109ed7ca1a82420798efdc6a9b019675a5bd0f4f |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Support 0 as unlimited for the quotas
Add a special value for all the quota-like settings that means 'no
limit'.
Because the responder also had a global limit on the size of the
accepted body (64kiB), this patch also removes the hardcoded limit and
instead keep track of the biggest quota value on startup.
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
6b3bab516355fdf4cc81e6da9d87ec3818ab190f |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Add a new option to control per-UID limits
Adds a new option max_uid_secrets that allows to set a limit of secrets
for this particular client so that the user cannot starve other users.
Resolves:
https://pagure.io/SSSD/sssd/issue/3363
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
197da163943868216f704fb34031e7d5576e8aee |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Use separate quotas for /kcm and /secrets hives
This would differentiate between out-of-capacity errors for secrets and
for KCM as they are two independent trees as far as sssd-secrets is
concerned.
The quotas for /kcm are also different in their defaults. For the /secrets
hive, we presume a large amount of small secrets. For the /kcm hive, we
presume a small amount of large secrets, because the secret is a ccache
which contains multiple credentials.
The operations are also passed in a struct quota from the local request
context instead of local_context. The quota is assigned to the request
context when the hive is selected.
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
7a162ca3ea0bf8ef6b13795a00baa28d17f6131d |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Store quotas in a per-hive configuration structure
Adds two new structures to hold the quotas and associate a quota with a hive.
This is just an internal change for now, but will allow us to read quota
configuration from per-hive sections later.
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
9ef185255126b9ed415fa334f585a11c5be4fb1a |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Do not link with c-ares
Since we started using libcurl for the proxy provider, there is no point
in initializing or linking against c-ares.
If we want to explicitly use a resolver in the future, we should use
libcurl callbacks.
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
2d40ce078a9071ac23353848d0849fbbbd600049 |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Remove unused declarations
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
7171a7584dda534dde5409f3e7f4657e845ece15 |
|
24-Nov-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add configurable payload size limit of a secret
Resolves:
https://fedorahosted.org/sssd/ticket/3169
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
65a38b8c9cabde6c46cc0e9868f54cb9bb10afbf |
|
05-Oct-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add a configurable limit of secrets that can be stored
Related:
https://fedorahosted.org/sssd/ticket/3169
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
efc65e78fa4e01e6cecc8690a9899af61213be62 |
|
03-Oct-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add a configurable depth limit for nested containers
Resolves:
https://fedorahosted.org/sssd/ticket/3168
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
8f2a34cc6964a1f80a1434e05315a7ae0bb5774e |
|
29-Jun-2016 |
Simo Sorce <simo@redhat.com> |
Secrets: Add Proxy backend
Signed-off-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a8d1a344e580f29699aed9b88d87fc3c6f5d113b |
|
29-Jun-2016 |
Simo Sorce <simo@redhat.com> |
Secrets: Add initial responder code for secrets service
Start implementing the Secrets Service Reponder core.
This commit implements stratup and basic conenction handling and HTTP
parsing (using the http-parser library).
Signed-off-by: Simo Sorce <simo@redhat.com>
Related:
https://fedorahosted.org/sssd/ticket/2913
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |