a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
17759fc794c22898d1db609b736fbcd77536d150 |
|
15-Nov-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter from SELinux functions |
7a1a56860993475d0025e7411547649abf09d32c |
|
15-Nov-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Merge ipa_selinux_common.c and ipa_selinux.c
Moved unused functions and merged ipa_selinux_common.c into
ipa_selinux.c |
b42bb7d9dbf9a4c44a03e7bf1bab471a8a85e858 |
|
19-Mar-2013 |
Michal Zidek <mzidek@redhat.com> |
Move SELinux processing to provider.
The SELinux processing was distributed between provider and
pam responder which resulted in hard to maintain code. This
patch moves the logic to provider.
IT ALSO REQUIRES CHANGE IN THE SELINUX POLICY, because
the provider also writes the content of selinux login
file to disk (which was done by responder before).
https://fedorahosted.org/sssd/ticket/1743 |
740870643f337ce70d85f25f9ed057cd1f91028c |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb selinux functions |
2ce00e0d3896bb42db169d1e79553a81ca837a22 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain to sysdb_search_user_by_name()
Also remove unused sysdb_search_domuser_by_name() |
1e6f2180724de4722a5218826c9401181168d9d4 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove the sysdb_ctx_get_domain() function.
We are deprecating sysdb->domain so kill the function that gives access to
this member as we should stop relying on it being available (or correct). |
6f0daa807ac0bb560353c5d5e25638cf1972f79f |
|
08-Jan-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Split a function to read all SELinux maps |
ebb1f28998c06984765e3e78d30911c1c3ec84e2 |
|
13-Sep-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
SELinux: Always use the default if it exists on the server
https://fedorahosted.org/sssd/ticket/1513
This is a counterpart of the FreeIPA ticket https://fedorahosted.org/freeipa/ticket/3045
During an e-mail discussion, it was decided that
* if the default is set in the IPA config object, the SSSD would use
that default no matter what
* if the default is not set (aka empty or missing), the SSSD
would just use the system default and skip creating the login
file altogether |
894d18ff4178f40a18bbfece8fae270d8307eac6 |
|
13-Sep-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
DB: Always write the SELinux object to sysdb
There's no point in checking if the object already exists because we always
wipe the whole sysdb subtree. We were also immediatelly cancelling the
transaction because we'd jump to goto, even though it was with EOK. |
3a59cbd0b7b9c5dd3c62ac1679876070c264d80f |
|
04-Sep-2012 |
Michal Zidek <mzidek@redhat.com> |
Unify usage of sysdb transactions (part 2). |
f004e23af14fe020d81b8f97f30b448105b79606 |
|
16-Aug-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Only create the SELinux login file if there are mappings on the server
https://fedorahosted.org/sssd/ticket/1455
In case there are no rules on the IPA server, we must simply avoid generating
the login file. That would make us fall back to the system-wide default
defined in /etc/selinux/targeted/seusers.
The IPA default must be only used if there *are* rules on the server,
but none matches. |
21b3c8aff20d1987add2a93561653a3d6a9685d4 |
|
20-Jul-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix sysdb_search_selinux_usermap_by_username return value
There was a logic bug in sysdb_search_selinux_usermap_by_username that
resulted in returning the value the variable "ret" had after the last
call to sysdb_attrs_get_uint32_t, which in cases the last rule processed
did not have the requested attributes led to using the default user
context. |
8bbf89c5ab798c112773fe23515c3a9df56dde71 |
|
18-Jul-2012 |
Nick Guay <nguay@redhat.com> |
Fix uninitialized values
https://fedorahosted.org/sssd/ticket/1379 |
ecfd767c65c39414a86937380b9986c6d2e0aecf |
|
18-Jul-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Delete SELinux mappings |
1a3e6221b38a7cae27d7e84a30bb8ea3c3900a47 |
|
18-Jul-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Modify priority evaluation in SELinux user maps
The functionality now is following:
When rule is being matched, its priority is determined as a combination
of user and host specificity (host taking preference).
After the rule is matched in provider, only its host priority is stored
in sysdb for later usage.
When rules are matched in the responder, their user priority is
determined. After that their host priority is retrieved directly from
sysdb and sum of both priorities is user to determine whether to use
that rule or not. If more rules have the same priority, the order given
in IPA config is used.
https://fedorahosted.org/sssd/ticket/1360
https://fedorahosted.org/sssd/ticket/1395 |
20aee697450e41423ca0e2fc749e659d18f19976 |
|
02-May-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: return EOK if empty message is passed into get_rm_msg
If the code never entered the loop in get_rm_message, we would return
arbitrary return value. |
4c11f752e1f10cf5740d53a3206bb795e9e34fe8 |
|
06-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Added some SELinux-related sysdb routines |