24d8c85fae253f988165c112af208198cf48eef6 |
|
03-Nov-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Augment sysdb_try_to_find_expected_dn to match search base as well
In cases where the domain name in sssd.conf does not match the AD
domain, our previous matching process wouldn't match. This patch
augments the matching as follows:
- the search base is known to sysdb_try_to_find_expected_dn and is
expected to be non-NULL
- the existing matching is ran first
- during the search base, matching, all the non-DC components are
stripped from the search base to 'canonicalize' the search base
- if only a single entry that matches with a non-DC DN component
(matching with a DC component would mean the DN comes from a
different domain) then this entry is a match and is returned
Resolves:
https://fedorahosted.org/sssd/ticket/3199
Reviewed-by: Sumit Bose <sbose@redhat.com> |
25699846bd1c9f8bb513b6271eb4366ab682fbd2 |
|
31-Oct-2016 |
Sumit Bose <sbose@redhat.com> |
LDAP/AD: resolve domain local groups for remote users
If a user from a trusted domain in the same forest is a direct or
indirect member of domain local groups from the local domain those
memberships must be resolved as well. Since those domain local groups
are not valid in the trusted domain a DC from the trusted domain which
is used to lookup the user data is not aware of them. As a consequence
those memberships must be resolved against a local DC in a second step.
Resolves https://fedorahosted.org/sssd/ticket/3206
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
49d3f0a487d55571b2bdc9d3f8280b304b964b9d |
|
31-Oct-2016 |
Sumit Bose <sbose@redhat.com> |
sdap: make some nested group related calls public
sdap_nested_groups_store() and rfc2307bis_nested_groups_send/recv() will
be reused for domain local group lookups.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3dd4c3eca80e9223a65f3318821bd0fb5b45aedd |
|
31-Oct-2016 |
Sumit Bose <sbose@redhat.com> |
sysdb: add parent_dom to sysdb_get_direct_parents()
Currently sysdb_get_direct_parents() only return direct parents from the
same domain as the child object. In setups with sub-domains this might
not be sufficient. A new option parent_dom is added which allows to
specify a domain the direct parents should be lookup up in. If it is
NULL the whole cache is searched.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b9941359b3181c42f415530d5ccad0f4664d85fa |
|
21-Sep-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove double semicolon at the end of line
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
5bd3bef4a655fdfacd2f5df8a2343fe7bc68a771 |
|
01-Sep-2016 |
Sumit Bose <sbose@redhat.com> |
sdap_initgr_nested_get_membership_diff: use fully-qualified names
I think this is a leftover from the change to use fully-qualified names
in sysdb. To verify this you can create a nested group in IPA. Without
this patch the id command will only show the groups the user is a direct
member of. With the patch the indirect groups memberships should be
shown as well.
https://fedorahosted.org/sssd/ticket/3163
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
6a89b38c032593ed705e679c23e6a4efce9f3def |
|
04-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Use FQDN when linking parent LDAP groups
Resolves:
https://fedorahosted.org/sssd/ticket/3093
Because we compare the list of LDAP names with the list of sysdb names,
we need to qualify the list of LDAP names before running the diff.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
64175969779e51c00a78397746d4fec7ce7033a4 |
|
02-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Fix storing initgroups for users with no supplementary groups
If there are no supplementary groups, we tried to qualify a NULL pointer
to an array which resulted in an error.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
50a7a92f92e1584702bf25e61a50cb1c09c7e260 |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
SDAP: add enterprise principal strings for user searches
Unfortunately principal aliases with an alternative realm are stored in
IPA as the string representation of an enterprise principal, i.e.
name\@alt.realm@IPA.REALM. To be able to lookup the alternative
principal in LDAP properly the UPN search filter is extended to search
for this type of name as well.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ba9ebfc49ab3bacb96213c8620411128c09f39da |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
LDAP: include email in UPN searches
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
aa8ec3758d885d6ae4088174369d30f8493ec898 |
|
15-Jul-2016 |
Michal Židek <mzidek@redhat.com> |
sdap: Fix ldap_rfc_2307_fallback_to_local_users
We wrongly tried to store empty
user attributes instead of the
local user attributes with
ldap_rfc_2307_fallback_to_local_users
set to true. This gave us bad
initgroups results and caused
segfaults.
Resolves:
https://fedorahosted.org/sssd/ticket/3045
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
c88b63b2dd82f7111abc00d93fa8db2707487572 |
|
07-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
fix some 'might be used uninitialized' warnings
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
73ead5bb50130663668ded57822d9850b2dc2fff |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Use fqdns during nested RFC2307 initgroups
All user and group names are already qualified at this point, so let's
remove the special case that stored users from trusted domains
qualified.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
c03214d427ea43e7bf8255ccc79faa905c89f7f6 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: make it clear that sdap_add_incomplete_groups operates on sysdb names
Just provides a more descriptive name of a function parameter.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
3931c6612fae5ad32ad81a59f77d77c2d896ebe1 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Add a utility function to return a list of qualified names
Adds a utility function the LDAP provider can use. This is different
from sss_create_internal_fqname_list in the sense that the LDAP provider
passes in the attribute name that contains the name attribute value.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
c4eb21582937362e09aa34e6a18b7f33815d4940 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Use shortname for LDAP queries
When looking up users or groups by name, we need to user the plain
username in the filter. The domain is typically signified by the search
base.
When looking up by UPN, we can keep using the raw value from the DP.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
9b29f86df7a29249ef8f485eedb8db515381c0de |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Rename DP filter value from name to filter_value
filter_value is a better name, because we don't look just by name, the
same variable is used to look up certificates etc.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
e0243c7f3638c819051b7235097a0bb2d06374fb |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
SDAP: Search functions don't need to construct per-domain names
The names are all internally qualified already, no need to distinguish
between subdomain users and main domain users.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
5ff7a765434ed0b4d37564ade26d7761d06f81c3 |
|
01-Mar-2016 |
Sumit Bose <sbose@redhat.com> |
sdap: improve filtering of multiple results in GC lookups
The Global Catalog of AD contains some information about all users and
groups in an AD forest. Users from different domain in the forest can
have the same name. The most obvious example is the Administrator user
which is present in all domains. Although SSSD uses a domain specific
search base for looking up users in the GC the search might still return
multiple results if there is a user with the same name in one of the
child (or grand-child ...) domains because of the hierarchic nature of
the LDAP tree. Limiting the search depth would not help because users
can be created in deeply nested OUs.
Currently SSSD expects in this case that the user object is store in
CN=Users or below. This works for all default users like Administrator
but in general users can be created anywhere in the directory tree. If a
user is created outside of CN=Users and there is a user with the same
name in a child domain the initgroups command to look up the
group-memberships of the user fails because it is not clear which of the
two results should be used (initgroups for the child domain user works
fine).
This patch adds an additional scheme to select the right result based on
the domain component attribute name 'dc'. This attribute indicates an
additional component in the domain name and hence a child domain. So as
long as the result contains a dc component following out search base it
cannot be the object we are looking for. This scheme includes the old
CN=Users based one but since it is more expensive I kept the old scheme
which so far worked all the time and only use the new one if the old one
fails.
Resolves https://fedorahosted.org/sssd/ticket/2961
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
92ec40e6aa25f75903ffdb166a8ec56b67bfd77d |
|
19-Jan-2016 |
Pavel Březina <pbrezina@redhat.com> |
SDAP: rename sdap_get_id_specific_filter
More generic name is used now since it is not used only for id
filters. Probably all references will be deleted when the code
uses sdap_search_in_bases istead of custom search base iterators.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
e182d98a391b5f6d3562e442748254cdbcef0b81 |
|
27-Nov-2015 |
Sumit Bose <sbose@redhat.com> |
initgr: only search for primary group if it is not already cached
Related to https://fedorahosted.org/sssd/ticket/2868
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
8b789d6f0a39cd497d1115203db2f1f8dc195456 |
|
12-Oct-2015 |
Pavel Reichl <preichl@redhat.com> |
LDAP: remove unused param. in sdap_fallback_local_user
Remove unused sdap_options parameter.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
56e88cd5f3501566778b138e4934ee8e7f3fa674 |
|
14-Jun-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
SDAP: Log failure from sysdb_handle_original_uuid
Reviewed-by: Michal Židek <mzidek@redhat.com> |
dca741129d221558a4325479aefc617240f1ab08 |
|
22-May-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
SDAP: Remove unnecessary argument from sdap_save_user
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
0f9c28eb52d2b45c8a97f709308dc11377831b8c |
|
06-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: allow initgroups by UUID for FreeIPA users
If a FreeIPA user is searched with the help of an override name the UUID
from the override anchor is used to search the user. Currently the
initgroups request only allows searches by SID or name. With this patch
a UUID can be used as well.
Related to https://fedorahosted.org/sssd/ticket/2642
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f70a1adbfc30b9acc302027439fb8157e0c6ea2a |
|
29-Apr-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: allow initgroups by SID for AD users
If a user from a trusted AD domain is search with the help of an
override name the SID from the override anchor is used to search the
user in AD. Currently the initgroups request only allows searches by
name. With this patch a SID can be used as well.
Resolves https://fedorahosted.org/sssd/ticket/2632
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b9fbeb75e7a4f50f98d979a70a710f9221892483 |
|
14-Apr-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
SDAP: Filter ad groups in initgroups
Function sdap_add_incomplete_groups stored domain local groups
from subdomain as POSIX group, which should not be done.
