d2633d922eeed68f92be4248b9172b928c189920 |
|
25-Apr-2018 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Augment the sdap_opts structure with a data provider pointer
In order to be able to use the Data Provider methods from the SDAP code
to e.g. invalidate memcache when needed, add a new field to the
sdap_options structure with the data_provider structure pointer.
Fill the pointer value for all LDAP-based providers.
Related:
https://pagure.io/SSSD/sssd/issue/2653
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
60a715a0dd79873d2d2607eab8fdfaf0ffd2e7d3 |
|
09-Feb-2018 |
Hristo Venev <hristo@venev.name> |
providers: Move hostid from ipa to sdap, v2
In the ldap provider, all option names are renamed to ldap_host_*. In
the ipa provider the names haven't been changed.
Host lookups for both ipa and ldap are handled in the ldap provider.
sss_ssh_knownhostsproxy works but hostgroups are still only available
in the ipa provider.
I've also added some documentation for the ldap provider.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c0f9f5a0f6d71a1596ee3cef549b4b02295313c3 |
|
06-Dec-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
DP: Create a new handler function getAccountDomain()
Adds a new method getAccountDomain() which is a bit similar to
getAccountInfo, except it doesn't fetch, parse and store the entry, but
just returns the domain or a subdomain the entry was found in.
At the moment, the method only supports requests by ID.
A default handler is provided (and in this patch used by all the
domains) which returns ERR_GET_ACCT_DOM_NOT_SUPPORTED. This return
code should be evaluated by the responder so that this DP method is
not called again, because it's not supported by the back end type.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com> |
f34a8330c1615511795847b0a1454249d782db2a |
|
19-Oct-2017 |
Alexey Kamenskiy <alexey.kamenskiy@chinanetcloud.com> |
LDAP: Add support for rhost access control
This patch implements verification of pam_rhost against
rules stored in LDAP entry of a user.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
3d29430867cf92b2d71afa95abb679711231117c |
|
15-Jul-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: rename be_acct_req to dp_id_data
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
50c2a57dea6d38a4f6753a917a5d745b07036325 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
Rename dp_refresh.h to be_refresh.h
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
17531a398cc9084036cb08d69fe876a8f12707bb |
|
08-Mar-2015 |
Pavel Březina <pbrezina@redhat.com> |
be_refresh: add sdap_refresh_init
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
13ec767e6ca3e435e119f1f07bda10eb213383f6 |
|
05-Mar-2015 |
Pavel Reichl <preichl@redhat.com> |
SDAP: Lock out ssh keys when account naturally expires
Resolves:
https://fedorahosted.org/sssd/ticket/2534
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c9b0071bfcb8eb8c71e40248de46d23aceecc0f3 |
|
03-Mar-2015 |
Pavel Reichl <preichl@redhat.com> |
SDAP: enable change phase of pw expire policy check
Implement new option which does checking password expiration policy
in accounting phase.
This allows SSSD to issue shadow expiration warning even if alternate
authentication method is used.
Resolves:
https://fedorahosted.org/sssd/ticket/2167
Reviewed-by: Sumit Bose <sbose@redhat.com> |
2a91d3dd0ce4387332db27bd1a0c0005c74f870e |
|
27-Aug-2014 |
Pavel Reichl <preichl@redhat.com> |
SDAP: account lockout to restrict access via ssh key
Be able to configure sssd to honor openldap account lock to restrict
access via ssh key. Introduce new ldap_access_order value ('lock')
for enabling/disabling this feature.
Account is considered locked if pwdAccountLockedTime attribut has value
of 000001010000Z.
------------------------------------------------------------------------
Quotation from man slapo-ppolicy:
pwdAccountLockedTime
This attribute contains the time that the user's account was locked. If
the account has been locked, the password may no longer be used to
authenticate the user to the directory. If pwdAccountLockedTime is set
to 000001010000Z, the user's account has been permanently locked and
may only be unlocked by an administrator. Note that account locking
only takes effect when the pwdLockout password policy attribute is set
to "TRUE".
------------------------------------------------------------------------
Also set default value for sdap_pwdlockout_dn to
cn=ppolicy,ou=policies,${search_base}
Resolves:
https://fedorahosted.org/sssd/ticket/2364
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
057cb583f02bf47678c393cb8f1f74861c2b960b |
|
26-Feb-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: Setup periodic task only once.
If id provider is {ipa, ad} periodic task will be stared in sssm_{ipa,ad}_init
If you enable enumeration and use different providers for id and sudo(autofs)
then another periodic task will be scheduled.
This can cause weird behaviour (e.g. missing members of group)
Perodic tasks will be started only by id_provider.
Resolves:
https://fedorahosted.org/sssd/ticket/2153
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
83bf46f4066e3d5e838a32357c201de9bd6ecdfd |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Update DEBUG* invocations to use new levels
Use a script to update DEBUG* macro invocations, which use literal
numbers for levels, to use bitmask macros instead:
grep -rl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e 'use strict;
use File::Slurp;
my @map=qw"
SSSDBG_FATAL_FAILURE
SSSDBG_CRIT_FAILURE
SSSDBG_OP_FAILURE
SSSDBG_MINOR_FAILURE
SSSDBG_CONF_SETTINGS
SSSDBG_FUNC_DATA
SSSDBG_TRACE_FUNC
SSSDBG_TRACE_LIBS
SSSDBG_TRACE_INTERNAL
SSSDBG_TRACE_ALL
";
my $text=read_file(\*STDIN);
my $repl;
$text=~s/
^
(
.*
\b
(DEBUG|DEBUG_PAM_DATA|DEBUG_GR_MEM)
\s*
\(\s*
)(
[0-9]
)(
\s*,
)
(
\s*
)
(
.*
)
$
/
$repl = $1.$map[$3].$4.$5.$6,
length($repl) <= 80
? $repl
: $1.$map[$3].$4."\n".(" " x length($1)).$6
/xmge;
print $text;
' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a7767459b4c7fea7022db0f468730ba3fceec679 |
|
14-Nov-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: Prevent from using uninitialized sdap_options
ldap_get_options can fail in time of ldap back end initialisation
and then sssd try to release uninitialised sdap_options.
Resolves:
https://fedorahosted.org/sssd/ticket/2147 |
efe6b4a9d374339cac2528cdeb43720957c6b7c9 |
|
25-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Use the ad_access_filter if it's set
Related:
https://fedorahosted.org/sssd/ticket/2082
Currently the AD access control only checks if an account has been
expired. This patch amends the logic so that if ad_access_filter is set,
it is used automatically. |
1c4144a6ce68dbd54c7c08a517d1f982ea57f19a |
|
28-Aug-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Make sdap_id_setup_tasks reusable for subdomains
Instead of always performing the setup for the main domain, the setup
can now be performed for subdomains as well. |
7b5e7e539ae9312ab55d75aa94feaad549b2a708 |
|
10-Jun-2013 |
Pavel Březina <pbrezina@redhat.com> |
providers: refresh expired netgroups
https://fedorahosted.org/sssd/ticket/1713 |
749cfb5d3270b5daf389d51a0dbd3fd2aec6e05d |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: new SDAP domain structure
Previously an sdap_id_ctx was always tied to one domain with a single
set of search bases. But with the introduction of Global Catalog
lookups, primary domain and subdomains might have different search
bases.
This patch introduces a new structure sdap_domain that contains an sssd
domain or subdomain and a set of search bases. With this patch, there is
only one sdap_domain that describes the primary domain. |
dcb44c39dda9699cdd6488fd116a51ced0687de3 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: sdap_id_ctx might contain several connections
With some LDAP server implementations, one server might provide
different "views" of the identites on different ports. One example is
the Active Directory Global catalog. The provider would contact
different view depending on which operation it is performing and against
which SSSD domain.
At the same time, these views run on the same server, which means the same
server options, enumeration, cleanup or Kerberos service should be used.
So instead of using several different failover ports or several
instances of sdap_id_ctx, this patch introduces a new "struct
sdap_id_conn_ctx" that contains the connection cache to the particular
view and an instance of "struct sdap_options" that contains the URI.
No functional changes are present in this patch, currently all providers
use a single connection. Multiple connections will be used later in the
upcoming patches. |
eb64d3406c15dcc5cb42c94488737bdbb9a15655 |
|
20-May-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove unneeded parameter of setup_child and namespace it
setup_child() was accepting a parameter it didn't use. Also the function
name was too generic, so I added a sdap prefix. |
7486dea9f5f7b2a6fbbacc6db740a82140b6377c |
|
20-May-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fixing critical format string issues.
--missing arguments.
--format '%s', but argument is integer.
