History log of /sssd-io/src/responder/secrets/local.c
Revision Date Author Comments Expand
677a31351c80453d9ce006481364399a96312052 29-Jan-2018 René Genz <liebundartig@freenet.de>

Fix minor spelling mistakes in responder/* Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

/sssd-io/src/responder/autofs/autofssrv.c /sssd-io/src/responder/common/cache_req/cache_req_plugin.h /sssd-io/src/responder/common/negcache.c /sssd-io/src/responder/common/negcache.h /sssd-io/src/responder/common/responder_common.c /sssd-io/src/responder/common/responder_dp.c /sssd-io/src/responder/common/responder_get_domains.c /sssd-io/src/responder/ifp/ifpsrv.c /sssd-io/src/responder/kcm/kcm.c /sssd-io/src/responder/nss/nss_iface.c /sssd-io/src/responder/nss/nss_protocol_grent.c /sssd-io/src/responder/nss/nsssrv.c /sssd-io/src/responder/nss/nsssrv_mmap_cache.c /sssd-io/src/responder/pac/pacsrv.c /sssd-io/src/responder/pam/pam_LOCAL_domain.c /sssd-io/src/responder/pam/pamsrv.c /sssd-io/src/responder/pam/pamsrv_cmd.c /sssd-io/src/responder/pam/pamsrv_p11.c local.c providers.c secsrv.c /sssd-io/src/responder/ssh/sshsrv.c /sssd-io/src/responder/sudo/sudosrv.c
109ed7ca1a82420798efdc6a9b019675a5bd0f4f 01-Sep-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Support 0 as unlimited for the quotas Add a special value for all the quota-like settings that means 'no limit'. Because the responder also had a global limit on the size of the accepted body (64kiB), this patch also removes the hardcoded limit and instead keep track of the biggest quota value on startup. Reviewed-by: Simo Sorce <simo@redhat.com> Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

6b3bab516355fdf4cc81e6da9d87ec3818ab190f 01-Sep-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Add a new option to control per-UID limits Adds a new option max_uid_secrets that allows to set a limit of secrets for this particular client so that the user cannot starve other users. Resolves: https://pagure.io/SSSD/sssd/issue/3363 Reviewed-by: Simo Sorce <simo@redhat.com> Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

197da163943868216f704fb34031e7d5576e8aee 01-Sep-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Use separate quotas for /kcm and /secrets hives This would differentiate between out-of-capacity errors for secrets and for KCM as they are two independent trees as far as sssd-secrets is concerned. The quotas for /kcm are also different in their defaults. For the /secrets hive, we presume a large amount of small secrets. For the /kcm hive, we presume a small amount of large secrets, because the secret is a ccache which contains multiple credentials. The operations are also passed in a struct quota from the local request context instead of local_context. The quota is assigned to the request context when the hive is selected. Reviewed-by: Simo Sorce <simo@redhat.com> Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

392f48c039d7a6d70bce6ae2d122042391653566 01-Sep-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Rename local_db_req.basedn to local_db_req.req_dn This will make it possible to reuse the basedn name later for the "hive" base DN in order to differentiate quotas for different hives. There is no functional change in this patch. Reviewed-by: Simo Sorce <simo@redhat.com> Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

7a162ca3ea0bf8ef6b13795a00baa28d17f6131d 01-Sep-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Store quotas in a per-hive configuration structure Adds two new structures to hold the quotas and associate a quota with a hive. This is just an internal change for now, but will allow us to read quota configuration from per-hive sections later. Reviewed-by: Simo Sorce <simo@redhat.com> Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

8890a30f5d054187fd7d5b50503f82a49cd025f0 08-Jun-2017 Lukas Slebodnik <lslebodn@redhat.com>

UTIL: Remove fcntl.h from util/util.h fcntl.h is not used directly by util/util.h. The header file fcntl.h must be included in 49 files and after removing it from util.h it had to be added only to 7 missing file which were using either directly syscall fcntl or syscall open. Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

60612b5fbdaaa62ebe6c7f4c27200316f08506d6 27-Mar-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Store ccaches in secrets for the KCM responder Adds a new "hive" to the secrets responder whose base path is /kcm. Only root can contact the /kcm hive, because the KCM responder only runs as root and it must impersonate other users and store ccaches on their behalf. Reviewed-by: Michal Židek <mzidek@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com>

73ce539aa70f43ccd5302b3ef8a02ff028558b12 27-Mar-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Return a nicer error message on request with no PUT data I managed to create this pathological situation with the tcurl tool which didn't send any PUT data. The error in sssd-secrets was quite strange (ENOMEM). This patch just adds a safeguard sooner so that we return a graceful error. Reviewed-by: Michal Židek <mzidek@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com>

8bb2fcbce7c3fcfd986f1bc835fbcc43ac7cd9d1 27-Mar-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Create DB path before the operation itself This is a refactoring where instead of creating the ldb path in the operation itself, we create the ldb path when creating the local db request and pass the path to the operation. This would allow us to store different kind of objects in the secrets storage later. Reviewed-by: Michal Židek <mzidek@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com>

7171a7584dda534dde5409f3e7f4657e845ece15 24-Nov-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Add configurable payload size limit of a secret Resolves: https://fedorahosted.org/sssd/ticket/3169 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

65a38b8c9cabde6c46cc0e9868f54cb9bb10afbf 05-Oct-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Add a configurable limit of secrets that can be stored Related: https://fedorahosted.org/sssd/ticket/3169 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

7128fadade544efcd86b113a5090b00d20993671 04-Oct-2016 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Add DEBUG messages to the sssd-secrets provider Previously, it was not possible to follow the flow of the secrets responder or find out what went wrong on error. This patch adds DEBUG messages so that most failure cases have their own message. At the same time, running sssd-secrets with debug_level <= 3 does not emit any messages at all. Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

efc65e78fa4e01e6cecc8690a9899af61213be62 03-Oct-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Add a configurable depth limit for nested containers Resolves: https://fedorahosted.org/sssd/ticket/3168 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

d806427f200dc1ffd44d37724eb40125af5cc8c2 03-Oct-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Use a tmp_context on local_db_check_containers() Otherwise the struct ldb_dn will be hanging on the mem_ctx till it gets freed. Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

f35f4e4c8bd5b834504c0554552d78db3624706a 03-Oct-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Make functions from local.c static There's no reason for those functions to be exposed. Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

ab7b33fd7d820688545d5994a402cedf4bcdb6e1 16-Sep-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Don't remove a container when it has children Let's return and log an error in case the container to be removed has children. The approach taken introduced at least one new search in every delete operation. As far as I understand searching in the BASE scope is quite cheap and that's the reason I decided to just do the search in the ONELEVEL scope when the requested to be deleted dn is for sure a container. Resolves: https://fedorahosted.org/sssd/ticket/3167 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

a8361f37af31a8a9767056bd27c418c947293f56 13-Sep-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Search by the right type when checking containers We've been searching for the wrong type ("simple") in local_db_check_containers(), which always gives us a NULL result. Let's introduce the new LOCAL_CONTAINER_FILTER and do the search for the right type ("container") from now on. Resolves: https://fedorahosted.org/sssd/ticket/3137 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

c4a3b24dc70fb50c8c0cc5490c29a3755d8b1b73 26-Aug-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Return ENOENT when_deleting a non-existent secret For this, just make use of the sysdb_error_to_errno() function. Resolves: https://fedorahosted.org/sssd/ticket/3125 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

942b4ce6e60e88e4e31600655fad8980f3986f68 17-Aug-2016 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Use sss_atomic_read/write for better readability sss_atomic_read_s and sss_atomic_write_s are macro-wrappers around sss_atomic_io_s but it's easier to follow the code with the read/write vairants used directly. Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> Reviewed-by: Fabiano Fidêncio <fabiano@fidencio.org>

bc7991db97482eb2ac77f7105ee4bb3d329acff7 25-Jul-2016 Lukas Slebodnik <lslebodn@redhat.com>

Amend debug messages after failure of unlink Some messages did not have errno or name of problematic file. There was also improper use of negative value. The function strerror was called with -1 instead of errno Reviewed-by: Petr Čech <pcech@redhat.com>

6c82774653f37945bdd0a311eb1ecc289cac683d 22-Jul-2016 Lukas Slebodnik <lslebodn@redhat.com>

SECRETS: Log message for failures with removing file Type: Unchecked return value Reported by coverity Reviewed-by: Petr Čech <pcech@redhat.com>

a9d46b86993ee8d87fddf0ba50665c0b1b78ebb7 29-Jun-2016 Simo Sorce <simo@redhat.com>

Secrets: Add local container entries support The protocol requires a user to creat a container efore trying to store an entry in it. Do the same in the local provider so that no surprises arise when admins route request to a remote storage server. Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

e625eb47a3091d92eda2271b123f8aab06227b63 29-Jun-2016 Simo Sorce <simo@redhat.com>

Local secrets provider Content-Type handling Properly handle and enforce ithe presence of the content-type header in the local and proxy providers to conform to the Custoida protocol. Avoids different behavior between the local provider and a remote server that may cause developers to have an application working against the local storage and then fail when the administrator configures a remote storage. Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

8f2a34cc6964a1f80a1434e05315a7ae0bb5774e 29-Jun-2016 Simo Sorce <simo@redhat.com>

Secrets: Add Proxy backend Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

625bb2ddf15e8f305a53afa44e87f2146fa930af 29-Jun-2016 Simo Sorce <simo@redhat.com>

Secrets: Add encryption at rest Generates a master key file if it doesn't exist and encrypts secrets using the master key contained in the file. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

1dd679584241a0f9b29072c7eed1c5c5e4a577e4 29-Jun-2016 Simo Sorce <simo@redhat.com>

Add initial providers infrastructure. Also adds support for the basic LOCAL provider that stores data on the local machine. Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>