History log of /sssd-io/src/responder/secrets/providers.c
Revision Date Author Comments Expand
677a31351c80453d9ce006481364399a96312052 29-Jan-2018 René Genz <liebundartig@freenet.de>

Fix minor spelling mistakes in responder/* Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

/sssd-io/src/responder/autofs/autofssrv.c /sssd-io/src/responder/common/cache_req/cache_req_plugin.h /sssd-io/src/responder/common/negcache.c /sssd-io/src/responder/common/negcache.h /sssd-io/src/responder/common/responder_common.c /sssd-io/src/responder/common/responder_dp.c /sssd-io/src/responder/common/responder_get_domains.c /sssd-io/src/responder/ifp/ifpsrv.c /sssd-io/src/responder/kcm/kcm.c /sssd-io/src/responder/nss/nss_iface.c /sssd-io/src/responder/nss/nss_protocol_grent.c /sssd-io/src/responder/nss/nsssrv.c /sssd-io/src/responder/nss/nsssrv_mmap_cache.c /sssd-io/src/responder/pac/pacsrv.c /sssd-io/src/responder/pam/pam_LOCAL_domain.c /sssd-io/src/responder/pam/pamsrv.c /sssd-io/src/responder/pam/pamsrv_cmd.c /sssd-io/src/responder/pam/pamsrv_p11.c local.c providers.c secsrv.c /sssd-io/src/responder/ssh/sshsrv.c /sssd-io/src/responder/sudo/sudosrv.c
13d720de13e490850c1139eea865bcd5195a2630 30-Mar-2017 Pavel Březina <pbrezina@redhat.com>

secrets: always add Content-Length header If custodia server does not reply with Content-Length header, curl may wait for non-existing body of http reply if such body does not exist (for example during POST operation when creating a container). Reviewed-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

df99d709c8cbef3c378c111944d83b7345e4c1ea 30-Mar-2017 Pavel Březina <pbrezina@redhat.com>

secrets: use tcurl in proxy provider We switch from http-parser to libcurl for an http client. This gaves us many features for free such as tls and http basic authentication support instead of implementing it on our own. Resolves: https://pagure.io/SSSD/sssd/issue/3192 Reviewed-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

60612b5fbdaaa62ebe6c7f4c27200316f08506d6 27-Mar-2017 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Store ccaches in secrets for the KCM responder Adds a new "hive" to the secrets responder whose base path is /kcm. Only root can contact the /kcm hive, because the KCM responder only runs as root and it must impersonate other users and store ccaches on their behalf. Reviewed-by: Michal Židek <mzidek@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com>

7171a7584dda534dde5409f3e7f4657e845ece15 24-Nov-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Add configurable payload size limit of a secret Resolves: https://fedorahosted.org/sssd/ticket/3169 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

65a38b8c9cabde6c46cc0e9868f54cb9bb10afbf 05-Oct-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Add a configurable limit of secrets that can be stored Related: https://fedorahosted.org/sssd/ticket/3169 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

41cd6072648bb7a9e14e56ed38004a2947f67657 04-Oct-2016 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Use HTTP error code 504 when a proxy server cannot be reached Previously, a generic 500 error code was returned. This patch adds a new error message on a failure to contact the proxy server and returns 504, "Gateway timeout" instead. Resolves: https://fedorahosted.org/sssd/ticket/3212 Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

7128fadade544efcd86b113a5090b00d20993671 04-Oct-2016 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Add DEBUG messages to the sssd-secrets provider Previously, it was not possible to follow the flow of the secrets responder or find out what went wrong on error. This patch adds DEBUG messages so that most failure cases have their own message. At the same time, running sssd-secrets with debug_level <= 3 does not emit any messages at all. Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

efc65e78fa4e01e6cecc8690a9899af61213be62 03-Oct-2016 Fabiano Fidêncio <fidencio@redhat.com>

SECRETS: Add a configurable depth limit for nested containers Resolves: https://fedorahosted.org/sssd/ticket/3168 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

cf902c2b247c1b5793ae0ba58fd2dcbb0f78b686 30-Aug-2016 Jakub Hrozek <jhrozek@redhat.com>

SECRETS: Make internal function static Reviewed-by: Pavel Březina <pbrezina@redhat.com>

3e81e71124c75fd8709704e38561fa1f9d5bfbc2 01-Jul-2016 Lukas Slebodnik <lslebodn@redhat.com>

Secrets: Fix format string body->length has type size_t and not long unsigned. size_t does not have the same size on 64 bit and 32 bit platform src/responder/secrets/providers.c: In function 'sec_http_reply_with_body': src/responder/secrets/providers.c:204:25: error: format '%lu' expects argument of type 'long unsigned int', but argument 6 has type 'size_t {aka unsigned int}' [-Werror=format=] "HTTP/1.1 %d %s\r\n" "Content-Type: %s\r\n" "Content-Length: %lu\r\n" ^ Reviewed-by: Sumit Bose <sbose@redhat.com>

e625eb47a3091d92eda2271b123f8aab06227b63 29-Jun-2016 Simo Sorce <simo@redhat.com>

Local secrets provider Content-Type handling Properly handle and enforce ithe presence of the content-type header in the local and proxy providers to conform to the Custoida protocol. Avoids different behavior between the local provider and a remote server that may cause developers to have an application working against the local storage and then fail when the administrator configures a remote storage. Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

8f2a34cc6964a1f80a1434e05315a7ae0bb5774e 29-Jun-2016 Simo Sorce <simo@redhat.com>

Secrets: Add Proxy backend Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

1dd679584241a0f9b29072c7eed1c5c5e4a577e4 29-Jun-2016 Simo Sorce <simo@redhat.com>

Add initial providers infrastructure. Also adds support for the basic LOCAL provider that stores data on the local machine. Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>