e32e17d04c796b37bc3f4cde58106d54ffa2b6d1 |
|
13-Mar-2018 |
Justin Stephenson <jstephen@redhat.com> |
DEBUG: Print simple allow and deny lists
For debug purposes, print the simple allow and deny users/groups lists
when a sufficient log debug level is set.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c777f575b0ec0c48ce3b85ea2c5cc298db02450e |
|
10-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
SIMPLE: Make the DP handlers testable
To make it possible to call the whole DP handler in the unit test, not
just the evaluator part.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
79ac0e8a4840202c3615d6ce6584df3c08efb594 |
|
10-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
SIMPLE: Fail on any error parsing the access control list
Luckily this error was hidden by the fact that SSSD didn't start at all
when an unparseable name was encountered after startup. Otherwise, this
would have been a security issue.
Nonetheless, we should just fail and deny access if we can't parse a
name in a simple access list.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
d2902de03738a3018445698650d8b974ae3cf230 |
|
10-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
SIMPLE: Do not parse names on startup
It's not required to parse names on SSSD startup in the simple access
provider. We can instead just parse the name when the access request is
processed.
Resolves:
https://fedorahosted.org/sssd/ticket/3101
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
eef359b508b898ae99d2bf292a43f0f295a2ba5e |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
SIMPLE: Make the simple access provider work with qualified names
This patch adds a behaviour change to the simple access provider - the
simple access list is parsed on the access check itself, which is when
the name contexts of all domains have already been established and we
are already able to parse the names in the config files with
sss_parse_names. We need to support "input names" in the simple access
provider because it needs to support flat names which rely on knowing
the details about a domain.
The simple_access_obtain_filter_lists is intentionally made non-static
in order to be called from tests which initialize the name contexts on
their own.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
cc2d77d5218c188119fa954c856e858cbde76947 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
Rename dp_backend.h to backend.h
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a620742bffad5ef92597b6a25401f6d5c217afa9 |
|
15-Jan-2014 |
Pavel Reichl <pavel.reichl@redhat.com> |
simple access: refresh master domain info
To correctly decide if an object is a member of the main sssd domain, a flat name
is needed. However, the information may not be available when the module is
inited so it may be necessary to refresh this data later while processing a
request.
Resolves:
https://fedorahosted.org/sssd/ticket/2189 |
eb2ec2c35742caf164b49b660b5045d08cac7623 |
|
15-Jan-2014 |
Pavel Reichl <pavel.reichl@redhat.com> |
simple access: match objects using flat name
Use flat name to recognise users and groups belonging to main sssd domain.
Resolves:
https://fedorahosted.org/sssd/ticket/2189 |
721241198c369596c4f13445c70f227b199fdcd0 |
|
17-Sep-2013 |
Pavel Březina <pbrezina@redhat.com> |
simple provider: support subdomain users
Resolves:
https://fedorahosted.org/sssd/ticket/2034 |
ffb83ee934f6ea1d9077ab601530436eff2d20e4 |
|
07-Aug-2013 |
Pavel Březina <pbrezina@redhat.com> |
simple access provider: allow fully qualified names
https://fedorahosted.org/sssd/ticket/2026 |
c0bca1722d6f9dfb654ad78397be70f79ff39af1 |
|
19-Mar-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Resolve GIDs in the simple access provider
Changes the simple access provider's interface to be asynchronous. When
the simple access provider encounters a group that has gid, but no
meaningful name, it attempts to resolve the name using the
be_file_account_request function.
Some providers (like the AD provider) might perform initgroups
without resolving the group names. In order for the simple access
provider to work correctly, we need to resolve the groups before
performing the access check. In AD provider, the situation is
even more tricky b/c the groups HAVE name, but their name
attribute is set to SID and they are set as non-POSIX |
cbaba2f47da96c4191971bce86f03afb3f88864a |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_data() helper funciton.
In preparation for making struct be_req opaque. |
03abdaa21ecf562b714f204ca42379ff08626f75 |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_be_ctx() helper.
In preparation for making be_req opaque |
8e5549e453558d4bebdec333a93e215d5d6ffaec |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Introduce be_req_terminate() helper
Call it everywhere instead of directly dereferencing be_req->fn
This is in preparation of making be_req opaque. |
225d845476b6136be9b77f528ed986bba7a7f732 |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Split simple_access_check function out
Need to split out the function or new additions to the handler funtion will not
allow simple access tests to compile anymore. |
df0596ec12bc5091608371e2977f3111241e8caf |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove sysdb as a be context structure member
The sysdb context is already available through the 'domain' structure. |
5d72a91a37273c8c874640906fd2f7a70e606812 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain to sysdb_search_group_by_gid()
Also remove unused sysdb_search_domgroup_by_gid() |
2ce00e0d3896bb42db169d1e79553a81ca837a22 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain to sysdb_search_user_by_name()
Also remove unused sysdb_search_domuser_by_name() |
387349ae092f6dbeb8e4bca291a772695836629c |
|
20-Jun-2012 |
Stef Walter <stefw@gnome.org> |
Move some debug lines to new debug log levels
* These are common lines of debug output when starting
up sssd
https://bugzilla.redhat.com/show_bug.cgi?id=811113 |
2b4332767d299263a288e0a74bbfbc9de674de95 |
|
21-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Make the string_equal() function public |
c8119652b17229a5aca9b110365c310a6afdce30 |
|
16-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use the case sensitivity flag in the simple access provider |
8a1738f9379a1b8fb5c95c3df649e014ff5a1434 |
|
15-Aug-2011 |
Jan Zeleny <jzeleny@redhat.com> |
sysdb refactoring: deleted domain variables in sysdb API
The patch also updates code using modified functions. Tests have also
been adjusted. |
2ffb41c6a16892fccc39fcae7f203bccb8c72dfc |
|
27-Apr-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
simple provider: Don't treat primary GID lookup failures as fatal |
1b474ef7011f4bf9ce4aac85dbc9827a9486d5eb |
|
13-Dec-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add group support to the simple access provider
This patch adds simple_allow_groups and simple_deny_groups options
to the simple access provider. It makes it possible to grant or
deny access based on a user's group memberships within the domain.
This patch makes one minor change to previous functionality: now
all deny rules will supersede allow rules. Previously, if both
simple_allow_users and simple_deny_users were set with the same
value, the allow would win.
https://fedorahosted.org/sssd/ticket/440 |
16ac0d6e148b1e07e579d47de1da7ac541447bd2 |
|
08-Mar-2010 |
Sumit Bose <sbose@redhat.com> |
Add simple access provider |