History log of /sssd/src/providers/ipa/selinux_child.c
Revision Date Author Comments Expand
cc2d77d5218c188119fa954c856e858cbde76947 20-Jun-2016 Pavel Březina <pbrezina@redhat.com>

Rename dp_backend.h to backend.h Reviewed-by: Sumit Bose <sbose@redhat.com> Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

/sssd/Makefile.am /sssd/src/p11_child/p11_child_nss.c /sssd/src/providers/ad/ad_access.c /sssd/src/providers/ad/ad_gpo.c /sssd/src/providers/ad/ad_gpo_child.c /sssd/src/providers/ad/ad_srv.c /sssd/src/providers/ad/ad_subdomains.h /sssd/src/providers/backend.h /sssd/src/providers/be_dyndns.c /sssd/src/providers/be_ptask.c /sssd/src/providers/be_refresh.c /sssd/src/providers/data_provider_be.c /sssd/src/providers/data_provider_callbacks.c /sssd/src/providers/data_provider_fo.c ipa_auth.h ipa_dyndns.h ipa_subdomains.h selinux_child.c /sssd/src/providers/krb5/krb5_auth.h /sssd/src/providers/krb5/krb5_child.c /sssd/src/providers/krb5/krb5_common.c /sssd/src/providers/krb5/krb5_common.h /sssd/src/providers/ldap/ldap_access.c /sssd/src/providers/ldap/ldap_child.c /sssd/src/providers/ldap/ldap_common.h /sssd/src/providers/ldap/sdap.h /sssd/src/providers/ldap/sdap_access.c /sssd/src/providers/ldap/sdap_access.h /sssd/src/providers/ldap/sdap_async.h /sssd/src/providers/ldap/sdap_async_sudo.c /sssd/src/providers/ldap/sdap_autofs.c /sssd/src/providers/ldap/sdap_dyndns.c /sssd/src/providers/ldap/sdap_dyndns.h /sssd/src/providers/ldap/sdap_sudo.c /sssd/src/providers/ldap/sdap_sudo.h /sssd/src/providers/ldap/sdap_sudo_shared.h /sssd/src/providers/proxy/proxy.h /sssd/src/providers/proxy/proxy_child.c /sssd/src/providers/simple/simple_access.c /sssd/src/providers/simple/simple_access_check.c /sssd/src/tests/cmocka/test_be_ptask.c /sssd/src/tests/cmocka/test_data_provider_be.c
9f0bffebd070115ab47a92eadc6890a721c7b78d 31-Aug-2015 Michal Židek <mzidek@redhat.com>

sssd: incorrect checks on length values during packet decoding https://fedorahosted.org/sssd/ticket/1697 It is safer to isolate the checked (unknown/untrusted) value on the left hand side in the conditions to avoid overflows/underflows. Reviewed-by: Petr Cech <pcech@redhat.com>

1e0fa55fb377db788e065de917ba8e149eb56161 14-Apr-2015 Jakub Hrozek <jhrozek@redhat.com>

selinux: Only call semanage if the context actually changes https://fedorahosted.org/sssd/ticket/2624 Add a function to query the libsemanage database for a user context and only update the database if the context differes from the one set on the server. Adds talloc dependency to libsss_semanage. Reviewed-by: Michal Židek <mzidek@redhat.com>

3e6dac8e14f8a3da6d359ee013453dbd8a38dd99 17-Mar-2015 Jakub Hrozek <jhrozek@redhat.com>

selinux: Handle setup with empty default and no configured rules SSSD also needs to handle the setup where no rules match the machine and the default has no MLS component. Related to: https://fedorahosted.org/sssd/ticket/2587 Reviewed-by: Michal Židek <mzidek@redhat.com>

01f78f755fde63997ccfded71fb8395569b11430 04-Mar-2015 Jakub Hrozek <jhrozek@redhat.com>

selinux: Delete existing user mapping on empty default https://fedorahosted.org/sssd/ticket/2587 The case of SELinux default user mapping being an empty string is valid, it should translate into "pick the default context on the target machine". In case the context is empty, we need to delete the per-user mapping from the SELinux database to make sure the default is used. Reviewed-by: Michal Židek <mzidek@redhat.com> Reviewed-by: Pavel Reichl <preichl@redhat.com>

b0f46a3019e0ff4f375ef07682ceb9418751707f 13-Feb-2015 Jakub Hrozek <jhrozek@redhat.com>

SELINUX: Check the return value of setuid and setgid Silences a Coverity warning Reviewed-by: Pavel Reichl <preichl@redhat.com>

8f78b6442f3176ee43aa06704a3adb9f4ac625d6 27-Jan-2015 Jakub Hrozek <jhrozek@redhat.com>

SELINUX: Set and reset umask when caling set_seuser from deamon code https://fedorahosted.org/sssd/ticket/2563 Reviewed-by: Michal Židek <mzidek@redhat.com>

486f0d5227a9b81815aaaf7d9a2c39aafcbfdf6a 27-Jan-2015 Jakub Hrozek <jhrozek@redhat.com>

SELINUX: Call setuid(0)/setgid(0) to also set the real IDs to root https://fedorahosted.org/sssd/ticket/2564 libselinux uses many access(2) calls and access() uses the real UID, not the effective UID for the check. Therefore, the setuid selinux_child, which only has effective UID of root would fail the check. Reviewed-by: Michal Židek <mzidek@redhat.com>

8e44ddfccebe61728d8a2c1dafce36dfa944bc90 03-Dec-2014 Jakub Hrozek <jhrozek@redhat.com>

sss_atomic_write_s() return value is signed Reviewed-by: Sumit Bose <sbose@redhat.com>

013c01bd491b535e1705dbb3dbd8424cffc66b7a 06-Nov-2014 Michal Zidek <mzidek@redhat.com>

selinux_child: Do not ignore return values. Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

f3a25949de81f80c136bb073e4a8f504b080c20c 05-Nov-2014 Jakub Hrozek <jhrozek@redhat.com>

IPA: Move setting the SELinux context to a child process In order for the sssd_be process to run as unprivileged user, we need to move the semanage processing to a process that runs as the root user using setuid privileges. Reviewed-by: Michal Židek <mzidek@redhat.com>