timed.c:341)
==31767== by 0x4DD0E12: epoll_event_loop_once (tevent_epoll.c:911)
==31767== by 0x4DCF23E: std_event_loop_once (tevent_standard.c:114)
==31767== by 0x4DCB38F: _tevent_loop_once (tevent.c:530)
==31767== by 0x4DCB58B: tevent_common_loop_wait (tevent.c:634)
==31767== by 0x4DCF1BE: std_event_loop_wait (tevent_standard.c:140)
==31767== by 0x4DCB627: _tevent_loop_wait (tevent.c:653)
==31767== by 0x489AB98: server_loop (server.c:668)
==31767== by 0x10D035: main (data_provider_be.c:2915)
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
561ed2fd03bab04cfdddbc09c4b48563c9d9b87e |
|
30-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
AD: use GC for SID requests as well
If a universal group is looked up by SID the cross-domain members must
be resolved with the help of the Global Catalog.
Related to https://fedorahosted.org/sssd/ticket/2514
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
7964d2bd7ea6a0f5bf5acdf94279d72122eca6ad |
|
20-Nov-2014 |
Sumit Bose <sbose@redhat.com> |
LDAP: add support for lookups by UUID
Related to https://fedorahosted.org/sssd/ticket/2481
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
7ba70236daccb48432350147d0560b3302518cee |
|
15-Sep-2014 |
Michal Zidek <mzidek@redhat.com> |
Use the alternative objectclass in group maps.
Use the alternative group objectclass in queries.
Fixes:
https://fedorahosted.org/sssd/ticket/2436
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
25a387c2e90c74b27a26ea207503df8e4b6a1a76 |
|
01-Sep-2014 |
Sumit Bose <sbose@redhat.com> |
LDAP: If extra_value is 'U' do a UPN search
Besides the name the responders always send an extra string attribute to
the backends which is so far mostly empty. Since the only difference in
the processing of a request for a user name or a user principal name is
a different search attribute in the LDAP provider this extra value can
be used to indicate the type of the name. Providers which do not support
UPN lookup can just ignore this attribute.
Related to https://fedorahosted.org/sssd/ticket/1749 |
ac67376a47ed52374641e7a4f6fd97712fe5171b |
|
19-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
Revert "IPA: new attribute map for non-posix groups"
This reverts commit 4c560e7b98e7ab71d22be24d2fbc468396cb634f. |
4c560e7b98e7ab71d22be24d2fbc468396cb634f |
|
19-Aug-2014 |
Pavel Reichl <preichl@redhat.com> |
IPA: new attribute map for non-posix groups
Create new set of attributes to be used when processing non-posix groups.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com> |
4ed403fe53f71059758efc48265f6239393facd0 |
|
18-Jun-2014 |
Pavel Reichl <preichl@redhat.com> |
IPA: Rename label in users_get_send/groups_get_send
Resolves:
https://fedorahosted.org/sssd/ticket/2209
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
4dd38025efda88f123eac672f87d3cda12f050c8 |
|
02-May-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Make it possible to extend an attribute map
https://fedorahosted.org/sssd/ticket/2073
This commit adds a new option ldap_user_extra_attrs that is unset by
default. When set, the option contains a list of LDAP attributes the LDAP
provider would download and store in addition to the usual set.
The list can either contain LDAP attribute names only, or colon-separated
tuples of LDAP attribute and SSSD cache attribute name. In case only LDAP
attribute name is specified, the attribute is saved to the cache verbatim.
Using a custom SSSD attribute name might be required by environments that
configure several SSSD domains with different LDAP schemas.
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
83bf46f4066e3d5e838a32357c201de9bd6ecdfd |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Update DEBUG* invocations to use new levels
Use a script to update DEBUG* macro invocations, which use literal
numbers for levels, to use bitmask macros instead:
grep -rl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e 'use strict;
use File::Slurp;
my @map=qw"
SSSDBG_FATAL_FAILURE
SSSDBG_CRIT_FAILURE
SSSDBG_OP_FAILURE
SSSDBG_MINOR_FAILURE
SSSDBG_CONF_SETTINGS
SSSDBG_FUNC_DATA
SSSDBG_TRACE_FUNC
SSSDBG_TRACE_LIBS
SSSDBG_TRACE_INTERNAL
SSSDBG_TRACE_ALL
";
my $text=read_file(\*STDIN);
my $repl;
$text=~s/
^
(
.*
\b
(DEBUG|DEBUG_PAM_DATA|DEBUG_GR_MEM)
\s*
\(\s*
)(
[0-9]
)(
\s*,
)
(
\s*
)
(
.*
)
$
/
$repl = $1.$map[$3].$4.$5.$6,
length($repl) <= 80
? $repl
: $1.$map[$3].$4."\n".(" " x length($1)).$6
/xmge;
print $text;
' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
e81deec535d11912b87954c81a1edd768c1386c9 |
|
12-Feb-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Detect the presence of POSIX attributes
When the schema is set to AD and ID mapping is not used, there is a one-time
check ran when searching for users to detect the presence of POSIX
attributes in LDAP. If this check fails, the search fails as if no entry
was found and returns a special error code.
The sdap_server_opts structure is filled every time a client connects to
a server so the posix check boolean is reset to false again on connecting
to the server.
It might be better to move the check to where the rootDSE is retrieved,
but the check depends on several features that are not known to the code
that retrieves the rootDSE (or the connection code for example) such as what
the attribute mappings are or the authentication method that should be used.
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
6095e82a99cc1c1fcac5e00f0a770302cc46eb2b |
|
24-Jan-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Don't abort request if no id mapping domain matches
If an ID was requested from the back end, but no ID mapping domain
matched, the request ended with a scary error message. It's better to
treat the request as if no such ID was found in the domain
Related:
https://fedorahosted.org/sssd/ticket/2200 |
0bdef4fb23af3def3ca9608bb4dda46de1bd9dfb |
|
27-Nov-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove unused parameter from sdap_save_user |
d115f40c7a3999e3cbe705a2ff9cf0fd493f80fb |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter - module sysdb_ops (part 2) |
4537e95f6741ae05ec620e5b46ca1d4a3a1ceae5 |
|
07-Nov-2013 |
Pavel Březina <pbrezina@redhat.com> |
free idmapped SIDs correctly
Resolves:
https://fedorahosted.org/sssd/ticket/2133 |
13db46154dc2266b897abcfebd92d05500077023 |
|
30-Oct-2013 |
Pavel Březina <pbrezina@redhat.com> |
free sid obtained from sss_idmap_unix_to_sid() |
64f615974a57e50124a7186ee8e8d14a78d3304d |
|
25-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Delete entry by SID if not found
In case the entry was deleted from the server, the search didn't notice
and kept returning the cached data. |
fdda4b659fa3be3027df91a2b053835186ec2c59 |
|
25-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
sdap_idmap_domain_has_algorithmic_mapping: add domain name argument
When libss_idmap was only used to algorithmically map a SID to a POSIX
ID a domain SID was strictly necessary and the only information needed
to find a domain.
With the introduction of external mappings there are cases where a
domain SID is not available. Currently we relied on the fact that
external mapping was always used as a default if not specific
information about the domain was found. The lead to extra CPU cycles and
potentially confusing debug messages. Adding the domain name as a search
parameter will avoid this. |
f244195582ec804f1022341e2e3394754e31b36a |
|
10-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
LDAP: handle SID requests if noexist_delete is set
Fixes https://fedorahosted.org/sssd/ticket/2116 |
d3e1d88ce7de3216a862b9fe78dc5aa94dcbc14b |
|
27-Sep-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Require ID numbers when ID mapping is off
Related: https://fedorahosted.org/sssd/ticket/2070
When searching for users and groups without the use of ID mapping, make
sure the UIDs and GIDs are included in the search. This will make the
SSSD seemigly "miss" entries when searching in Global Catalog in the
scenario where the POSIX attributes are not replicated to the GC. |
edcf38f274b5e9022d4d92d294a9267bec13b882 |
|
08-Aug-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Enable removing nonexisting dn in sdap_handle_account_info
Change was introduced in commit ca344fde |
1bb04648878b7b3e3897484e7cfc2d11725c8014 |
|
17-Jul-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: When resolving a SID, search for groups first, then users
https://fedorahosted.org/sssd/ticket/1997
Most of the time, the SIDs are resolved as a call coming from the PAC
responder during initgroups. In that case at least, it makes sense to
search for group matching that SID first, then users.
We may consider making this behaviour configurable ie for the server
mode where typically the users should be queried first. |
b56b06e199f15a8a840b36bc7cb8010e39ae761d |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Replace SDAP_ID_MAPPING checks with sdap_idmap_domain_has_algorithmic_mapping
Currently the decision if external or algorithmic mapping should be used
in the LDAP or AD provider was based on the value of the ldap_id_mapping
config option. Since now all information about ID mapping is handled by
libsss_idmap the check for this options can be replace with a call which
checks the state via libss_idmap.
https://fedorahosted.org/sssd/ticket/1961 |
3438815242464a963c0d3a70f16579723a20b52d |
|
24-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Retry SID search based on result of LDAP search, not the return code |
ca344fdecdf127c80ad1074047aeba21e1165313 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: return sdap search return code to ID
By default, the LDAP searches delete the entry from cache if it wasn't
found during a search. But if a search wants to try both Global Catalog
and LDAP, for example, it might be beneficial to have an option to only
delete the entry from cache after the last operation fails to prevent
unnecessary memberof operations for example. |
749cfb5d3270b5daf389d51a0dbd3fd2aec6e05d |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: new SDAP domain structure
Previously an sdap_id_ctx was always tied to one domain with a single
set of search bases. But with the introduction of Global Catalog
lookups, primary domain and subdomains might have different search
bases.
This patch introduces a new structure sdap_domain that contains an sssd
domain or subdomain and a set of search bases. With this patch, there is
only one sdap_domain that describes the primary domain. |
9aa117a93e315f790a1922d9ac7bd484878b621e |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Pass in a connection to ID functions
Instead of using the default connection from the sdap_id_ctx, allow the
caller to specify which connection shall be used for this particular
request. Again, no functional change is present in this patch, just
another parameter is added. |
e6e129a40e69af52a12deed91f68fff3569c51ce |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Refactor account info handler into a tevent request
The sdap account handler was a function with its own private callback
that directly called the back end handlers. This patch refactors the
handler into a new tevent request that the current sdap handler calls.
This refactoring would allow the caller to specify a custom sdap
connection for use by the handler and optionally retry the same request
with another connection inside a single per-provider handler.
No functional changes are present in this patch. |
dcb44c39dda9699cdd6488fd116a51ced0687de3 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: sdap_id_ctx might contain several connections
With some LDAP server implementations, one server might provide
different "views" of the identites on different ports. One example is
the Active Directory Global catalog. The provider would contact
different view depending on which operation it is performing and against
which SSSD domain.
At the same time, these views run on the same server, which means the same
server options, enumeration, cleanup or Kerberos service should be used.
So instead of using several different failover ports or several
instances of sdap_id_ctx, this patch introduces a new "struct
sdap_id_conn_ctx" that contains the connection cache to the particular
view and an instance of "struct sdap_options" that contains the URI.
No functional changes are present in this patch, currently all providers
use a single connection. Multiple connections will be used later in the
upcoming patches. |
154e62fc712f4c994fbc684386302edca277a99a |
|
06-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Intermittent fix for get_user_and_group_users_done
users_get_recv() never returns ENOENT. In general it should return EOK
in the case no matching user was found. But since I forget to handle a
SID based filter properly in sdap_get_users_process() an error is
returned in this case which makes get_user_and_group_users_done() work
as expected with this patch.
There is an upcoming enhancement to users_get_recv() which I'm planning
to use for a full fix. |
61e7adac8b45b7f9139e8a566af9a457a3079271 |
|
28-May-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove unneeded comment |
c89e13316166957c853ed61496a17306e59afc79 |
|
27-May-2013 |
Sumit Bose <sbose@redhat.com> |
Add SID related requests to the LDAP provider
The patch adds support for BE_REQ_BY_SECID and BE_REQ_USER_AND_GROUP to
the LDAP provider. Since the AD and the IPA provider use the same code
they support those request now as well.