--wrong format string, examle: '%\n' |
392dce02615e446b3c73dfb8b4e0a19ebb86f914 |
|
13-May-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Always initialize idmap object
https://fedorahosted.org/sssd/ticket/1922
Since we always store the SID now, we need to always initialize the ID
mapping object in LDAP provider as well. Some users might want to
configure the LDAP provider with ID mapping, not the AD provider itself. |
1abdf56dcda5f6bed7b144e544c00dbdd501b3fc |
|
10-Apr-2013 |
Pavel Březina <pbrezina@redhat.com> |
DNS sites support - use SRV DNS lookup plugin in all providers
https://fedorahosted.org/sssd/ticket/1032
We set a plugin during an initialization of ID provider, which
is an authoritative provider for a plugin choice. The plugin is
set only once. When other provider is initalized (e.g. id = IPA,
sudo = LDAP), we do not overwrite the plugin.
Since sssm_*_id_init() is called from all module constructors,
this patch relies on the fact, that ID provider is initialized
before all other providers. |
19b16ff743afa45653a43bb3f4b5dd923d1db811 |
|
14-Jan-2013 |
Pavel Březina <pbrezina@redhat.com> |
let ldap_backup_chpass_uri work
https://fedorahosted.org/sssd/ticket/1760 |
04759b59e71c78ab23b84d13dd29d9c6dd680adb |
|
02-Jan-2013 |
Michal Zidek <mzidek@redhat.com> |
failover: Protect against empty host names
Added new parameter to split_on_separator that allows to skip
empty values.
The whole function was rewritten. Unit test case was added to
check the new implementation.
https://fedorahosted.org/sssd/ticket/1484 |
f6cd1236c27817b97db002094b76648d92b55f82 |
|
01-Aug-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Primary server support: new option in ldap provider
This patch adds support for new config option ldap_backup_uri. The
description of this option's functionality is included in man page in
previous patch. |
d7e3035f018828fcd41b0cc1c0012fab6012f782 |
|
01-Aug-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Primary server support: LDAP adaptation
This patch adds support for the primary server functionality into LDAP
provider. No backup servers are added at the moment, just the basic
support is in place. |
387349ae092f6dbeb8e4bca291a772695836629c |
|
20-Jun-2012 |
Stef Walter <stefw@gnome.org> |
Move some debug lines to new debug log levels
* These are common lines of debug output when starting
up sssd
https://bugzilla.redhat.com/show_bug.cgi?id=811113 |
d0a10e530823d6d8eff31ef164eee9ba2fb71c63 |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Initialize ID mapping when configured |
8a36504008872f03d1b1ca980adeceba28c331f5 |
|
06-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Do not call sudo functions if built without-sudo |
cc84fd46f356c4a36a721ab135a33ec77c93e34d |
|
06-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
AUTOFS: LDAP provider |
5d00ee0e07dea78806df780db69e94900e5bb8c0 |
|
04-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Move BUILD_SUDO outside the generic LDAP source files
Avoid #ifdefs in the general part of the code |
eb54e05c9658a7274e3238813c54dd0c6577d3ec |
|
17-Jan-2012 |
Pavel Březina <pbrezina@redhat.com> |
SUDO Integration - periodical update of rules in data provider
https://fedorahosted.org/sssd/ticket/1110
Adds new configuration options:
- ldap_sudo_refresh_enabled - enable/disable periodical updates
- ldap_sudo_refresh_timeout - rules timeout (refresh period) |
87c07559af5cfcd2752295ef7c425bd3205f426f |
|
19-Dec-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Move child_common routines to util |
e9eeb4302e0e426c6cc1a4e65b95a6f7066e80b9 |
|
16-Dec-2011 |
Pavel Březina <pbrezina@redhat.com> |
SUDO integration - LDAP provider |
4d4c5aa6285aa055a4ec780ba47c180106f0926b |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Fix size return for split_on_separator()
It was returning the size of the array, rather than the number of
elements. (The array was NULL-terminated). This argument was only
used in one place that was actually working around this odd return
value. |
37e7e93f1996cf50677cf59fd8af6938dd5d85b2 |
|
08-Jul-2011 |
Sumit Bose <sbose@redhat.com> |
Add LDAP access control based on NDS attributes |
3612c73e7957721bcbf31d0118e2ac210eb46b88 |
|
24-Mar-2011 |
Pierre Ossman <pierre@ossman.eu> |
Add host access control support
https://fedorahosted.org/sssd/ticket/746 |
d73fcc5183a676aed4fd040714b87274248b784c |
|
19-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Add LDAP expire policy base RHDS/IPA attribute
The attribute nsAccountLock is used by RHDS, IPA and other directory
servers to indicate that the account is locked. |
22f4c1b86dcf5589e63f2ae043dc65a8f72f6f18 |
|
19-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Add LDAP expire policy based on AD attributes
The second bit of userAccountControl is used to determine if the account
is enabled or disabled. accountExpires is checked to see if the account
is expired. |
2a2f642aae37e3f41cbbda162a74c2b946a4521f |
|
21-Dec-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add authorizedService support
https://fedorahosted.org/sssd/ticket/670 |
cc1e7b31fdb64025aa9c29a1426651df0b332769 |
|
20-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Avoid multiple initializations in LDAP provider
Currently in a domain where LDAP was used for id and auth the LDAP UIR
was added multiple times to the failover code which may cause unwanted
delays. |
cf1cf7b96d38c8b481a90d800cf53546ac15ce8a |
|
07-Dec-2010 |
Simo Sorce <ssorce@redhat.com> |
Pass sdap_id_ctx in sdap_id_op functions. |
33b8fa8693df109fb33b6051bb29cb0cf5bc4d19 |
|
06-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add ldap_chpass_uri config option |
32266b2c1c6b8bf95f3ba8fd7f3ff2ef63d8fb9a |
|
06-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add new account expired rule to LDAP access provider
Two new options are added to the LDAP access provider to allow a broader
range of access control rules to be evaluated.
'ldap_access_order' makes it possible to run more than one rule. To keep
compatibility with older versions the default is 'filter'. This patch
adds a new rule 'expire'.
'ldap_account_expire_policy' specifies which LDAP attribute should be
used to determine if an account is expired or not. Currently only
'shadow' is supported which evaluates the ldap_user_shadow_expire
attribute. |
d8e3d9b5fb5f269ef7a0cf4b70f3ba4c8051429c |
|
01-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add check_online method to LDAP ID provider |
6a195bd7126020d42f89a6a97c56c15f47debb2e |
|
15-Oct-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Check for GSSAPI before attempting to kinit |
93109c5f1d85c028ce5cf6e31e2249ca90a7f746 |
|
13-Oct-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Initialize kerberos service for GSSAPI |
09c170c5b5cf0d62e7302ef284a1e35072ef1d95 |
|
09-Jul-2010 |
eindenbom <eindenbom@gmail.com> |
Remove remainder of now unused global LDAP connection handle. |
2d7a7b0140a4d3fcef9148900276e24f82e33866 |
|
09-Jul-2010 |
eindenbom <eindenbom@gmail.com> |
LDAP connection usage tracking, sharing and failover retry framework. |
f519b2ed74ca000b80c77dfccfe9a5caffb0010a |
|
14-Jun-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Don't segfault if ldap_access_filter is unspecified
https://fedorahosted.org/sssd/ticket/539 |
a6dbe52dc824f8338d209ef5c56f9e345aeeb2fe |
|
09-Jun-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Allow ldap_access_filter values wrapped in parentheses |
2892c3c025882d63559a3adc06f62c2ca4e4c55a |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Fix check if LDAP id provider is already initialized |
35480afaefafb77b28d35b29039989ab888aafe9 |
|
27-May-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add ldap_access_filter option
This option (applicable to access_provider=ldap) allows the admin
to set an additional LDAP search filter that must match in order
for a user to be granted access to the system.
Common examples for this would be limiting access to users by in a
particular group, for example:
ldap_access_filter = memberOf=cn=access_group,ou=Groups,dc=example,dc=com |
8bb6aa3fd81a3c195b92270ddf189296abae65eb |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add offline callback to disconnect global SDAP handle |
66da80489c0114878043b40592c5f47d41eb0ffd |
|
07-May-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Use service discovery in backends
Integrate the failover improvements with our back ends. The DNS domain
used in the SRV query is always the SSSD domain name.
Please note that this patch changes the default value of ldap_uri from
"ldap://localhost" to "NULL" in order to use service discovery with no
server set. |
264be69c7615a1f65a21805b95a9dbd2736d1fb4 |
|
16-Apr-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Make ID provider init functions clearer
Using sssm_*_init() as the name of the initialization function for
identity providers was a holdover from earlier development when we
thought we would only have a single "provider" entry in the config
file.
As we have now separated out the initialization functions for
auth, chpass and access, we should rename sssm_*_init() to
sssm_*_id_init() for a cleaner interface. |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |