7fe7073ad2c84946a699528a3bb79f7803c96b69 |
|
25-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
tests: add tests for netlogon_get_domain_info
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3d29430867cf92b2d71afa95abb679711231117c |
|
15-Jul-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: rename be_acct_req to dp_id_data
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
cc4caf88344210ea9777d618f0f71935ca5e7f8b |
|
09-Jun-2016 |
Sumit Bose <sbose@redhat.com> |
AD: use krb5_keytab for subdomain initialization
During the initialization of AD subdomains parameters like the SASL auth
id are determined. Since subdomains use a default set of the AD specific
configuration options the default keytab will be used. If krb5_keytab is
set in sssd.conf for the AD domain this keytab should be used for the
subdomains (domains of the same AD forest) as well.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
60e54ce78177b72ae82b8986e37dc4d09fce5681 |
|
13-Apr-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
test_ad_common: Include missing header if building with NSS
There was a compile time warning if building with NSS crypto
libraries.
src/tests/cmocka/test_ad_common.c: In function ‘main’:
src/tests/cmocka/test_ad_common.c:873:5: error: implicit declaration of function ‘nspr_nss_cleanu’ [-Werror=implicit-function-declaration]
nspr_nss_cleanup();
^~~~~~~~~~~~~~~~
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
63b8e826f62d2e8930c872de7d4cc8b5bc15d4a4 |
|
13-Apr-2016 |
Sumit Bose <sbose@redhat.com> |
AD: process PAC during initgroups request
If there is a recently attached PAC blob in the cached user entry the
PAC data is used to update the group memberships data of the user. If
there is no PAC attached or if it is too old the other configured
methods will be used.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
2a5cf841dec2785333117a293fcd8c875ace28b9 |
|
12-Apr-2016 |
Petr Cech <pcech@redhat.com> |
TESTS: global_talloc_context push/pop remove
Push/pop global_talloc_context into check_leaks is redudant. It is done
in leak_check_setup() and leak_check_teardown() functions in
src/tests/check_leaks.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
a3ade2e98d397d000f224ae80c6512c959cca18e |
|
11-Nov-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
AD: Remove unused memory context from ad_user_conn_list
Reviewed-by: Petr Cech <pcech@redhat.com> |
afb21fd06690a0bec288a7970abf74ed2ea7dfdc |
|
07-Oct-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Consolidate connection list construction on ad_common.c
Reviewed-by: Sumit Bose <sbose@redhat.com> |
309aa83d16b5919f727af04850bcd0799ba0962f |
|
07-Oct-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Provide common connection list construction functions
https://fedorahosted.org/sssd/ticket/2810
Provides a new AD common function ad_ldap_conn_list() that creates a
list of AD connection to use along with properties to avoid mistakes
when manually constructing these lists.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
295c8e301e31f9bf27d921f80c14dfa5864b2383 |
|
18-Sep-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
test_ad_common: Use unique directory for keytabs
This patch also improved cleanup. The functions
test_ad_create_2way_trust_options created keytab which was used by other
following tests test_ldap_conn_list, test_conn_list. The keytab was not
removed at the end of al tests.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
30dd3f3e063dded0ec9f58bc2535a94727d8e96d |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Add ad_create_1way_trust_options
Related:
https://fedorahosted.org/sssd/ticket/2638
For one-way trusts we can assume that AD domain is the same as the
Kerberis realm. On the other hand, SASL realm and keytab path are
specified, unlike two-way trusts that use the system keytab.
Includes a unit test.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
de2bad8ae08f09964834bda0f88db9de39f47c5c |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA/AD: Set up AD domain in ad_create_2way_trust_options
Related:
https://fedorahosted.org/sssd/ticket/2638
Removed code duplication. Amends unit test to make sure we don't
regress.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
933314e53fac878d1a9b126af216454172cb945a |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Split off ad_create_default_options
Related:
https://fedorahosted.org/sssd/ticket/2638
Make the function reusable and add a simple unit test.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
51b5e1475b3e0b7acac34ed382cfaca8411883a4 |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Rename ad_create_default_options to ad_create_2way_trust_options
Related:
https://fedorahosted.org/sssd/ticket/2638
Better reflects what's going on in the function. Also adds a unit test.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
e2bd4f8a41b72aea0712ad21ad02ccebb707f536 |
|
15-Apr-2015 |
Stephen Gallagher <sgallagh@redhat.com> |
AD: Always get domain-specific ID connection
ad_get_dom_ldap_conn() assumed that ad_ctx->ldap_ctx always points at
the LDAP connection for the primary domain, however it turns out that
this is not always the case. It's currently unclear why, but this
connection can sometimes be pointing at a subdomain. Since the value of
subdom_id_ctx->ldap_ctx always points to the correct domain (including
the primary domain case), there's no benefit to trying to shortcut to
the ad_ctx->ldap_ctx when performing this lookup.
This patch also makes a minor tweak to the tests so that the primary
domain passes the sdap_domain_get() check for validity (since it needs
to have a private member assigned).
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
4e5e846de22407f825fe3b4040d79606818a2419 |
|
11-Mar-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
tests: convert all unit tests to cmocka 1.0 or later
All tests now use the cmocka-1.0-compatible API.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
6b57784f0f175275fd900eca21c77415e3a5ea52 |
|
09-Jul-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
TOOLS: Always debug to stderr
https://fedorahosted.org/sssd/ticket/2348
Programs that are supposed to only be executed on the foreground should
log to stderr automatically.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
266110fa0f6eb086f8f88787bb167cea416fe108 |
|
19-Dec-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Enable fallback to LDAP of trusted domain
Since we have the LDAP port of a trusted AD GC always available now, we
can always perform a fallback. |
ba4a81e933deebb416603369b447ead6ebaa040d |
|
19-Dec-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Add a new option to turn off GC lookups
SSSD now defaults to using GC by default. For some environments, for
instance those that don't or can't replicate the POSIX attributes to
Global Catalog, this might not be desirable.
This patch introduces a new option ad_enable_gc, that is enabled by
default. Setting this option to false makes the SSSD contact only the
LDAP port of AD DCs. |
72ae534f5aef6d2e5d3f2f51299aede5abf9687e |
|
19-Dec-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Add a utility function to create list of connections
ad_id.c and ad_access.c used the same block of code. With the upcoming
option to disable GC lookups, we should unify the code in a function to
avoid breaking one of the code paths.
The same applies for the LDAP connection to the trusted AD DC.
Includes a unit test. |