Besides allowing that users and groups can be searched by the SID as
well the new request allows to search users and groups in one run, i.e.
if there is not user matching the search criteria groups are searched as
well. |
206329d3901738036352f2ac1e8d7804f728861d |
|
02-May-2013 |
Sumit Bose <sbose@redhat.com> |
Add secid filter to responder-dp protocol
This patch add a new filter type to the data-provider interface which
can be used for SID-based lookups. |
fae99bfe4bfc8b4a12e9c2a0ad01b3684c22f934 |
|
20-Mar-2013 |
Simo Sorce <simo@redhat.com> |
ldap: Fallback option for rfc2307 schema
Add option to fallback to fetch local users if rfc2307is being used.
This is useful for cases where people added local users as LDAP members
and rely on these group memberships to be maintained on the local host.
Disabled by default as it violates identity domain separation.
Ticket:
https://fedorahosted.org/sssd/ticket/1020 |
cbaba2f47da96c4191971bce86f03afb3f88864a |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_data() helper funciton.
In preparation for making struct be_req opaque. |
03abdaa21ecf562b714f204ca42379ff08626f75 |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_be_ctx() helper.
In preparation for making be_req opaque |
df0596ec12bc5091608371e2977f3111241e8caf |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove sysdb as a be context structure member
The sysdb context is already available through the 'domain' structure. |
a58ccee5afc802c7560624929614616aeefa9bd0 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_delete_group()
Also remove sysdb_delete_domgroup() |
3412d14d65490c32414e72ac20fe21bad53ceb45 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_delete_user()
Also remove sysdb_delete_domuser() |
84224fd403ac6cdec6ee2a28fb3f923855945400 |
|
05-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Fix comment on wrong line |
e11c7dc43f4ff9897e37cc0d793f8e1fb3b8453a |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Use an entry type mask macro to filter entry types
Avoids hardcoding magic numbers everywhere and self documents why a
mask is being applied. |
03b224556506601c8a29771801bc1b5e302958f9 |
|
19-Nov-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Remove double break |
59f136cd254d1acf2991c97221eb08803784777d |
|
15-Nov-2012 |
Paul B. Henson <henson@acm.org> |
Add ignore_group_members option.
https://fedorahosted.org/sssd/ticket/1376 |
41be4e3976cf66823ad2c6880671ac7fbafdc640 |
|
23-Aug-2012 |
Pavel Březina <pbrezina@redhat.com> |
Clean up cache on server reinitialization
https://fedorahosted.org/sssd/ticket/734
We successfully detect when the server is reinitialized by testing
the new lastUSN value. The maximum USN values are set to zero, but
the current cache content remains.
This patch removes records that were deleted from the server.
It uses the following approach:
1. remove entryUSN attribute from all entries
2. run enumeration
3. remove records that doesn't have entryUSN attribute updated
We don't need to do this for sudo rules, they will be refreshed
automatically during next smart/full refresh, or when an expired rule
is deleted. |
c8704f06db6dbbe39f50dfb35f20cdf27cf1f087 |
|
29-Jun-2012 |
Pavel Březina <pbrezina@redhat.com> |
ldap provider: add sudo usn value |
64ddff90c7fcc02ccb06824ac93af7d5f361a88f |
|
31-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add support for filtering atributes
This patch adds support for filtering attributes when constructing
attribute list from a map for LDAP query. |
ca4b7b92738f3dd463914e3de5757cd98d37a983 |
|
10-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add attr_count return value to build_attrs_from_map()
This is necessary because in several places in the code, we are
appending to the attrs returned from this value, and if we relied
on the map size macro, we would be appending after the NULL
terminator if one or more attributes were defined as NULL. |
c0dc67f92a4abee6bcce304117bf2a2362ad812c |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Enable looking up id-mapped groups by GID |
2aae75b167f1d9d5cf65d5529c585cfb18c6207b |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Allow looking up ID-mapped groups by name |
