dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
8babbeee01e67893af4828ddfc922ecac0be4197 |
|
20-Jan-2016 |
Pavel Reichl <preichl@redhat.com> |
IDMAP: Add support for automatic adding of ranges
Resolves:
https://fedorahosted.org/sssd/ticket/2188
Reviewed-by: Sumit Bose <sbose@redhat.com> |
de1131abe5ba7aaeb59f81fc3a9cd2a71c0b52dd |
|
14-Dec-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
DEBUG: Add missing new lines
Reviewed-by: Petr Cech <pcech@redhat.com> |
1e6ad2b73851049197c7756787d14c78f64e1128 |
|
10-Dec-2015 |
Sumit Bose <sbose@redhat.com> |
LDAP: check early for missing SID in mapping check
Resolves https://fedorahosted.org/sssd/ticket/2830
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a47102e74050d8ab14a9ea835ab2640c9aa65856 |
|
09-Oct-2015 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Inform about small range size
When a returned RID has a higher value than the ldap_idmap_range_size,
it means that the administrator did not plan appropriately for the size
of their network. We need to alert the admin at a severe notification
level that their configuration will fail on entries with a high RID and
point them at the explanation in the manual.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
3fa03d5816d6a401d8e894b77236d3cfd95dbd96 |
|
02-Oct-2015 |
Pavel Reichl <preichl@redhat.com> |
SDAP: fix minor memory leak
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
21687d1d553579e81aa43bfa20f2e70fb39e8461 |
|
05-May-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
SDAP: Fix id mapping with disabled subdomains
If subdomains are disabled "subdomain_provider = none"
then auto-discovery discovery of domain SID is disabled.
It is possible to configure options ldap_idmap_default_domain{,_sid}
and id mapping should work.
However value of option ldap_idmap_default_domain_sid was not assigned to
sss_domain_info for main domain. It was only used for initialisation of
sdap_idmap_ctx. As a result of this bug posix attributes were used in
ldap filter and id mapping worked just for users with posix attributes.
[be_get_account_info] (0x0100): Got request for [0x1001][1][name=user]
[be_req_set_domain] (0x0400):
Changing request domain from [EXAMPLE.TEST] to [EXAMPLE.TEST]
[sdap_idmap_domain_has_algorithmic_mapping] (0x0080):
Could not parse domain SID from [(null)]
[sdap_idmap_domain_has_algorithmic_mapping] (0x0080):
Could not parse domain SID from [(null)]
[sdap_search_user_next_base] (0x0400):
Searching for users with base [DC=EXAMPLE,DC=TEST]
[sdap_get_generic_ext_step] (0x0400):
calling ldap_search_ext with
[(&(sAMAccountName=hdpadmin)(objectclass=user)
(sAMAccountName=*)(&(uidNumber=*)(!(uidNumber=0))))]
[DC=EXAMPLE,DC=TEST].
[sdap_search_user_process] (0x0400): Search for users, returned 0 results.
[sdap_get_users_done] (0x0040): Failed to retrieve users
Resolves:
https://fedorahosted.org/sssd/ticket/2635
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
a5b55bdfcda8bfce8cb2ced981773998093d7857 |
|
19-Nov-2014 |
Pavel Reichl <preichl@redhat.com> |
SYSDB: sysdb_idmap_get_mappings returns ENOENT
sysdb_idmap_get_mappings returns ENOENT if no results were found.
Part od solution for:
https://fedorahosted.org/sssd/ticket/1991
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
cdcca90249aadb72bf2978a63c202c5b68642224 |
|
22-Jan-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
sdap_idamp: Fall back to another method if sid is wrong
sss_idmap_domain_has_algorithmic_mapping can return also
IDMAP_SID_INVALID, but it does not mean that idmaping is
unavailable. We should fall back to another method of detection
(sss_idmap_domain_by_name_has_algorithmic_mapping)
and do not return false immediately.
Resolves:
https://fedorahosted.org/sssd/ticket/2172 |
1e4a582e29c119e2c0e58a02dcb41b829e6b5e39 |
|
22-Jan-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
LDAP: update id mapping detection for ldap provider
For id_provider ldap, it is only necessary to enable option ldap_id_mapping.
It is an regression introduced in the commit d3e1d88ce7de3216a862b
Resolves:
https://fedorahosted.org/sssd/ticket/2172 |
7d056853e4a5fe6daa5743e38d21b4493f4fca27 |
|
15-Nov-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter from the sysdb_idmap module |
fdda4b659fa3be3027df91a2b053835186ec2c59 |
|
25-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
sdap_idmap_domain_has_algorithmic_mapping: add domain name argument
When libss_idmap was only used to algorithmically map a SID to a POSIX
ID a domain SID was strictly necessary and the only information needed
to find a domain.
With the introduction of external mappings there are cases where a
domain SID is not available. Currently we relied on the fact that
external mapping was always used as a default if not specific
information about the domain was found. The lead to extra CPU cycles and
potentially confusing debug messages. Adding the domain name as a search
parameter will avoid this. |
cb446b6149d28c204954ae75143b89aef14115dc |
|
17-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
sdap_idmap: properly handle ranges for external mappings
Currently we relied on the fact that external ID mapping is used as
default fallback in case of an error and did not properly add subdomains
with external ID mapping to the idmap library. If debugging is enabled
this leads to irritating debug messages for every user or group lookup.
With this patch this subdomains are added to the idmap library.
Fixes https://fedorahosted.org/sssd/ticket/2105 |
3d9bafcbb5c0fbf23351004ded4dea6aa13127fc |
|
17-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
sdap_idmap: add sdap_idmap_get_configured_external_range() |
a473fb88e6015cf0ccbd2e9005c7e6acca18f452 |
|
17-Sep-2013 |
Pavel Březina <pbrezina@redhat.com> |
util: add sss_idmap_talloc[_free]
Remove code duplication. |
af58b15fa7f20e33736d79c6a4b3becb568517ca |
|
11-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix formating of variables with type: id_t |
b2c7b6fe7a6b9ef3af8d4d3037fe83d6e9bfd6a5 |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Add sdap_idmap_domain_has_algorithmic_mapping()
This patch implements a wrapper for
sss_idmap_domain_has_algorithmic_mapping() for the sdap ID mapping.
Fixes https://fedorahosted.org/sssd/ticket/1960 |
bfb40893be20b45279a40188cf16ef0eec1f9423 |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Allow different methods to find new domains for idmapping
Currently the range management code is in the generic LDAP provider and
can be used by the LDAP and AD provider. New ranges are allocated with
the help of a hash value of the domain SID.
If the IPA provider cannot find a range for a given domain it cannot
allocate a new range on its own but has to look up the idrange objects
on the FreeIPA server and use them accordingly. To allow the LDAP, AD
and IPA provider to use as much common code as possible a plugin
interface, similar to the one used to find the DNS site, to find a
missing range would be useful. The default plugin will be used by the
LDAP and the AD provider and the IPA provider will implement a plugin to
read the data from the server.
Fixes https://fedorahosted.org/sssd/ticket/1961 |
949fbc93defad394648b2651b43a7bbfa5bff42b |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
SDAP IDMAP: Add configured domain to idmap context
To allow libsss_idmap to manage all id-ranges the id-ranges of the
domains configured in sssd.conf which are currently unmanaged must be
added to libsss_idmap. |
bfdb2eeed95bde6cd065a9a47a7cb1773990ccfb |
|
27-May-2013 |
Ondrej Kos <okos@redhat.com> |
Fail with misconfigured id-mapping ranges
https://fedorahosted.org/sssd/ticket/1930
On misconfigured id-mapping range variables, the provider should not
start. We were internally correctly setting error code for failure, but
interruption of startup was not performed.
Also raised the debug level of message for this misconfiguration. |
5aad10b49e193ee14a86e1277146a223005a2d6b |
|
13-May-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Re-add a useful DEBUG message
In commit 46222e5191473f9a46aec581273eb2eef22e23be we removed a very
similar DEBUG message while moving the whole piece of code to the idmap
library. But it turned out that the DEBUG message was useful while
testing the functionality, so this patch adds it back. |
46222e5191473f9a46aec581273eb2eef22e23be |
|
29-Apr-2013 |
Michal Zidek <mzidek@redhat.com> |
libsss_idmap: function to calculate range
Calculation of range for domains is moved from
sdap_idmap code to sss_idmap code. Some refactoring
have been done to allow this move.
https://fedorahosted.org/sssd/ticket/1844 |
df0596ec12bc5091608371e2977f3111241e8caf |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove sysdb as a be context structure member
The sysdb context is already available through the 'domain' structure. |
9a7b6d3248c5aac460e164f2246b26131cfbc055 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain argument to sysdb_idmap_ funcitons |
d6f283302268520c1506fb3da4f2a22f5a741be5 |
|
28-Nov-2012 |
Michal Zidek <mzidek@redhat.com> |
idmap: Silence DEBUG messages when dealing with built-in SIDs.
When converting built-in SID to unix GID/UID a confusing debug
message about the failed conversion was printed. This patch special
cases these built-in objects.
https://fedorahosted.org/sssd/ticket/1593 |
88a7086faa86464670c0d9097ea22a7c774682ad |
|
04-Oct-2012 |
Ondrej Kos <okos@redhat.com> |
Slices calculation is alway wrong for default values |
5dedd73d90f0c1f23299f0c613f384ef902c3653 |
|
24-Sep-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
AD: autorid compatibility should recommend the use of default domain
Previously, we were failing to start if ldap_idmap_autorid_compat
was True but the default domain SID was unspecified. This is the
recommended configuration, but it is functional without it. There
is just a slight risk that the IDs will be inconsistent between
machines if the first user requested is not from the default
domain.
https://fedorahosted.org/sssd/ticket/1530 |
8be5e4497e5008f7807178acdfcbf97365ec4e73 |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add helper function to map IDs
This function will also auto-create a new ID map if the domain has
not been seen previously. |
45f75fc8e98092fa48faa3d180fd42f7efd51486 |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add routine to extract domain SID from an object SID
Also makes the domain prefix macros from sss_idmap public. |
4f3fd1fb264a7eaf3a9d062d49e071b0d17e4deb |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Allow setting a default domain for id-mapping slice 0 |
2fd5864ac8eb2c4cfa0fafe7c0431a74f2ebe1fb |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add autorid compatibility mode |
505e75ba28b42bb3de7a6d55de825091b70cc2b2 |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add helper routines for ID-mapping |