Resolves:
https://fedorahosted.org/sssd/ticket/2614
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
1d93029624d708119bbf803e6647a2cbb271f001 |
|
20-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
sdap: properly handle binary objectGuid attribute
Although in the initial processing SSSD treats the binary value right at
some point it mainly assumes that it is a string. Depending on the value
this might end up with the correct binary value stored in the cache but
in most cases there will be only a broken entry in the cache.
This patch converts the binary value into a string representation which
is described in [MS-DTYP] and stores the result in the cache.
Resolves https://fedorahosted.org/sssd/ticket/2588
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
87f8bee53ee1b4ca87b602ff8536bc5fd5b5b595 |
|
17-Mar-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
Add missing new lines to debug messages
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
d81d8d3dc151ebc95cd0e3f3b14c1cdaa48980f1 |
|
17-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
LDAP/AD: do not resolve group members during tokenGroups request
During initgroups requests we try to avoid to resolve the complete
member list of groups if possible, e.g. if there are no nested groups.
The tokenGroups LDAP lookup return the complete list of memberships for
a user hence it is not necessary lookup the other group member and
un-roll nested groups. With this patch only the group entry is looked up
and saved as incomplete group to the cache.
This is achieved by adding a new boolean parameter no_members to
groups_get_send() and sdap_get_groups_send(). The difference to config
options like ldap_group_nesting_level = 0 or ignore_group_members is
that if no_members is set to true groups which are missing in the cache
are created a incomplete groups. As a result a request to lookup this
group will trigger a new LDAP request to resolve the group completely.
This way no information is ignored but the time needed to read all data
is better distributed between different requests.
https://fedorahosted.org/sssd/ticket/2601
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
108db0e3b9e06e530364ef8228634f5e3f6bd3b5 |
|
30-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Add UUID when saving incomplete groups
Related to:
https://fedorahosted.org/sssd/ticket/2571
Reviewed-by: Sumit Bose <sbose@redhat.com> |
7ba70236daccb48432350147d0560b3302518cee |
|
15-Sep-2014 |
Michal Zidek <mzidek@redhat.com> |
Use the alternative objectclass in group maps.
Use the alternative group objectclass in queries.
Fixes:
https://fedorahosted.org/sssd/ticket/2436
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
981bf55532fbec91a106f82d7daf32094c76dfe0 |
|
08-Sep-2014 |
Pavel Reichl <preichl@redhat.com> |
AD: process non-posix nested groups w/o tokenGroups
When initgr is performed for AD not supporting tokenGroups, do not
filter out groups without gid attribute or with gid equal to zero.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com> |
bc8c93ffe881271043492c938c626a9be948000e |
|
08-Sep-2014 |
Pavel Reichl <preichl@redhat.com> |
IPA: process non-posix nested groups
Do not expect objectClass to be posixGroup but rather more general
groupofnames.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com> |
25a387c2e90c74b27a26ea207503df8e4b6a1a76 |
|
01-Sep-2014 |
Sumit Bose <sbose@redhat.com> |
LDAP: If extra_value is 'U' do a UPN search
Besides the name the responders always send an extra string attribute to
the backends which is so far mostly empty. Since the only difference in
the processing of a request for a user name or a user principal name is
a different search attribute in the LDAP provider this extra value can
be used to indicate the type of the name. Providers which do not support
UPN lookup can just ignore this attribute.
Related to https://fedorahosted.org/sssd/ticket/1749 |
5c2f2023696d1ff79c3c5d94b89e7ef9cd4159e9 |
|
01-Sep-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Enable tokenGroups with Windows Server 2003
According to Microsoft documentation, the tokenGroups attribute is
available since Windows 2000:
http://msdn.microsoft.com/en-us/library/cc220937.aspx
We were not able to test against Windows 2000, though, as we don't have
that OS around, so this patch only changes the compatibility level to
2003.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
a75266b247510719f7879f876809a1b03c31a3de |
|
19-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
Revert "IPA: process non-posix nested groups"
This reverts commit 5197ac634572a2e0f8c7cacad68d5e5336064744. |
ac67376a47ed52374641e7a4f6fd97712fe5171b |
|
19-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
Revert "IPA: new attribute map for non-posix groups"
This reverts commit 4c560e7b98e7ab71d22be24d2fbc468396cb634f. |
5197ac634572a2e0f8c7cacad68d5e5336064744 |
|
19-Aug-2014 |
Pavel Reichl <preichl@redhat.com> |
IPA: process non-posix nested groups
If an object can't be resolved as a posix group we then try to resolve
it as a non-posix (without the gid attribute) nested group and store it as a
group stub into the sysdb.
The purpose is to be able to resolve nested posix groups which are
members of non-posix groups.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com> |
4c560e7b98e7ab71d22be24d2fbc468396cb634f |
|
19-Aug-2014 |
Pavel Reichl <preichl@redhat.com> |
IPA: new attribute map for non-posix groups
Create new set of attributes to be used when processing non-posix groups.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com> |
52bd4998195dd6d42db92d963522206f2a63f6a5 |
|
24-Jul-2014 |
Pavel Reichl <preichl@redhat.com> |
SDAP: fix use after free in async_initgroups
Request is freed if creation of subrequest fails and ENOMEM is returned.
This would lead to use after free as returned value is checked on
caller's side and (already freed) request would be marked as erroneous.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
b53f1e74acee48c5f22f7532829e1934c68d4637 |
|
23-Jul-2014 |
Pavel Reichl <preichl@redhat.com> |
SDAP: reduce code duplicity-rfc2307bis nested groups
Move copy&pasted code for iteration of nested groups into separate
function.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
69994add9cd4e57d40b3b7a0b1783ef2d0aa974c |
|
02-Jun-2014 |
Pavel Reichl <preichl@redhat.com> |
SDAP: Add option to disable use of Token-Groups
Disabling use of Token-Groups is mandatory if expansion of nested groups is not
desired (ldap_group_nesting_level = 0) for AD provider.
Resolves:
https://fedorahosted.org/sssd/ticket/2294
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
fc731b54cd74e6732f1e33c7cc4ed49cab0f7c90 |
|
02-Jun-2014 |
Pavel Reichl <preichl@redhat.com> |
LDAP: fix - find primary group by gid
Remove premature call of tevent_req_done() from sdap_get_initgr_done().
Request is correctly marked as done at sdap_get_initgr_pgid().
Resolves:
https://fedorahosted.org/sssd/ticket/2334
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
4dd38025efda88f123eac672f87d3cda12f050c8 |
|
02-May-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Make it possible to extend an attribute map
https://fedorahosted.org/sssd/ticket/2073
This commit adds a new option ldap_user_extra_attrs that is unset by
default. When set, the option contains a list of LDAP attributes the LDAP
provider would download and store in addition to the usual set.
The list can either contain LDAP attribute names only, or colon-separated
tuples of LDAP attribute and SSSD cache attribute name. In case only LDAP
attribute name is specified, the attribute is saved to the cache verbatim.
Using a custom SSSD attribute name might be required by environments that
configure several SSSD domains with different LDAP schemas.
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
83bf46f4066e3d5e838a32357c201de9bd6ecdfd |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Update DEBUG* invocations to use new levels
Use a script to update DEBUG* macro invocations, which use literal
numbers for levels, to use bitmask macros instead:
grep -rl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e 'use strict;
use File::Slurp;
my @map=qw"
SSSDBG_FATAL_FAILURE
SSSDBG_CRIT_FAILURE
SSSDBG_OP_FAILURE
SSSDBG_MINOR_FAILURE
SSSDBG_CONF_SETTINGS
SSSDBG_FUNC_DATA
SSSDBG_TRACE_FUNC
SSSDBG_TRACE_LIBS
SSSDBG_TRACE_INTERNAL
SSSDBG_TRACE_ALL
";
my $text=read_file(\*STDIN);
my $repl;
$text=~s/
^
(
.*
\b
(DEBUG|DEBUG_PAM_DATA|DEBUG_GR_MEM)
\s*
\(\s*
)(
[0-9]
)(
\s*,
)
(
\s*
)
(
.*
)
$
/
$repl = $1.$map[$3].$4.$5.$6,
length($repl) <= 80
? $repl
: $1.$map[$3].$4."\n".(" " x length($1)).$6
/xmge;
print $text;
' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
008e1ee835602023891ac45408483d87f41e4d5c |
|
19-Dec-2013 |
Sumit Bose <sbose@redhat.com> |
AD: cross-domain membership fix
A recent patch directed all call related to group membership lookups to
the AD LDAP port to fix an issue related to missing group memberships in
the Global Catalog. As a side-effect it broke cross-domain
group-memberships because those cannot be resolved by the connection to
the LDAP port.
The patch tires to fix this by restoring the original behaviour in the
top-level lookup calls in the AD provider and switching to the LDAP port
only for the LDAP request which is expected to return the full group
membership.
Additionally this patch contains a related fix for the tokenGroups with
Posix attributes patch. The original connection, typically a Global
Catalog connection in the AD case is passed down the stack so that the
group lookup after the tokenGroups request can run over the same
connection. |
ed3e08e6ff267722c605141a0b57774efe4cb531 |
|
18-Dec-2013 |
Pavel Březina <pbrezina@redhat.com> |
ad: use tokengroups even when id mapping is disabled
https://fedorahosted.org/sssd/ticket/1568 |
29a61bce88147872b5086278d37b1e58726032d1 |
|
18-Dec-2013 |
Pavel Březina <pbrezina@redhat.com> |
ad: refactor tokengroups initgroups
sdap_get_ad_tokengroups_initgroups is split into more parts so
it can be reused later. |
5b94e341a6ae347f49cfd18d574c9f37d0c2633e |
|
09-Dec-2013 |
Sumit Bose <sbose@redhat.com> |
rfc2307bis_nested_groups_send: reuse search base
If there are multiple members in the sdom list, always the search base
of the first entry were used. |
0bdef4fb23af3def3ca9608bb4dda46de1bd9dfb |
|
27-Nov-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove unused parameter from sdap_save_user |
e2ac9be4f293b96f3c8992f1171e44bc1da5cfca |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop redundant sysdb_ctx parameter from sysdb.c |
d115f40c7a3999e3cbe705a2ff9cf0fd493f80fb |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter - module sysdb_ops (part 2) |
4c08db0fb0dda3d27b1184248ca5c800d7ce23f0 |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter - module sysdb_ops (part 1) |
b3292840ebaa747a9fd596ff47cc5d18198361d0 |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter from the sysdb_search module |
fdda4b659fa3be3027df91a2b053835186ec2c59 |
|
25-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
sdap_idmap_domain_has_algorithmic_mapping: add domain name argument
When libss_idmap was only used to algorithmically map a SID to a POSIX
ID a domain SID was strictly necessary and the only information needed
to find a domain.
With the introduction of external mappings there are cases where a
domain SID is not available. Currently we relied on the fact that
external mapping was always used as a default if not specific
information about the domain was found. The lead to extra CPU cycles and
potentially confusing debug messages. Adding the domain name as a search
parameter will avoid this. |
1b870ffa7910879f9310db453a31ab6f06392b9b |
|
27-Sep-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Allow searching subdomain during RFC2307bis initgroups
Related: https://fedorahosted.org/sssd/ticket/2070
Until now, the POSIX-compliant initgroups would only be able to search
the parent domain. Since we want to allow using POSIX attributes from AD
subdomains as well, we should allow searching a custom sdap_domain. |
d3e1d88ce7de3216a862b9fe78dc5aa94dcbc14b |
|
27-Sep-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Require ID numbers when ID mapping is off
Related: https://fedorahosted.org/sssd/ticket/2070
When searching for users and groups without the use of ID mapping, make
sure the UIDs and GIDs are included in the search. This will make the
SSSD seemigly "miss" entries when searching in Global Catalog in the
scenario where the POSIX attributes are not replicated to the GC. |
9cc66028cb6e497588a088ff2953e2ca7ed6ca6d |
|
26-Sep-2013 |
Pavel Březina <pbrezina@redhat.com> |
sysdb: get_sysdb_grouplist() can return either names or dn
We need to work with distinguish names when processing
cross-domain membership, because groups and users may
be stored in different sysdb tree.
Resolves:
https://fedorahosted.org/sssd/ticket/2066 |
0e65abe5cf2abf5d4b431cf6bd161b419f07901d |
|
11-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix formating of variables with type: size_t |
75dd4b05e1dacc76dc9d5f16be31978f84a71dc5 |
|
19-Aug-2013 |
Sumit Bose <sbose@redhat.com> |
sysdb_add_incomplete_group: store SID string is available
During initgroups request we read the SID of a group from the server but
do not save it to the cache. This patch fixes this and might help to
avoid an additional lookup of the SID later. |
fd04fbbf93d33db729404cdc4408f59226025ea6 |
|
19-Aug-2013 |
Sumit Bose <sbose@redhat.com> |
save_rfc2307bis_user_memberships: use fq names for subdomains
For subdomains the group names must be expanded to fully qualified names
to be able to find existing groups or properly add new ones. |
15b5d885e28afcd6c3c19f900eea2a8e00c3e6d3 |
|
19-Aug-2013 |
Sumit Bose <sbose@redhat.com> |
sdap_add_incomplete_groups: use fully qualified name if needed
For subdomains the group names must be expanded to fully qualified names
to be able to find existing groups or properly add new ones. |
85089c1037f00c87a29f72647ece37a3b2b6481b |
|
19-Aug-2013 |
Sumit Bose <sbose@redhat.com> |
sdap_get_initgr_done: use the right SID to get a GID |
9615f4c3c6f6dcc50ee7d4e50020549a2ff720c0 |
|
07-Aug-2013 |
Sumit Bose <sbose@redhat.com> |
Fix memory context for a state member
primary_name was allocated on a temporary memory context but as it is a
member of the state struct it should belong to the memory context of the
state. |
bfd59d1a2d0d45125e5164ef12c425690d519f61 |
|
24-Jul-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Use domain-specific name where appropriate
The subdomain users user FQDN in their name attribute. However, handling
of whether to use FQDN in the LDAP code was not really good. This patch
introduces a utility function and converts code that was relying on
user/group names matching to this utility function.
This is a temporary fix until we can refactor the sysdb API in #2011. |
b56b06e199f15a8a840b36bc7cb8010e39ae761d |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Replace SDAP_ID_MAPPING checks with sdap_idmap_domain_has_algorithmic_mapping
Currently the decision if external or algorithmic mapping should be used
in the LDAP or AD provider was based on the value of the ldap_id_mapping
config option. Since now all information about ID mapping is handled by
libsss_idmap the check for this options can be replace with a call which
checks the state via libss_idmap.
https://fedorahosted.org/sssd/ticket/1961 |
ca344fdecdf127c80ad1074047aeba21e1165313 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: return sdap search return code to ID
By default, the LDAP searches delete the entry from cache if it wasn't
found during a search. But if a search wants to try both Global Catalog
and LDAP, for example, it might be beneficial to have an option to only
delete the entry from cache after the last operation fails to prevent
unnecessary memberof operations for example. |
749cfb5d3270b5daf389d51a0dbd3fd2aec6e05d |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: new SDAP domain structure
Previously an sdap_id_ctx was always tied to one domain with a single
set of search bases. But with the introduction of Global Catalog
lookups, primary domain and subdomains might have different search
bases.
This patch introduces a new structure sdap_domain that contains an sssd
domain or subdomain and a set of search bases. With this patch, there is
only one sdap_domain that describes the primary domain. |
9aa117a93e315f790a1922d9ac7bd484878b621e |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Pass in a connection to ID functions
Instead of using the default connection from the sdap_id_ctx, allow the
caller to specify which connection shall be used for this particular
request. Again, no functional change is present in this patch, just
another parameter is added. |
4709ff46db0dbe073aef061b796d2fd7adeaf18f |
|
21-Mar-2013 |
Jan Cholasta <jcholast@redhat.com> |
LDAP: If deref search fails, try again without deref
https://fedorahosted.org/sssd/ticket/1660 |
fae99bfe4bfc8b4a12e9c2a0ad01b3684c22f934 |
|
20-Mar-2013 |
Simo Sorce <simo@redhat.com> |
ldap: Fallback option for rfc2307 schema
Add option to fallback to fetch local users if rfc2307is being used.
This is useful for cases where people added local users as LDAP members
and rely on these group memberships to be maintained on the local host.
Disabled by default as it violates identity domain separation.
Ticket:
https://fedorahosted.org/sssd/ticket/1020 |
1f469537545a20b62cb35966033be24e1c0cae39 |
|
19-Mar-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Removing unused declaration of functions and variable.
Variables dir_cc and file_cc are used in three
modules: krb5_common.c, krb5_utils.c, krb5_child-test.c, therefore should be
declared with extern in krb5_utils.h. |
9f37bb2012faa136ef7c1f9fe93689ce2be85637 |
|
13-Mar-2013 |
Ondrej Kos <okos@redhat.com> |
Fix initialization of multiple variables |
df0596ec12bc5091608371e2977f3111241e8caf |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove sysdb as a be context structure member
The sysdb context is already available through the 'domain' structure. |
1a54e022351a60fbfa619ef7ed6138fb892ad11a |
|
15-Jan-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: avoid complex realloc logic in save_rfc2307bis_group_memberships
https://fedorahosted.org/sssd/ticket/1761
The function tried to be smart and realloc only when needed, but that
only lead to hard-to find bugs where the logic would not allocate the
proper space. Remove the reallocation and prefer readability over speed
in this case. |
043bda72889e9ef0c48b80b21c99e9e18c5f49d7 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain arguemnt to sysdb_get_real_name() |
363ce75bfe2f73198e1ae7feeed97b6009ae24b8 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain arg to sysdb group member functions |
5c1135221ff3ea9132b6ebf073f2dcae88b73b3f |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain arguments to sysdb_add_group functions. |
b23539e420b9962ad3bfd8f305b9d5acf47e7efb |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain to sysdb_search_group_by_name()
Also remove unused sysdb_search_domgroup_by_name() |
2ce00e0d3896bb42db169d1e79553a81ca837a22 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain to sysdb_search_user_by_name()
Also remove unused sysdb_search_domuser_by_name() |
097fc24412031eb5c2f0d5dd0286083ddc9355ab |
|
10-Dec-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: remove dead assignment |
e3961dfa29324af5b6b9645fd7485c9035bdb18b |
|
05-Dec-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Continue adjusting group membership even if there is nothing to add
https://fedorahosted.org/sssd/ticket/1695 |
326f4fc3125e155ee2d484fe921aafddd6b5a49d |
|
24-Sep-2012 |
Pavel Březina <pbrezina@redhat.com> |
sdap_add_incomplete_groups(): fix ret may be uninitialized warning |
d0e0e73e86f2afdb7f8fefbed70fda8d77b1c25a |
|
24-Sep-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
AD: Optimize initgroups lookups with tokenGroups
https://fedorahosted.org/sssd/ticket/1355 |
21d485184df986e1a123f70c689517386e51a5ce |
|
23-Aug-2012 |
Michal Zidek <mzidek@redhat.com> |
Unify usage of sysdb transactions
Removing bad examples of usage of sysdb_transaction_start/commit/end
functions and making it more consistent (all files except of
src/db/sysdb_*.c). |
67ef63cc88230e13a15cb9e5485340469c4bcc3e |
|
21-Aug-2012 |
Pavel Březina <pbrezina@redhat.com> |
Remove compilation warning: ret may be uninitialized |
9356e8f50436724e985d9a8f5d4f2bc0f5b837bc |
|
21-Aug-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Process all groups from a single nesting level
https://bugzilla.redhat.com/show_bug.cgi?id=846664
If the first group was cached when processing the nested group membership,
we would call tevent_req_done, effectivelly marking the whole nesting
level as done. |
fb5abb2a7abf63974d8db444c66f50a2dd74901f |
|
10-Aug-2012 |
Michal Zidek <mzidek@redhat.com> |
When ldap_group_nesting_level was reached, the LDAP provider tried to link group members with groups outside nesting limit.
https://fedorahosted.org/sssd/ticket/1194 |
2c62da337e31217d03f5bf0f768b574d166bb2fe |
|
13-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Auto-detect support for the ldap match rule
This patch extends the RootDSE lookup so that we will perform a
second request to test whether the match rule syntax can be used.
If both groups and initgroups are disabled in the configuration,
this lookup request can be skipped. |
d42d371c00c83ae44b9d1c3e88ecbe0e01b112e6 |
|
13-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add support for AD chain matching extension in initgroups |
6199bd6b41e8b280e65db4b4bb17a1c5c0444aa9 |
|
13-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Make sdap_initgr_common_store() non-static
Move it to a private header so it can be reused by other
initgroups C files. |
1ed3a0d1d98ae410fcd716ec5c7202de2c082597 |
|
13-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add helper function to get list of a user's groups from sysdb |
2394ec78b31c34f928843a56b9c395380347c418 |
|
13-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Fix incorrect switch statement in sdap_get_initgr_done()
SDAP_SCHEMA_AD needs to be calling sdap_initgr_rfc2307bis_recv(),
not sdap_initgr_nested_recv(). By coincidence both recv functions
happened to be identical, but if one or the other changed, this
would break unexpectedly. |
6b81b6ada1010e65b447fc74453e236fb8791813 |
|
31-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Utilize attribute exclusion in LDAP initgroups
Previous patch added the possibility to exclude some attributes from a
map when building an attribute list to be sent to server. The original
reason for this functionality is the code handling LDAP initgroups. In
this code, there is no need to fetch members of groups in question. This
can save some performance since the list of members can be pretty long
in some cases. This case apllies only to RFC2307 and generic RFC2307bis,
it doesn't apply for IPA schema. |
64ddff90c7fcc02ccb06824ac93af7d5f361a88f |
|
31-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add support for filtering atributes
This patch adds support for filtering attributes when constructing
attribute list from a map for LDAP query. |
f56e704cf0b3b0e9e997e96221fa82d488ee8ca7 |
|
31-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Ghost members - removed sdap_check_aliases()
This function is no longer necessary because we don't have fake user
entries any more. The original purpose of this function was to check if
there are fake user entries for particular user and, if yes, to update
its membership. |
ca4b7b92738f3dd463914e3de5757cd98d37a983 |
|
10-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add attr_count return value to build_attrs_from_map()
This is necessary because in several places in the code, we are
appending to the attrs returned from this value, and if we relied
on the map size macro, we would be appending after the NULL
terminator if one or more attributes were defined as NULL. |
c20a339d54b39120b4051f690ca759e6d079f177 |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Treat groups with unmappable SIDs as non-POSIX groups |
8be5e4497e5008f7807178acdfcbf97365ec4e73 |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add helper function to map IDs
This function will also auto-create a new ID map if the domain has
not been seen previously. |
58d02e0d3d6d48c97fccdb2ad7212e065671ad6d |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add helper routine to convert LDAP blob to SID string |
1c386aa2c11d1bdbb3f42f722ec4599ce9f278c8 |
|
08-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix nested groups processing
Instead of keeping the number of parent groups in "state" and having to
reset the count when moving to another group on the same level, keep
track of the all groups on a particular level along with their parents
and parent count. |
21f666d6a88dfa9cd7e984c25464dd56fe170598 |
|
05-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Use proper errno code |
3ff729e6c8a371e7a52914772816c39ca73c50a9 |
|
24-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Modifications to simplify list_missing_attrs |
2f3ee3f49019f5b60adbe073070f31e6e2d7c7ab |
|
24-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Only use paging control on requests for multiple entries
The paging control can cause issues on servers that put limits on
how many paging controls can be active at one time (on some
servers, it is limited to one per connection). We need to reduce
our usage so that we only activate the paging control when making
a request that may return an arbitrary number of results.
https://fedorahosted.org/sssd/ticket/1202 phase one |
b4adc08bcc1cc225133146163989301b607c79b5 |
|
23-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Properly assign orig_dn
This was only used for properly identifying debug messages. |
3a0522759a7e71b40cc88dba0f5c545b049cf9bf |
|
14-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix memory hierarchy when processing nested group memberships
https://fedorahosted.org/sssd/ticket/1186 |
f393e23f264a299868a12bec40a390a7ecd65d10 |
|
04-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Fix incorrect search timeouts |
169fa5bd3edd34aa0db35681832bd7406e423c1b |
|
04-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Do not fail if RootDSE check cannot determine search bases
https://fedorahosted.org/sssd/ticket/1152 |
940e033c0c427d02a34347dbd2f4443fa625b111 |
|
16-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use the case sensitivity flag in the LDAP provider |
f46b9fd64ef09aae23220c5adb2fe4d3e4adc553 |
|
30-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use dereference during IPA provider initgroups
https://fedorahosted.org/sssd/ticket/1099 |
ac3a1f3da772cf101101c31675c63dc3549b21b5 |
|
22-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Cleanup: Remove unused parameters |
88ab259f993956b6cd0b1a07d3d88d105e368a8c |
|
11-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Squash transactions in sdap_initgr_common_store
https://fedorahosted.org/sssd/ticket/1053 |
fd21ca460115a5d51d0db6e5ac759b8aff51ab99 |
|
07-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use correct state struct in sdap_initgr_rfc2307bis_next_base |
515470a32aeab1eb64a9c4f1adf0c6b4a8ab94f1 |
|
07-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix segfault in sdap_get_initgr_user |
9fcfe80902655f495b7258218fc8114aa5d2c023 |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add multiple search bases for initgroups (RFC2307bis groups) |
38e1ee5d65ade946f1322efa96f69c05e041c57f |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add multiple search bases for initgroups (RFC2307 groups) |
14742d2cf50774ffd94b37a398238e4ce0e4a740 |
|
02-Nov-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add multiple search bases for initgroups (users) |
d3bdb23bec3432591acb1135a108ee9bdd5f87e0 |
|
31-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Steal result onto mem_ctx in sdap_initgr_nested_get_direct_parents |
9aac6b1a195159d5aa0bbbe91fc72ce2c2b021aa |
|
31-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
RFC2307bis initgroups: fix nested groups processing
Due to incorrectly written loop, SSSD would go into infitite loop if it
processed the same group on two different levels of membership. |
e30d02c04efad31f97c35165a92105852c805d34 |
|
25-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Plug memory leaks in LDAP provider |
f249521d2ebf23ccb03a93e070060f6e9d3db94c |
|
17-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Cancel transactions correctly during initgroups |
707ddc7de4d43a96a372880c50cb20b9672c9cdf |
|
17-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use fewer transactions during IPA initgroups |
95470076a26745f65d087be7cdf79c0373df21ca |
|
17-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use fewer transactions during RFC2307bis initgroups |
c88e387d10104774852d54355fc17ad41761776a |
|
17-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Utility functions for LDAP nested schema initgroups |
684d1b48b5582a1bf7812b8c3c663592dc6dfed9 |
|
13-Oct-2011 |
Pavel Březina <pbrezina@redhat.com> |
SysDB commands that save lastUpdate allows this value to be passed in
https://fedorahosted.org/sssd/ticket/836 |
033d1e3985288ec827db85882b052104485606ac |
|
28-Sep-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Store name aliases for users, groups
Also checks fake users for aliases when storing a real users so that
getgrnam for a RFC2307 group that references a user by his secondary
name followed by getpwnam for this user by his primary name works |
fd61c807554d5a3ff74f065eb0438fe2524f4ba2 |
|
28-Sep-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Add a sysdb_get_direct_parents function |
9091fdea936f7d21584682b7f3d58f49b1e7b013 |
|
15-Aug-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Moved some functions in sdap_async_initgroups |
f26c954658dfd7461f290f0b5d924951a6db219a |
|
15-Aug-2011 |
Jan Zeleny <jzeleny@redhat.com> |
sdap_async_accounts.c split
The file has been split in three:
sdap_async_users.c
sdap_async_groups.c
sdap_async_initgroups.c
https://fedorahosted.org/sssd/ticket/864 |