28f9836c888ce351400f8d1fd42eac905ce99f1d |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Enable looking up id-mapped users by UID |
e2925c2d7d10cbb51098402233784044168f1a77 |
|
31-Jan-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add enumeration support for services |
796463906a54e259bd5b582ce84af4297a58eafc |
|
31-Jan-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add support for service lookups (non-enum) |
8edf0e447266d68f10264eb3f3ea514cd1687041 |
|
19-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Pass sdap_id_ctx to online check from IPA provider |
9b9c7f8caddf2b57adfbef8741651ee5063fa3bd |
|
29-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Provide means of forcing TLS and GSSAPI enabled/disabled for sdap connections |
f4093e062cf1646b8f01d7078e63708aeb36a95d |
|
25-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix sdap_id_ctx/ipa_id_ctx mismatch in IPA provider
This was causing a segfault during HBAC processing and any ID lookups
except for netgroups |
7d9f54f5ec7c72336c4f69dbf20d55f1f64b88d2 |
|
23-Nov-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Renamed some LDAP routines
These were renamed just ot make sure they are not mistook for IPA
netgroup functions. |
1bbd4c57fc31cec302244725e698413623818d19 |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add support for multiple search bases for group enumeration |
f26b61dfe246c750a42f1f9fb28f9df5981bc841 |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add support for multiple search bases for user enumeration |
357efd33759fd1297723d9956a7f77226fe26871 |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Convert ldap_*_search_filter
Instead of making this a global option for all user lookups, make
it only used if the search base is passed without an explicit
filter. |
86e00b950eae9884702ad535e3030b238ec451e3 |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Support multiple group search bases (non-enumeration, RFC2307) |
a0e406e5219068aec1a531e2b09ee30309b266cf |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Support multiple user search bases (non-enumeration) |
95d3cb8d4ff2e3e8fdc186f2ebf617fd29ddfdec |
|
03-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use explicit base 10 for converting strings to integers
https://fedorahosted.org/sssd/ticket/1013 |
e79d23932ef9d52cf4eb32ddec2d0a9b3af9a9eb |
|
15-Aug-2011 |
Jan Zeleny <jzeleny@redhat.com> |
sysdb refactoring: memory context deleted
This patch deletes memory context parameter in those places in sysdb
where it is not necessary. The code using modified functions has been
updated. Tests updated as well. |
8a1738f9379a1b8fb5c95c3df649e014ff5a1434 |
|
15-Aug-2011 |
Jan Zeleny <jzeleny@redhat.com> |
sysdb refactoring: deleted domain variables in sysdb API
The patch also updates code using modified functions. Tests have also
been adjusted. |
86d77907310fa939fe89884fbbdf2142c06a420e |
|
04-Aug-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix returning groups when gidNumber attribute is not ordered
https://fedorahosted.org/sssd/ticket/951 |
804dc66b3a646938167ddeb34b011f3f3b6dfebc |
|
27-Jul-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Explicitly ignore groups with gidNumber=0
https://fedorahosted.org/sssd/ticket/916 |
772764e048dcd15c6d9732574126eb83b53a60e2 |
|
04-May-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Fixed lastUSN checking improvements
This patch fixes some issues with setting lastUSN attribute and it adds
check against the highest user/group USN after enumeration to keep
better track of the real highest USN. Optimal solution here would be to
schedule a check of rootDSE entry right after the enumeration finishes,
but for the moment this is good enough. |
743475e5d730f1438bff4bb086600186adfe8311 |
|
19-Apr-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Add last usn checking after reconnection
When reconnecting to the LDAP server supporting USNs (either because of new incomming
id operation or invokation of callback responsible for checking status
of the backend), detect whether the highest USN is lower than the one
SSSD has recorded. If so, setup enumeration/cleanup to refresh
potentionally changed account information in the SSSD cache.
Related ticket:
https://fedorahosted.org/sssd/ticket/734 |
361b29ff4cc0eac948074cb0f54fdc7bd556a1b6 |
|
19-Apr-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Add user and group search LDAP filter options
https://fedorahosted.org/sssd/ticket/647 |
6b608e6fc8ae5b4623a924a00fa5e4dfde3e57c2 |
|
15-Apr-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Do not throw a DP error when failing to delete a nonexistent entity |
0112cf9f4a48494f1527018f86f762f2aff63f07 |
|
14-Mar-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Require existence of GID number and name in group searches
https://fedorahosted.org/sssd/ticket/824 |
ecb98fdf587e435c8e498e2e585e89f3fb8b2f35 |
|
18-Feb-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Remove cached user entry if initgroups returns ENOENT
This behavior was present for getpwnam() but was lacking for
initgroups. |
3ad662a4d26c0d6ee4e382758ca7b3f0c2880d20 |
|
21-Jan-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Add the user's primary group to the initgroups lookup
The user may not be a direct member of their primary group, but
we still want to make sure that group is cached on the system. |
a530a96721d8106a6839b6b643b0abc5d7a7b9e0 |
|
17-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Add timeout parameter to sdap_get_generic_send() |
1d9eec9e868fbc2d996f1030a43675be9a840133 |
|
07-Dec-2010 |
Simo Sorce <ssorce@redhat.com> |
ldap: add checks to determine if USN features are available. |
d1571f8c173ca9172fa295e6aac48b8c0c367950 |
|
02-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add a special filter type to handle enumerations |
d8e3d9b5fb5f269ef7a0cf4b70f3ba4c8051429c |
|
01-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add check_online method to LDAP ID provider |
85e8cbdd79359ae1f330c8b84f7b58d4fc6fda6e |
|
15-Nov-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Sanitize search filters in LDAP provider |
580374daba2ab2c6075a7d0de9512abff133e2e9 |
|
26-Oct-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Always use uint32_t for UID/GID numbers |
27c67307976a60088ca301e07404bdb52740c3af |
|
18-Oct-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Use unsigned long for conversion to id_t
We used strtol() on a number of places to convert into uid_t or gid_t
from a string representation such as LDAP attribute, but on some
platforms, unsigned long might be necessary to store big id_t values.
This patch converts to using strtoul() instead. |
619bd403265ce0880989ba6f8324b010949851bc |
|
13-Oct-2010 |
Sumit Bose <sbose@redhat.com> |
Implement netgroup support for LDAP provider |
7fce06bb1a855126e41042e0dc22bf2b2d6cec28 |
|
22-Sep-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Request all group attributes during initgroups processing
We tried to be too clever and only requested the name of the group,
but we require the objectClass to validate the results.
https://fedorahosted.org/sssd/ticket/622 |
6c121f20f50158cdc58c0ac3c712f9ffc7540aef |
|
09-Jul-2010 |
eindenbom <eindenbom@gmail.com> |
Use new LDAP connection framework to get user account groups from LDAP. |
eef6302a20f9ddac77cf00f48ee68a5daacd6eb6 |
|
09-Jul-2010 |
eindenbom <eindenbom@gmail.com> |
Use new LDAP connection framework to get group account info from LDAP. |
bb6634510bbbb4a5499fb4aa8b4a3cba6f9f6bc8 |
|
09-Jul-2010 |
eindenbom <eindenbom@gmail.com> |
Use new LDAP connection framework to get user account info from LDAP. |
9e99e3c5c45b20189e76e4d2546966ff1fb3ce40 |
|
07-May-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Fix segfault in GSSAPI reconnect code
Also clean up some duplicated code into a single common routine
sdap_account_info_common_done() |
270a0a1b6182ef1fbff2a93af6731788cf954874 |
|
03-May-2010 |
Simo Sorce <ssorce@redhat.com> |
Better handle sdap_handle memory from callers.
Always just mark the sdap_handle as not connected and let later _send()
functions to take care of freeing the handle before reconnecting.
Introduce restart functions to avoid calling _send() functions in _done()
functions error paths as this would have the same effect as directly freeing
the sdap_handle and cause access to freed memory in sdap_handle_release()
By freeing sdap_handle only in the connection _recv() function we
guarantee it can never be done within sdap_handle_release() but only
in a following event. |
3b3dc1a8ad19100951d19abe4038791f01faa0b7 |
|
12-Apr-2010 |
Simo Sorce <ssorce@redhat.com> |
sysdb: delete sysdb_delete_group |
ed80c73efa51780a39dfc9c72821cf88e95d264c |
|
12-Apr-2010 |
Simo Sorce <ssorce@redhat.com> |
sysdb: convert sysdb_delete_user |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |