b34ffbf33729c557c3d1aebf4707ad0ffe4f1904 |
|
22-Sep-2016 |
Petr Čech <pcech@redhat.com> |
KRB5: Fixing FQ name of user in krb5_setup()
This patch fixes creation of FQ username if krb5_map_user option
ise used.
Resolves:
https://fedorahosted.org/sssd/ticket/3188
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
aa8a8318aaa3270e9d9957d0c22dec6342360a37 |
|
28-May-2015 |
Pavel Reichl <preichl@redhat.com> |
krb5: new option krb5_map_user
New option `krb5_map_user` providing mapping of ID provider names to
Kerberos principals.
Resolves:
https://fedorahosted.org/sssd/ticket/2509
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
7c5cd2e7711621af9163a41393e88896a91ac33b |
|
18-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Move checking for illegal RE to krb5_utils.c
Otherwise we would have to link krb5_child with pcre and transfer the
regex, which would be cumbersome. Check for illegal patterns when
expanding the template instead.
Related:
https://fedorahosted.org/sssd/ticket/2370
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
45aeb924ec3ac448bb8d174a5cc061ed98b147c7 |
|
18-Nov-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: Move ccache-related functions to krb5_ccache.c
Add a new module krb5_ccache.c that contains all ccache-related
operations. The only user of this module shall be krb5_child.c as the
other modules will run unprivileged and accessing the ccache requires
either privileges of root or the ccache owner.
Related:
https://fedorahosted.org/sssd/ticket/2370
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
9df7cddb68c61ef4e0397c196604999c68f4be0d |
|
10-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Move become_user outside krb5 tree
In order for several other SSSD processes to run as a non-root user, we
need to move the functions to become another user to a shared space in
our source tree.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
047ed117f80c0fcc7710d930123af4f21233c369 |
|
07-Oct-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Remove ability to create public directories
Setting up public directories is the job of the admin, and
current sssd syntax can't express the actual intention of the admin with
regrads to which parts of the path should be public or private.
Resolves:
https://fedorahosted.org/sssd/ticket/2071 |
dd7d72ec4e76ae781d739f0139e2ec43af9cf09b |
|
12-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
KRB: Remove unused memory context
mem_ctx was unused in function get_domain_or_subdomain |
d20a5a74666413cadbf64c02eb656a5a3b4bb1de |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Remove unused ccache backend infrastructure
Remove struct sss_krb5_cc_be and the remaining functions that reference
it as they are all unused now.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
1c022b3556f442f57326c4a3f250128b1bd232ae |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Unify function to create ccache files
Only 2 types (FILE and DIR) need to precreate files or directories
on the file system, and the 2 functions were basically identical.
Consolidate all in one common function and use that function directly
where needed instead of using indirection.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
84ce563e3f430eec1225a6f8493eb0a6c9a3013a |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Use new function to validate ccaches
This function replaces and combines check_for_valid_tgt() and type specific
functions that checked for ccache existence by using generic krb5 cache
function and executing them as the target user (implicitly validate the
target use rcan properly access the ccache).
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
5dc3b01fd9b2fa244e7c2820ce04602c9f059370 |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: move template check to initializzation
The randomized template check realy only makes sense for the FILE ccache
which is the only one that normally needs to use randomizing chars.
Also it is better to warn the admin early rather than to warn 'when it
is too late'.
So move the check at initialization time when we determine what the
template actually is.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
bfd32c9e8f302d7722838a68572c6801f5640657 |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Move determination of user being active
The way a user is checked for being active does not depend on the ccache
type so move that check out of the ccache specific functions.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
1536e39c191a013bc50bb6fd4b8eaef11cf0d436 |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Replace type-specific ccache/principal check
Instead of having duplicate functions that are type custom use a signle common
function that also performs access to the cache as the user owner, implicitly
validating correctness of ownership.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
a70e88f62e8ba48c5042b881f20ed6586cb135a8 |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Use krb5_cc_destroy to remove old ccaches
This completely replaces the per-ccache-type custom code to remove old cacches
and instead uses libkrb5 base doperations (krb5_cc_destroy) and operating as
the user owner.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
04c49a183f49c28f9ef900bdbc4eb30f23278e17 |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Add helper to destroy ccache as user
This function safely destroy a ccache given a cache name and user crdentials.
It becomes the user so no possible races can compromise the system, then
uses libkrb5 functions to properly destroy a ccache, independently of the
cache type.
Finally restores the original credentials after closing the ccache handlers.
Resolves:
https://fedorahosted.org/sssd/ticket/2061 |
0371fbcf60d4dd8e25b9bb0a83029c812b66f3d6 |
|
09-Sep-2013 |
Simo Sorce <simo@redhat.com> |
krb5: Add calls to change and restore credentials
In some cases we want to temporarily assume user credentials but allow the
process to regain back the original credentials (normally regaining uid 0).
Related:
https://fedorahosted.org/sssd/ticket/2061 |
aeb1e654c337037b6bdb350e1ec8aaa065e86794 |
|
27-Aug-2013 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Add support for KEYRING cache type
https://fedorahosted.org/sssd/ticket/2036 |
8340ca480e0fe823441633720d67efc9e4a4bc64 |
|
22-Aug-2013 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Add new #define for collection cache types
Kerberos now supports multiple types of collection caches, not just
DIR: caches. We should add a macro for generic collection behavior
and use that where appropriate. |
80a874555d8b2737827bb150133ba70a83c65bb7 |
|
27-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
KRB5: guess UPN for subdomain users |
1f469537545a20b62cb35966033be24e1c0cae39 |
|
19-Mar-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Removing unused declaration of functions and variable.
Variables dir_cc and file_cc are used in three
modules: krb5_common.c, krb5_utils.c, krb5_child-test.c, therefore should be
declared with extern in krb5_utils.h. |
5d78919c955c945e78865f322726aac075c71203 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_get_user_attr() |
7c4845bd0efb1dcb44b5be52923c539316725693 |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
krb5_auth: update with correct UPN if needed
The Active Directory KDC handles request case in-sensitive and it might
not always to possible to guess the UPN with the correct case. We check
if the returned principal has a different case then the one used in the
request and updates the principal if needed. This will help using calls
from the Kerberos client libraries later on which would otherwise fail
because the principal is handled case sensitive by those libraries. |
29c0fdd1838a4b9892146f7019d12811c1d0d59b |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
Add new call find_or_guess_upn()
With the current approach the upn was either a pointer to a const string
in a ldb_message or a string created with the help of talloc. This new
function always makes it a talloc'ed value.
Additionally krb5_get_simple_upn() is enhanced to handle sub-domains as
well. |
d29e91321d175dce94d87c23a44ced40d265de2c |
|
26-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
krb5_auth_send: check for sub-domains
If there is an authentication request for a user from a sub-domain a
temporary sysdb context is generated to allow lookups in the
corresponding sub-tree in the cache. |
8fe574521b7f8b14e17aea1d9afb471b80761b83 |
|
04-Oct-2012 |
Ondrej Kos <okos@redhat.com> |
Log possibly non-randomizable ccache file template
fixes https://fedorahosted.org/sssd/ticket/1533
ccache file template is now checked for appended XXXXXX for use with
mkstemp. When those characters are not present, warning is written to log. |
6ca87e797982061576885f944e2ccfaba9573897 |
|
15-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
KRB5: Auto-detect DIR cache support in configure
We can't support the DIR cache features in systems with kerberos
libraries older than 1.10. Make sure we don't build it on those
systems. |
9a3ba9ca00e73adc3fb17ce8afa532076768023b |
|
14-Jun-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Add support for storing credential caches in the DIR: back end
https://fedorahosted.org/sssd/ticket/974 |
fd8595874aa06c8057740001ec465ba76b4af142 |
|
14-Jun-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Add a credential cache back end structure
To be able to add support for new credential cache types easily, this
patch creates a new structure sss_krb5_cc_be that defines common
operations with a credential cache, such as create, check if used or remove. |
85ecf49fdacd910f804caab1be7bf68d23702dc9 |
|
21-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Honor case sensitive flag when creating the ccname template |
318f12c90208971a5b6d3574f0026601161d81c7 |
|
22-Feb-2011 |
Sumit Bose <sbose@redhat.com> |
Check ccache file for renewable TGTs at startup |
29752834fbf3a19e4e117668abfce4e4c7c48ee4 |
|
11-Mar-2010 |
Sumit Bose <sbose@redhat.com> |
Add expandable sequences to krb5_ccachedir
As with krb5_ccname_template sequences like %u can be used in the
krb5_ccachedir parameter which are expanded at runtime. If the directory
does not exist, it will be created. Depending on the used sequences it
is created as a public or private directory. |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |