fbe6644aa28d93f492434950680c5618eb567712 |
|
08-Nov-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
MONITOR: Do not set up watchdog for monitor
It makes little sense to set up watchdog for monitor because there is no
entity that would restart the monitor. Therefore we should disable the
watchdog for monitor process.
Resolves:
https://fedorahosted.org/sssd/ticket/3232
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
08cd034c8584b6f058cf565ce66f7f9f7120622f |
|
09-Aug-2016 |
Petr Cech <pcech@redhat.com> |
UTILS: Fixing duplication of pid file declaration
Resolves:
https://fedorahosted.org/sssd/ticket/2978
Reviewed-by: Fabiano Fidêncio <fabiano@fidencio.org>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
04d4c4d45f3942a813b7f772737f801f877f4e64 |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
utils: add is_email_from_domain()
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
2efebde7ddd5f1729a70ef4ec9de607cc393214c |
|
25-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
UTIL: make domain mapping content testable
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
393306307bd908fcec8858f665226ac56238a21b |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Remove unused functions
The conversion to sysdb made several functions obsolete. Remove them.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
bd769a08d18c791a18e913cf92f7f1651f56d3ff |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Qualify user and group names when saving the sudo users
If the sudoUser values we fetch from LDAP correspond to a user or a
group name per:
http://www.sudo.ws/man/1.8.14/sudoers.ldap.man.html
then we parse the usernames into (name,domain) tuples and store them
qualified.
This patch not only makes the sudo provider work with qualified names,
but also makes it possible to use qualified names on the LDAP side,
allowing for example AD users from different domains to access sudo
rules.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
87c6d9ea92d83460457353cfea6c5bde8744994a |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Add a utility function sss_output_name
Adds a convenience function that will help reduce the amount of code
duplication in the responders. All responders need to parse the username
from the internal format, lower-case the name, if the domain is
case-insensitive and then replace spaces if the responder is configured
to do so.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
8858d820445cffb67ef8cf790b3a8d37b008d654 |
|
07-Jul-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Add a utility function to create a list of qualified names
Adds a convenience wrapper around sss_create_fqname that qualifies a
list of names into the format used internally in sssd.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
501d031cecb7ca7d705f5e69da3476e1fa3b1d4c |
|
07-Jul-2016 |
Michal Zidek <mzidek@redhat.com> |
UTIL: Add function to create internal fqname
Add function to create internal fqname in format
shortname@domname where domain portion is lowercased.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
4714118890e51b365fbce543d0a042b4b59b2b25 |
|
07-Jul-2016 |
Michal Zidek <mzidek@redhat.com> |
UTIL: Add function to parse internal fqname format
Add lightweight function to parse internal fqname format
(shortname@domain). This function does not require the
sss_names to be initialized.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
e6b6b9fa79c67d7d2698bc7e33d2e2f6bb53d483 |
|
06-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
IPA/AD: globally set krb5 canonicalization flag
If Kerberos principal canonicalization is configured in SSSD, currently
it is the default for the IPA provider, a configuration snippet is
generated for the system-wide libkrb5 configuration so that all
kerberized applications will use canonicalization by default.
Resolves https://fedorahosted.org/sssd/ticket/3041
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
2aafa4811cd9f74f70820b0e266df8e4c7ed6ad7 |
|
29-Jun-2016 |
Simo Sorce <simo@redhat.com> |
Monitor: Add mode to generate confdb only
With this mode we can add socket activated services and have systemd
pre exec sssd to genrate the configuration file w/o starting the whole
sssd if not necessary.
https://fedorahosted.org/sssd/ticket/2243
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
75ba524d356fed615a9c92152f64aebf0bdaf9c2 |
|
29-Jun-2016 |
Simo Sorce <simo@redhat.com> |
Util: Add watchdog helper
The watchdog uses a kernel timer to issue a signal to the process.
It checks if the ticker is not being reset by the main event loop, which
would indicate that the process got stuck.
At the same time it sets a tevent timer to clear the watchdog ticker, so
that the watchdog handler is kept happy.
If the watchdog detects that the timer event failed to reset the watchdog for
three times in a row then the process is killed.
Normally the monitor will detect the child terminated and will rescheduled it.
Related:
https://fedorahosted.org/sssd/ticket/2921
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
b54cd7caf6b73b36b68fcefc0cad39a626690398 |
|
29-Jun-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
Downcast to errno_t after tevent_req_is_error
Functions tevent_req_is_error and _tevent_req_error
use type uint64_t for error code.
SSSD uses errno_t which is an alias for int.
Therefore complier assumes that macro TEVENT_REQ_RETURN_ON_ERROR
can return 0 due to implicit down casting from uint64_t -> int.
This patch makes down casting explicit and returns EINVAL
if result of downcasting is 0.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
53ef8f81b60929a6c866efdd133627e7d7d61705 |
|
09-Jun-2016 |
Sumit Bose <sbose@redhat.com> |
p11: add OCSP default responder options
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
aa35995ef056aa8ae052a47c62c6750b7adf065e |
|
09-Jun-2016 |
Sumit Bose <sbose@redhat.com> |
p11: add no_verification option
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
45e11be651dbd3855a35de4abd2922e5b9d4b963 |
|
31-May-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
Do not leak fds in case of failures setting up a child process
Resolves:
https://fedorahosted.org/sssd/ticket/3006
The handling of open pipes in failure cases was suboptimal. Moreover,
the faulty logic was copied all over the place. This patch introduces
helper macros to:
- initialize the pipe endpoints to -1
- close an open pipe fd and set it to -1 afterwards
- close both ends unless already closed
These macros are used in the child handling code.
The patch also uses child_io_destructor in the p11_child code for safer
fd handling.
Reviewed-by: Petr Cech <pcech@redhat.com> |
28f336bdb32db0b89cb98174a3f8e308e4e928db |
|
13-Apr-2016 |
Sumit Bose <sbose@redhat.com> |
util: make concatenate_string_array() reusable
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
558ec7d717735bb16c210c675c2cc5bee1da4576 |
|
23-Mar-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Move debug part from util.h -> new debug.h
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3a12f5cf2ee4a76c13b4d5ed9b0be87ad1d5cb2e |
|
14-Mar-2016 |
Pavel Březina <pbrezina@redhat.com> |
utils: return const char ** from dup_string_list
This function is not used anywhere and const char ** suits better
in my use case (next patch) so I just changed the function.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
22bbd95a48d21452fa5bb1a96b43334503bf8132 |
|
23-Feb-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Provide varargs version of debug_fn
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
2a44a8c6683cfea218ee5329bcfad953dfeb6746 |
|
23-Feb-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Use prefix for debug function
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
544a20de7667f05c1a406c4dea0706b0ab507430 |
|
26-Nov-2015 |
Sumit Bose <sbose@redhat.com> |
p11: enable ocsp checks
This patch enables the Online Certificate Status Protocol in NSS and
adds an option to disable it if needed. To make further tuning of
certificate verification more easy it is not an option on its own but an
option to the new certificate_verification configuration option.
Resolves https://fedorahosted.org/sssd/ticket/2812
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
877b92e80bde510d5cd9f03dbf01e2bcf73ab072 |
|
23-Oct-2015 |
Michal Židek <mzidek@redhat.com> |
util: Update get_next_domain's interface
Update get next domain to be able to
include disbled domains and change the
interface to accept flags instead of
multiple booleans.
Ticket:
https://fedorahosted.org/sssd/ticket/2673
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f8e337540d280f944098cd4dd7d670e2f7166b54 |
|
14-Oct-2015 |
Petr Cech <pcech@redhat.com> |
REFACTOR: umask(077) --> umask(SSS_DFL_X_UMASK)
There are many calls of umask function with 077 argument. This patch
add new constant SSS_DFL_X_UMASK which stands fot 077. So all
occurences of umask(077) are replaced by constant SSS_DFL_X_UMASK.
Resolves:
https://fedorahosted.org/sssd/ticket/2424
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
c299f997e20011536e365bc18e59e73f68629d2c |
|
14-Oct-2015 |
Petr Cech <pcech@redhat.com> |
REFACTOR: umask(0177) --> umask(SSS_DFL_UMASK)
There are many calls of umask function with 0177 argument. This patch
add new constant SSS_DFL_UMASK which stands for 0177. So all occurences
of umask(0177) (except responder code) are replaced by constant
SSS_DFL_UMASK.
Resolves:
https://fedorahosted.org/sssd/ticket/2424
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b5825c74b6bf7a99ae2172392dbecb51179013a6 |
|
21-Sep-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Convert domain->disabled into tri-state with domain states
Required for:
https://fedorahosted.org/sssd/ticket/2637
This is a first step towards making it possible for domain to be around,
but not contacted by Data Provider.
Also explicitly create domains as active, previously we only relied on
talloc_zero marking dom->disabled as false.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
90b8e2e47ecc0dd555cae401a0c9b082d12ab989 |
|
01-Sep-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
NSS: Don't ignore backslash in usernames with ldap provider
The regression was caused by changing default domain regex
for ldap provider in ticket #2717
Resolves:
https://fedorahosted.org/sssd/ticket/2772
Reviewed-by: Sumit Bose <sbose@redhat.com> |
d95bcfe23c574de7b6b7b44b52a0d4db5cc8529a |
|
14-Aug-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Provide a common interface to safely create temporary files
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
c4fb8f55f2894de431478ccfec63f9a97e090d0e |
|
14-Aug-2015 |
Michal Židek <mzidek@redhat.com> |
DEBUG: Add new debug category for fail over.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
fa7921c8259539b750f7e9e7bcd82aa72020826a |
|
15-Jul-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Add sss_filter_sanitize_ex
Related:
https://fedorahosted.org/sssd/ticket/2553
In order to support wildcard request, we need to introduce an optionally
relaxed version of sss_filter_sanitize that allows to select which
characters are exempt from sanitizing.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
a99845006f96f9d1e7af871ec67c71cee8408a62 |
|
19-Jun-2015 |
Sumit Bose <sbose@redhat.com> |
utils: add get_last_x_chars()
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
50936fc7230a9b3f01e285e72c4182013542f53e |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL/SYSDB: Move new_subdomain() to sysdb_subdomains.c and make it private
In order to make updating the subdomain list a two-step process.
Therefore we need to make sure that update_subdomains() is the only
interface towards the SSSD that changes the subdomain list.
Move the new_subdomain() function to sysdb_subdomains.c and only make it
available through a private header so it's usable by unit tests.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
ea224c3813a537639778f91ac762732b3c289603 |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Store trust direction for subdomains
We need to store the subdomain trust direction in order to recover the
structure after SSSD restart.
The trust direction is a plain uint32_t to avoid leaking the knowledge
about AD trust directions to sysdb while at the same time making it easy
to compare values between sysdb and LDAP and avoid translating the
values.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
1e0fa55fb377db788e065de917ba8e149eb56161 |
|
14-Apr-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
selinux: Only call semanage if the context actually changes
https://fedorahosted.org/sssd/ticket/2624
Add a function to query the libsemanage database for a user context and
only update the database if the context differes from the one set on the
server.
Adds talloc dependency to libsss_semanage.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
843a66170a4e51e0a614498e74f3526afc4bff52 |
|
14-Apr-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Add a simple function to get the fd of debug_file
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
1d93029624d708119bbf803e6647a2cbb271f001 |
|
20-Mar-2015 |
Sumit Bose <sbose@redhat.com> |
sdap: properly handle binary objectGuid attribute
Although in the initial processing SSSD treats the binary value right at
some point it mainly assumes that it is a string. Depending on the value
this might end up with the correct binary value stored in the cache but
in most cases there will be only a broken entry in the cache.
This patch converts the binary value into a string representation which
is described in [MS-DTYP] and stores the result in the cache.
Resolves https://fedorahosted.org/sssd/ticket/2588
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
5a5c5cdeb92f4012fc75fd717bfea06598f68f12 |
|
05-Mar-2015 |
Pavel Reichl <preichl@redhat.com> |
UTIL: convert GeneralizedTime to unix time
New utility function *sss_utc_to_time_t* to convert GeneralizedTime to
unix time.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
8f78b6442f3176ee43aa06704a3adb9f4ac625d6 |
|
27-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
SELINUX: Set and reset umask when caling set_seuser from deamon code
https://fedorahosted.org/sssd/ticket/2563
Reviewed-by: Michal Židek <mzidek@redhat.com> |
dd5ebcde05442422f39084acb49b28cf47002d1e |
|
23-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: properly handle mixed-case trusted domains
In the SSSD cache domain names are handled case-sensitive. As a result
fully-qualified names in RDN contain the domain part in the original
spelling. When IPA client lookup up group-memberships on the IPA server
via the extdom plugin the names returned are all lower case. To make
sure new DNs are generated correctly the domain part must adjusted.
Related to https://fedorahosted.org/sssd/ticket/2159
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f3d91181d4ee9da3f8bbf4ddf8782951c0ae46c1 |
|
15-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Unify the fd_nonblocking implementation
The responder and child_common modules each had their own
implementation. Unify it instead and add a unit test.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
4fa184e2c60b377fd71e0115a618bd68dc73627d |
|
25-Nov-2014 |
Sumit Bose <sbose@redhat.com> |
AD/IPA: add krb5_confd_path configuration option
With this new parameter the directory where Kerberos configuration
snippets are created can be specified.
Fixes https://fedorahosted.org/sssd/ticket/2473
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b114bcc370c8d78b5e9f43963cfa91213901c3be |
|
20-Nov-2014 |
Sumit Bose <sbose@redhat.com> |
Enable views for all domains
Currently views and overrides were only available for sub-domains, this
patch enables the lookup for the configured domains as well.
Related to https://fedorahosted.org/sssd/ticket/2481
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
9ce7a46f6578a86b72f20acd7b0e55b1b4ebea09 |
|
05-Nov-2014 |
Sumit Bose <sbose@redhat.com> |
Add add_strings_lists() utility function
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
5eda23c28c582b43b2a0a165b1750f3875c0fa84 |
|
22-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Add a function to convert id_t from a number or a name
We need a custom function that would convert a numeric or string input
into uid_t. The function will be used to drop privileges in servers and
also in the PAC and IFP responders.
Includes a unit test to test all code that changed as well as a fix for
a misnamed attribute in the csv_to_uid_list function synopsis.
Reviewed-by: Pavel Reichl <preichl@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
4546e283498ffe2511cb566b9159714c671e326b |
|
20-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
SSSD: Chown the log files
We need to chown the log files before dropping root to make sure they
are usable by the SSSD user. Unfortunately, we can't just rely on
passing the fd opened by root, because we need to be also able to rotate
the log files.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
ac40d2f2b2b2fc35c95389f5e28febd580bd2b7a |
|
20-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
SSSD: Add the options to specify a UID and GID to run as
Adds new command line options --uid and --gid to all SSSD servers,
making it possible to switch to another user ID if needed.
So far all code still runs as root.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
180c7a75ee8507d459c7de21882dc714c59c3cc9 |
|
20-Oct-2014 |
Michal Zidek <mzidek@redhat.com> |
sss_semanage: Add mlsrange parameter to set_seuser
mlsrange parameter will be needed in IPA provider
and probably at some point in the tools as well.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
42ec8af02ecf1937e4db9b1ecc6216022634f0f9 |
|
20-Oct-2014 |
Michal Zidek <mzidek@redhat.com> |
util: Move semanage related functions to src/util
These functions will be reused by IPA provider.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
d70023a7fa95c8c12683de965a76ec38a6234ae5 |
|
20-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
sysdb: add overide lookup calls
sysdb_search_user_override_by_name() and
sysdb_search_group_override_by_name() search for overrides in the given
view.
sysdb_add_overrides_to_object() adds the data from the override object
to the original object and makes them available for further processing.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
06424c5ac5ffb871476208155762bb5b73e0b665 |
|
16-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Always write capaths
We used to only generate the [capaths] section on the IPA server itself,
when running in a trusted setup. But we also found out that the capaths
are often required to make SSO fully work, so it's better to always
generate them.
Reviewed-by: Alexander Bokovoy <abokovoy@redhat.com> |
9df7cddb68c61ef4e0397c196604999c68f4be0d |
|
10-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Move become_user outside krb5 tree
In order for several other SSSD processes to run as a non-root user, we
need to move the functions to become another user to a shared space in
our source tree.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
1925ce32f7c1dc226be31d4301a0a1dbb2448baa |
|
09-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Do not depend on monitor code
Just moves code around. There should be a way to use the server.c module
without linking the monitor code.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
830ded27453015080a54d6ba85fd4999ee7e9af1 |
|
29-Sep-2014 |
Pavel Reichl <preichl@redhat.com> |
PAM: new options pam_trusted_users & pam_public_domains
pam_public_domains option is a list of numerical UIDs or user names
that are trusted.
pam_public_domains option is a list of domains accessible even for
untrusted users.
Based on:
https://fedorahosted.org/sssd/wiki/DesignDocs/RestrictDomainsInPAM
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
92d19f76449817dfb125da9510d478a30eed37bc |
|
01-Sep-2014 |
Sumit Bose <sbose@redhat.com> |
Replace space: add some checks
This patch adds some additional checks if the option for replacing
spaces in user and group names is used.
When replacing space with the replacement character it is checked if the
name already contains the replacement character. If it does the
unmodified name is returned because in this case a revers operation
would not be possible.
For the reverse operation is it checked if the input contains both a
space and the replacement character. If this is true the unmodified name
is returned as well, because we have to assume that it is the original
name because otherwise it wouldn't contain both characters.
Additionally a shortcut if the replacement characters is a space and
tests for the new checks are added. The man page is updated accordingly.
Related to https://fedorahosted.org/sssd/ticket/1854 and
https://fedorahosted.org/sssd/ticket/2397 .
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
1f3127e88a87953f059c9a70d3582ae1719594b1 |
|
13-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
Only replace space with the specified substitution
https://fedorahosted.org/sssd/ticket/2397
- make sss_replace_whitespaces only replace space (' ') not any
whitespace
- make sss_replace_whitespaces only replace a single char, not the whole
string
- rename CONFDB_NSS_OVERRIDE_DEFAULT_WHITESPACE to
CONFDB_NSS_OVERRIDE_DEFAULT_SPACE
- rename the override_default_whitespace option to override_space
- rename sss_replace_whitespaces() to sss_replace_space()
- rename sss_reverse_replace_whitespaces() to sss_reverse_replace_space()
- rename nctx->override_default_wsp_str to nctx->override_space
- make the return value of sss_replace_space non-const to avoid freeing
the result without compilation warnings
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
16cd3d5599d7bfe6ef4918142b9233ae2354f200 |
|
06-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: remove get_username_from_uid
The function was unused since 2009 and moreover it was synchronous.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
022c6b90bb37851c0e8704c0e5388ebc113c6470 |
|
28-Jul-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Add functions for replacing whitespaces.
Reviewed-by: Pavel Reichl <preichl@redhat.com>
Reviewed-by: Michal Židek <mzidek@redhat.com> |
b011330c77168cdd864aaae54a75214935136c05 |
|
22-Jul-2014 |
Pavel Reichl <preichl@redhat.com> |
UTIL: rename find_subdomain_by_object_name
The function was named "find_subdomain" yet it could find both main
domain and subdomain.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
db18dda869bc6c52a41797b2066cf121cf10f49c |
|
22-Jul-2014 |
Pavel Reichl <preichl@redhat.com> |
UTIL: rename find_subdomain_by_name
The function was named "find_subdomain" yet it could find both main
domain and subdomain.
sed 's/find_subdomain_by_name/find_domain_by_name/' -i `find . -name "*.[ch]"`
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
9ca0071db0e226e4e65b2a80fdeddd5048ca8990 |
|
22-Jul-2014 |
Pavel Reichl <preichl@redhat.com> |
UTIL: rename find_subdomain_by_sid
The function was named "find_subdomain" yet it could find both main
domain and subdomain.
sed 's/find_subdomain_by_sid/find_domain_by_sid/' -i `find . -name "*.[ch]"`
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b12e2500237f33c44807d7e5b377ec06007c7252 |
|
21-Jul-2014 |
Pavel Reichl <preichl@redhat.com> |
LDAP: tokengroups do not work with id_provider=ldap
With plain LDAP provider we already have a sdap_handle, so it should be possible
that in the case where sdom->pvt == NULL sdap_id_op_connect_send() can be
skipped and sdap_get_ad_tokengroups_send() can be already send with the
sdap_handle passed to sdap_ad_tokengroups_initgr_mapping_send(). So we should
only fail if sdom->pvt == NULL and sh == NULL.
if find_subdomain_by_sid() failed we can check if there is only one domain in
the domain list (state->domain) and in this case continue with this domain since
the LDAP provider does not know about sub-domains and hence can only have one
configured domain.
Resolves:
https://fedorahosted.org/sssd/ticket/2345
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
6b57784f0f175275fd900eca21c77415e3a5ea52 |
|
09-Jul-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
TOOLS: Always debug to stderr
https://fedorahosted.org/sssd/ticket/2348
Programs that are supposed to only be executed on the foreground should
log to stderr automatically.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
9a990aa9f7e8c105e0cfeea8d8cbdc776c2d5d7a |
|
09-Jul-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
SSSD: Send debug to stderr when running on foreground
https://fedorahosted.org/sssd/ticket/2348
When SSSD is running in interactive mode, we should print DEBUG messages
directly to stderr, not journal.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
588f8fbe74e66cc015f185a5b798173d320a65b5 |
|
01-Jul-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: Add support for gpo permissive mode
Reviewed-by: Sumit Bose <sbose@redhat.com> |
be7eabee6b7eb8def2441bf5de4c6d4950c155bf |
|
02-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Add function sss_parse_name_const
Variable with type 'const char *' can be used as output argument in function
sss_parse_name, but there will be warning.
warning: passing 'const char **' to parameter of type 'char **'
discards qualifiers in nested pointer types
[-Wincompatible-pointer-types-discards-qualifiers] |
ebd2db737485d334cd54316e05f848f3ccfd2fee |
|
28-May-2014 |
Pavel Březina <pbrezina@redhat.com> |
utils: add get_known_services()
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
aad67c44ecebb6a674a280fa5f00cbc0a68e9052 |
|
26-May-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Include netinet/in.h for ip adress macros
The manual page in.h (man in.h) says:
The <netinet/in.h> header shall define the in6_addr structure that con‐
tains at least the following member:
uint8_t s6_addr[16]
The <netinet/in.h> header shall define the following macros that test
for special IPv6 addresses. Each macro is of type int and takes a sin‐
gle argument of type const struct in6_addr *:
IN6_IS_ADDR_LINKLOCAL: Unicast link-local address.
IN6_IS_ADDR_LOOPBACK: Loopback address.
IN6_IS_ADDR_MULTICAST: Multicast address.
The header file netinet/in.h> was not included directly in src/util/util.c
and it caused few problems.
./src/util/util.h:378: warning: 'struct in6_addr' declared inside parameter list
./src/util/util.h:378: warning: its scope is only this definition or declaration, which is probably not what you want
src/util/util.c: In function 'check_ipv4_addr':
src/util/util.c:765: error: implicit declaration of function 'IN_MULTICAST'
src/util/util.c:769: error: 'IN_LOOPBACKNET' undeclared (first use in this function)
src/util/util.c:769: error: (Each undeclared identifier is reported only once
src/util/util.c:769: error: for each function it appears in.)
src/util/util.c:778: error: 'INADDR_BROADCAST' undeclared (first use in this function)
src/util/util.c: At top level:
src/util/util.c:786: warning: 'struct in6_addr' declared inside parameter list
src/util/util.c:787: error: conflicting types for 'check_ipv6_addr'
./src/util/util.h:378: error: previous declaration of 'check_ipv6_addr' was here
src/util/util.c: In function 'check_ipv6_addr':
src/util/util.c:796: error: implicit declaration of function 'IN6_IS_ADDR_LINKLOCAL'
src/util/util.c:799: error: implicit declaration of function 'IN6_IS_ADDR_LOOPBACK'
src/util/util.c:802: error: implicit declaration of function 'IN6_IS_ADDR_MULTICAST'
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
9a592ee3fc195f20732c6b1f90894a0be25ccc19 |
|
28-Apr-2014 |
Simo Sorce <simo@redhat.com> |
util: Change file check fns to use a mode mask
Instead of using a custom way to chck file type, use the system
provided macros and a mode mask to decide when we want to check.
Additionally a mask also allows us to selectively check permissions.
Related:
https://bugzilla.redhat.com/1089098
Resolves:
https://fedorahosted.org/sssd/ticket/2321
Signed-off-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
41354b0b972df187d5b6f6b02b26b736ec6bce23 |
|
19-Feb-2014 |
Stephen Gallagher <sgallagh@redhat.com> |
DEBUG: Allow debug_fn to process __FILE__ and __LINE__
In preparation for enabling journald support for the DEBUG logs, we
will need to be able to pass in certain additional arguments that will
be required, specifically the code file and line number.
We will be able to optionally enable this in the file-based logs as well
if we so choose, but for right now we will avoid breaking the log
format on disk.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
3b35ff47651e4893ce537a273466766b962362da |
|
17-Feb-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
DOC: Fix names of arguments in doxygen comments
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
5c233380e1ebf641f6106a34d7b94f9e9a606589 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Remove DEBUG macro support for old debug levels
Remove support for specifying old debug levels to the DEBUG macro:
* remove debug_get_level function which was used for conversion,
* remove debug_get_level tests,
* remove mentions of old/new levels from DEBUG and DEBUG_IS_SET
macro descriptions,
* rename "newlevel" argument of debug_fn to just "level".
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
45a1d9d597df977354428440aeff11c6a0a947fe |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Fixup DEBUG macro invocations update
Fix mistakes made by the update script in f87797f "Make DEBUG macro
invocations variadic".
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
cc026fd9ba386f2197e3217940d597dcad1a26fe |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro definition variadic
Update DEBUG macro definition to accept format string and its arguments
as direct variadic macro arguments, instead of expecting them as an
expression in parens.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
fb0332565892bc10998ca98b567d4dde2213844d |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Move DEBUG macro body to debug_fn
Move DEBUG macro body to the debug_fn function, adding "function"
argument to the latter.
Rename "debug_fn" in sssd_krb5_locator_plugin.c to "plugin_debug_fn" to
remove conflict with the sssd debug_fn.
Replace DEBUG_MSG macro usage with debug_fn function usage.
Remove DEBUG_MSG macro along with tests.
The above makes the total size of binaries drop by 20% for the standard
Fedora build and by 44% for a build configured according to Debian
packaging script.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
7e7a8b9e67808d69663d2178eecec3769191f5e7 |
|
28-Jan-2014 |
Pavel Reichl <preichl@redhat.com> |
utils: handling NULL params in sss_parse_name |
c86904baad32fbf9e66bf1cdc667aa5e683b48ba |
|
12-Jan-2014 |
Stef Walter <stefw@redhat.com> |
NSS: Don't use printf(3) on user provided strings.
This also fixes several corner cases and crashers.
It's not prudent to pass user input to (even admin) input as a
format string to printf, and various distros now check for this.
This can cause accessing memory incorrectly, and various also
various libc abort()'s.
In addition various assumptions were made about full_name_format
that aren't necessarily the case if the user uses a more complex
format.
Use safe-printf.c implementation for formatting full_name_format.
Adapt the NSS resolver so it doesn't barf on formatted strings that
are shorter than expected given a full_name_format.
Tests added and updated appropriately. |
15a1519ec9c23f598716ffa89e533cd9bfb2a4f3 |
|
19-Dec-2013 |
Sumit Bose <sbose@redhat.com> |
Use lower-case name for case-insensitive searches
The patch makes sure that a completely lower-cased version of a fully
qualified name is used for case insensitive searches. Currently there
are code paths where the domain name was used as configured and was not
lower-cased.
To make sure this patch does not break with old entries in the cache or
case sensitive domains a third template was added to the related filters
templates which is either filled with a completely lower-cased version or
with the old version. The other two template values are unchanged. |
de38d860e39585486e3ccbb42555196e319c7efd |
|
15-Nov-2013 |
Sumit Bose <sbose@redhat.com> |
Add utility to handle Well-Known SIDs |
e16963fb913d6a5fc1c54154270ded129ac33962 |
|
15-Nov-2013 |
Sumit Bose <sbose@redhat.com> |
Add sss_tc_fqname2()
sss_tc_fqname2() is similar to sss_tc_fqname() but expects domain and
flat domain name as string arguments instead of a domain struct. |
3242dd4a49c3869c9b066a63afb81cebf1a35b7d |
|
12-Nov-2013 |
Simo Sorce <simo@redhat.com> |
Signals: Refactor termination of processes
sig_term() was never used as a real signal handler, but only called by tevent
signal handlers in the kerberos and ldap children.
Also the same code was duplicated with separate local guard variables in other
functions.
Unify orderly termination handling, between all these functions. |
d054a96e102b53a3aab6602f531a0e8d254080ab |
|
12-Nov-2013 |
Simo Sorce <simo@redhat.com> |
Signals: Remove unused functions
Cleanup unused signal functions |
9de5878d247b77b8f520a57727cd55f42e179caa |
|
22-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Move sss_parse_name_for_domains declaration to util.h |
2e57e339798f47ad84cae9121559d19192b79146 |
|
17-Oct-2013 |
Michal Zidek <mzidek@redhat.com> |
util: Add functions to check if IP addresses is special
Added functions to check if given IP address is a special address
(broadcast, multicast...). |
bbd43fbcd8f70eedeac4e4ce01c36256cde82ab1 |
|
27-Sep-2013 |
Sumit Bose <sbose@redhat.com> |
ipa_server_mode: write capaths to krb5 include file
If there are member domains in a trusted forest which are DNS-wise not
proper children of the forest root the IPA KDC needs some help to
determine the right authentication path. In general this should be done
internally by the IPA KDC but this works requires more effort than
letting sssd write the needed data to the include file for krb5.conf.
If this functionality is available for the IPA KDC this patch might be
removed from the sssd tree.
Fixes https://fedorahosted.org/sssd/ticket/2093 |
c5711b0279ea85d69fe3c77dfb194360c346e1d7 |
|
27-Sep-2013 |
Sumit Bose <sbose@redhat.com> |
IPA: store forest name for forest member domains
In order to fix https://fedorahosted.org/sssd/ticket/2093 the name of
the forest must be known for a member domain of the forest. |
cf1a8af5556b1d8eab68802918c881ae1a0b89eb |
|
26-Sep-2013 |
Pavel Březina <pbrezina@redhat.com> |
util: add get_domains_head()
This function will return head of the domain list.
Resolves:
https://fedorahosted.org/sssd/ticket/2066 |
d6837823b0a002c9c8afb48caf3eeda5cb73f173 |
|
18-Sep-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
BE: Log domain name to journald if available
If the SSSD is compiled with journald support, then all sss_log()
statements will include a new field called "SSSD_DOMAIN" that includes
the domain name. Filtering only messages from the single domain is then
as easy as:
# journalctl SSSD_DOMAIN=foo.example.com |
0b81cc5d41ec6a1c58e610f402fd93a1fbda4aff |
|
17-Sep-2013 |
Pavel Březina <pbrezina@redhat.com> |
util: add find_subdomain_by_object_name()
This function will parse object name into name and domain
name part and return appropriate sss domain.
Resolves:
https://fedorahosted.org/sssd/ticket/2034 |
e1f68731525116ce686ffcdc07ad3a14e4fb1cd7 |
|
17-Sep-2013 |
Pavel Březina <pbrezina@redhat.com> |
util: add find_subdomain_by_sid()
This function takes domain SID (doesn't have the last component)
or object SID (have all components) and returns subdomain.
The subdomain is found by comparing domain->domainid with the SID.
E.g.
domain SID: S-1-5-21-3940105347-3434501867-2690409756
object SID: S-1-5-21-3940105347-3434501867-2690409756-513
Resolves:
https://fedorahosted.org/sssd/ticket/2034 |
aac071824f6c98003f30d49ab440c15b4b53692c |
|
11-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Enable printf format string checking
https://fedorahosted.org/sssd/ticket/1945 |
701f13b5c8e27bcbfc79e77ce7c76d9f768a448c |
|
11-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Adding new header for printf formating macros |
57cd3443dcb7c073c5a00a9f2c3c3a3030ae2d3e |
|
11-Sep-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix formating of variables with type: long |
abac0f3ec2baa597d8e21a8744de6f33506299ce |
|
05-Sep-2013 |
Pavel Březina <pbrezina@redhat.com> |
utils: add is_host_in_domain() |
1658c567191c35beaddffafdb079abe33248037b |
|
28-Aug-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
UTIL: Create new wraper header file sss_endian.h
Some platform have header file endian.h and anothers have sys/endian.h.
We nedd to use conditional build to handle it correctly, therefore new header
file sss_endian.h was created. |
33c865412732554ef255e93c4e7a58b0bce963c6 |
|
28-Aug-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Add a new option to control subdomain enumeration |
a6cca9c284724fafd670a3163812f248ba53ad97 |
|
28-Aug-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Read enumerate state for subdomains from cache
The enumerate flag will be read from the cache for subdomains and
the domain object will be created accordingly. |
a7185ac5df207c2b9bdb8bd96b478f69df4e9fd4 |
|
19-Aug-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Remove obsolete compat macros
All supported tevent releases contain these macros. |
9822d4d468ec74e4e173f5adf0db12d02974cd18 |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Read mpg state for subdomains from cache
The mpg flag will be read from the cache for subdomains and the domain
object will be created accordingly. |
58dd26b1c5b60ee992dd5d1214bb168aebb42d54 |
|
27-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Write out domain-realm mappings
This patch reuses the code from IPA provider to make sure that
domain-realm mappings are written even for AD sub domains. |
02d1cb8935d5c9b57cd05dfdbfe6ed38e0d61c28 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
New utility function sss_get_domain_name
Instead of copying a block of code that checks whether domain is a subdomain
and uses only name of FQDN as appropriate, wrap the logic into a function. |
c51f7a064b0d7ef86110bdeb6dc09fa6c08be7d3 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Move domain_to_basedn outside IPA subtree
The utility function will be reused to guess search base from the base
DN of AD trusted domains. |
777374243e15c53e7b0a7345e190c1018920be18 |
|
30-May-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Allow flat name in the FQname format
https://fedorahosted.org/sssd/ticket/1648
Adds another expansion in the printf format that allows the user to use
the domain flat name in the format. |
1987bff88e01c74d647dd2db4f541ac311537e1a |
|
30-May-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Add utility functions for formatting fully-qualified names
Instead of using printf-like functions directly, provide two wrappers
that would encapsulate formatting the fully-qualified names. No
functional change is present in this patch. |
574a1c20f114851071ae74112b34488c3d1aeeb3 |
|
21-May-2013 |
Ondrej Kos <okos@redhat.com> |
Check NSCD configuration file
https://fedorahosted.org/sssd/ticket/1785
nscd.conf file is now checked for the presence of caching settings for
databases controlled by SSSD. Syslog warning is now written only if NSCD
is running with interfering configuration or if configuration file
couldn't be loaded.
New configure option added to support non-standard locations
--with-nscd-conf=PATH (defaultly set to /etc/nscd.conf)
This is just a workaround until the following bugzilla is resolved:
https://bugzilla.redhat.com/show_bug.cgi?id=963908 |
db78f4c750943fcd4b60bca5f3fdfd6cc5d3d4f8 |
|
21-May-2013 |
Ondrej Kos <okos@redhat.com> |
Move nscd.c from tools to util
Preparation for the following patch which will include the nscd.c in the
monitor code due to newly introduced function for checking the nscd
configuration file. |
2fa8d6655ac37f9bdeb34420000052d921f4a543 |
|
14-May-2013 |
Michal Zidek <mzidek@redhat.com> |
Rename SAFEALIGN macros.
https://fedorahosted.org/sssd/ticket/1772
SAFEALIGN macros have been renamed in this patch to
make it easy to pick the right macro when data is copied
from byte buffer to a variable or vice versa.
The renamed macros are placed in new header file to
avoid code duplication (the old ones were defined in
two files, one for the client code and one for the rest
of sssd). |
f54b271376b23cb968eafb9ffd5100c6dadad2a7 |
|
07-May-2013 |
Jan Cholasta <jcholast@redhat.com> |
UTIL: Add function sss_names_init_from_args
This function allows initializing sss_names_ctx using a regular expression and
fully qualified format string specified in its arguments. |
3a4186ae40d0c3b7be46a4c973166f6048fcfe38 |
|
18-Mar-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Fix sss_client breakage.
Adding missing dependencies for linker. Missing dependency was
introduced by commit 22d381367c27910fe82f476a76b9f4ede555e35a
in changed file src/sss_client/nss_mc_common.c
All function declaration for io.c was moved from util.h to separate file io.h,
https://fedorahosted.org/sssd/ticket/1838 |
7800c9da75ad0dc3b4a530b15adce86d6c4f26e5 |
|
13-Mar-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
More generalized function open_debug_file_ex()
Function open_debug_file_ex() set flag FD_CLOEXEC to opened
file according to the value of third parameter.
Removed duplicity of unsetting FD_CLOEXEC after calling function
open_debug_file_ex() |
22d381367c27910fe82f476a76b9f4ede555e35a |
|
13-Mar-2013 |
Lukas Slebodnik <lslebodn@redhat.com> |
Reuse sss_open_cloexec at other places in code.
Functions open_cloexec and openat_cloexec were renamed with prefix
"sss_" and moved to separete file. Replacing duplicated code of
function sss_open_cloexec everywhere in the source code.
https://fedorahosted.org/sssd/ticket/1794 |
e1e429c89e70fddcad4210375aacd1e339e6d071 |
|
04-Mar-2013 |
Simo Sorce <simo@redhat.com> |
Return ERR_INTERNAL instead of EIO
EIO has always been an odd match, but was used as an error to indicate
that something had gone wrong internally before we had specific SSSD
errors available. Use ERR_INTERNAL instead going forward. |
8bcabb97d988d1602882a1f036aac2eaf5e09234 |
|
04-Mar-2013 |
Simo Sorce <simo@redhat.com> |
Add SSSD specific error codes and definitions
This code adds a new range of error codes specific to SSSD,
It also provides helper functions to print out error defintions
like you can do with system error messages and the strerror() function.
The sss_strerror() function can accept both the new sssd errors and
system errno_t errors falling back to the system strerror() if the error
code provide is not a valid SSSD error code. |
4f118e3e6a25762f40a43e6dbefb09f44adbef32 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Introduce IS_SUBDOMAIN() macro
Fixes https://fedorahosted.org/sssd/ticket/1766 |
bba1a5fd62cffcae076d1351df5a83fbc4a6ec17 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Change the way domains are linked.
- Use a double-linked list for domains and subdomains.
- Never remove a subdomain, simply mark it as disabled if it becomes
unused.
- Rework the way subdomains are refreshed.
Now sysdb_update_subdomains() actually updates the current subdomains
and marks as disabled the ones not found in the sysdb or add new ones
found. It never removes them.
Removal of missing domains from sysdb is deferred to the providers,
which will perform it at refresh time, for the ipa provider that is
done by ipa_subdomains_write_mappings() now.
sysdb_update_subdomains() is then used to update the memory hierarchy
of the subdomains.
- Removes sysdb_get_subdomains()
- Removes copy_subdomain()
- Add sysdb_subdomain_delete() |
0232747f04b650796db56fd7b487aee8a96fab03 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Add function get_next_domain()
Use this function instead of explicitly calling domain->next
This function allows to get the next primary domain or to descend into the
subdomains and replaces also get_next_dom_or_subdom() |
b8dcd1216e5ea7065213c750a92dabfe01fa3b70 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Add realm info to sss_domain_info |
234958be042980242fff6da936af674da877c5ef |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Refactor single domain initialization
Bring it out of sysdb, which will slowly remove internal dependencies on
domains and instead will always require them to be passed by callers. |
c63415eabb1dc595c60760fb1df7fa7cfd1d3200 |
|
10-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add function to safely wipe memory.
This is useful for wiping passwords, as it prevents the compiler from
optimizing out a memset to zero before a free() |
04759b59e71c78ab23b84d13dd29d9c6dd680adb |
|
02-Jan-2013 |
Michal Zidek <mzidek@redhat.com> |
failover: Protect against empty host names
Added new parameter to split_on_separator that allows to skip
empty values.
The whole function was rewritten. Unit test case was added to
check the new implementation.
https://fedorahosted.org/sssd/ticket/1484 |
df24b52d8b809ab47f89221bed247e13281ca20a |
|
28-Nov-2012 |
Simo Sorce <simo@redhat.com> |
Avoid const warnings when deallocating memory
In some case we allocate and assign data to a const pointer.
When we then try to free it we would get a const warning because talloc_free
accepts a void, not a const void pointer. Use discard_const to avoid the
warning, it is safe in this case. |
048bd9dd3f616fee1ff401db2e72cf833213e766 |
|
28-Nov-2012 |
Simo Sorce <simo@redhat.com> |
Revert "Avoid accessing half-deallocated memory when using talloc_zfree macro."
This reverts commit ff57c6aeb80a52b1f52bd1dac9308a69dc7a4774.
This commit doesn't really make sense, we are never accessing freed
memory as all we are dealing with is a pointer which is never itsef
part of the memory we are freeing (if it were, it would be an error
in the caller and we shouldn't mask it in this macro). |
3d97f2645356adca1e9e6eeca4f735a1acbed15d |
|
26-Nov-2012 |
Michal Zidek <mzidek@redhat.com> |
debug: print fatal and critical errors if debug level is unresolved
If global variable debug_level has value SSSDBG_UNRESOLVED, we should
print at least fatal and critical errors.
https://fedorahosted.org/sssd/ticket/1345 |
778491bebee536a196afc29b0d9953843a5374b2 |
|
14-Nov-2012 |
Sumit Bose <sbose@redhat.com> |
Always start PAC responder if IPA ID provider is configured
Since the PAC responder is used during the authentication of users from
trusted realms it is started automatically if the IPA ID provider is
configured for a domain to simplify the configuration.
Fixes https://fedorahosted.org/sssd/ticket/1613 |
032d0980dfe5a27a5954f44f9d519e03fc7d1ced |
|
14-Nov-2012 |
Sumit Bose <sbose@redhat.com> |
Add string_in_list() and add_string_to_list() with tests
string_in_list() and add_string_to_list() are two utilities for NULL
terminated strings arrays. add_string_to_list() adds a new string to an
existing list or creates a new one with the strings as only item if
there is not list. string_in_list() checks if a given string is in the
list. It can be used case sensitive or in-sensitive. |
e9086c9178b06ff396b958dcc2a1e5baa0693f5c |
|
08-Nov-2012 |
Michal Zidek <mzidek@redhat.com> |
util_lock.c: sss_br_lock_file accepted invalid parameter value
Return EINVAL if number of tries is <= 0. Also the parameter
retries was renamed to num_tries, so it is more obvious that
it also includes the first try. |
0a55f903a1da319338fdcf147efa01ed22f9710d |
|
06-Nov-2012 |
Michal Zidek <mzidek@redhat.com> |
util: Added new file util_lock.c |
715e09ece039af851b96bcf1861c4fff6169d499 |
|
06-Nov-2012 |
Pavel Březina <pbrezina@redhat.com> |
exit original process after sssd is initialized
https://fedorahosted.org/sssd/ticket/1357
Neither systemd or our init script use pid file as a notification
that sssd is finished initializing. They will continue starting up
next service right after the original (not daemonized) sssd process
is terminated.
If any of the responders fail to start, we will never terminate
the original process via signal and "service sssd start" will hang.
Thus we take this as an error and terminate the daemon with
a non-zero value. This will also terminate the original process
and init script or systemd will print failure. |
fa3e287038c4be174a07ede60a61f5c343e260ec |
|
06-Nov-2012 |
Pavel Březina <pbrezina@redhat.com> |
add SSSDBG_IMPORTANT_INFO macro
We currently have only SSSDBG_FATAL_FAILURE macro that corresponds
to original debug level 0. But there are several level 0 messages
that are not actually failures but an important information. We
should use this new macro to represent them. |
9e2c64c6d4f5560e27207193efea6536a566865e |
|
29-Oct-2012 |
Michal Zidek <mzidek@redhat.com> |
Include talloc log in our debug facility
https://fedorahosted.org/sssd/ticket/1495 |
fa893b2796b002f709e9416f134bc8df8c08cf8d |
|
02-Oct-2012 |
Pavel Březina <pbrezina@redhat.com> |
monitor: create pid file after all responders are started
https://fedorahosted.org/sssd/ticket/1357 |
99c99e557020775714f028b28a147edda290c783 |
|
24-Sep-2012 |
Michal Zidek <mzidek@redhat.com> |
sss_cache tool invalidates records in memory cache. |
b096321a5a02dda0b6b71ba0f9c4d8feacd979e4 |
|
23-Aug-2012 |
Michal Zidek <mzidek@redhat.com> |
Fix: IPv6 address with square brackets doesn't work.
https://fedorahosted.org/sssd/ticket/1365 |
e4c29d1f8e3b2c2b268105f169e5156a0a36aebf |
|
23-Aug-2012 |
Ondrej Kos <okos@redhat.com> |
Consolidation of functions that make realm upper-case |
3c60433641ce2e86b9b04778c8f8652ef0d097e4 |
|
13-Jun-2012 |
Stef Walter <stefw@gnome.org> |
Make re_expression and full_name_format per domain options
* Allows different user/domain qualified names for different
domains. For example Domain\User or user@domain.
* The global re_expression and full_name_format options remain
as defaults for the domains.
* Subdomains get the re_expression and full_name_format of
their parent domain.
https://bugzilla.redhat.com/show_bug.cgi?id=811663 |
9fd2775fe1ced6ff6a9a3ff7db124fcb52dade5d |
|
04-May-2012 |
Sumit Bose <sbose@redhat.com> |
Fix endian issue in SID conversion
Since the byte-order is only important when dealing with the binary SID
the sub-auth values are stored in host order and are only converted
while reading or writing the binary SID. |
e9597202540eca119b9a292cd5430de33fb793c1 |
|
02-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Handle endianness issues on older systems
Older versions of glibc (like that on RHEL 5) do not have the
le32toh() function exposed. We need this for handling the Active
Directory ID-mapping, so we'll copy these macros from endian.h on
a newer glibc. |
20d0bc6d587f346238062df4da5edfde815e59b1 |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add some utility functions for subdomains |
9959c512ac3ba36f7a0db7614f0357ce0bae748f |
|
20-Apr-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Move atomic io function to a separate module
We'll be using it on various places of the SSSD. The function is in its
own file to allow using just the one piece without having to drag in the
whole util.c module. |
62def404cb14e02d2903c68fb730c5281ad902fe |
|
29-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Add sss_get_cased_name_list utility function |
2b4332767d299263a288e0a74bbfbc9de674de95 |
|
21-Mar-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Make the string_equal() function public |
915b7f47219af0cedf5ddc146ab1598b3e6ae14a |
|
27-Feb-2012 |
Jan Cholasta <jcholast@redhat.com> |
UTIL: Add function for atomic I/O |
01171ddb20034578c616d0ba07f0268ab71809da |
|
23-Jan-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Move sized_string declaration to utils |
c7d387aaaa3d3470dec55a5ca0612873e6354ba8 |
|
21-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
sss_get_cased_name utility function |
dbea04f585a30d001b574317c068cd03a4fa332b |
|
16-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
sss_utf8_tolower utility function+unit tests |
fe9cea3352b919f81ead0de5487ed593325b2ef0 |
|
13-Oct-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Add option to follow symlinks to check_file() |
4a6a5421113ab662a665c62ed6a24b61a5a36950 |
|
28-Sep-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Multiline macro cleanup
This is mostly a cosmetic patch.
The purpose of wrapping a multi-line macro in a do { } while(0) is to
make the macro usable as a regular statement, not a compound statement.
When the while(0) is terminated with a semicolon, the do { } while(0);
block becomes a compound statement again. |
1a7529bf5f867b43e0475f7f9ac0cd8671fb16f1 |
|
08-Sep-2011 |
Pavel Březina <pbrezina@redhat.com> |
DEBUG timestamps offer higher precision
https://fedorahosted.org/sssd/ticket/956
Added: --debug-microseconds=0/1
Added: debug_microseconds to sssd.conf |
89caf5edcc99f5731e89bd51e6ffaad3ec11c304 |
|
25-Aug-2011 |
Pavel Březina <pbrezina@redhat.com> |
New DEBUG facility - SSSDBG_UNRESOLVED changed from -1 to 0
Removed:
SSS_UNRESOLVED_DEBUG_LEVEL (completely replaced with SSSDBG_UNRESOLVED)
Added new macro:
CONVERT_AND_SET_DEBUG_LEVEL(new_value)
Changes unresolved debug level value (SSSDBG_UNRESOLVED) from -1 to 0
so DEBUG macro could be reduced by one condition. Anyway, it has a minor
effect, every time you want to load debug_level from command line parameters,
you have to use following pattern:
/* Set debug level to invalid value so we can deside if -d 0 was used. */
debug_level = SSSDBG_INVALID;
pc = poptGetContext(argv[0], argc, argv, long_options, 0);
while((opt = poptGetNextOpt(pc)) != -1) { ... }
CONVERT_AND_SET_DEBUG_LEVEL(debug_level); |
99dd40a885ed3d42af4bbbde7ee2fc98830544d0 |
|
25-Aug-2011 |
Pavel Březina <pbrezina@redhat.com> |
New DEBUG facility - conversion
https://fedorahosted.org/sssd/ticket/925
Conversion of the old debug_level format to the new one.
(only where it was necessary)
Removed:
SSS_DEFAULT_DEBUG_LEVEL (completely replaced with SSSDBG_DEFAULT) |
267bdd44fc55e064412177b7a67c7a047c912177 |
|
25-Aug-2011 |
Pavel Březina <pbrezina@redhat.com> |
New DEBUG facility - modified DEBUG
https://fedorahosted.org/sssd/ticket/925
Modified: DEBUG() macro to work with new levels
There are several new macros in util/util.h:
- DEBUG_MSG(level, function, message) which will format the debug message
like "(time) [prg_name] [function] (level): message\n"
- DEBUG_IS_SET(level) that you should use to check if the level is allowed
to be logged
You can use it like: if (DEBUG_IS_SET(SSSDBG_TRACE_LIBS)) {...} |
a32ae272bb0ae0a47ab80d3a2fcc535fd5260754 |
|
25-Aug-2011 |
Pavel Březina <pbrezina@redhat.com> |
New DEBUG facility - new levels
https://fedorahosted.org/sssd/ticket/925
Added functions:
- debug_convert_old_level() to convert levels 0-9 to appropriate bitmask
debug_convert_old_level(5) returns 0x03F0 (= 0 | 1 | 2 | 3 | 4 | 5)
- debug_get_level() to convert old level number to its new value
debug_get_level(5) returns 0x0200 (= 5)
There are several new macros in util/util.h:
- SSSDBG_* to reflect a debug level (same names as in the ticket) - please,
don't use magic numbers anymore |
96ea25cbd9b94d48c57b6173eeda2b3fbe670a70 |
|
08-Aug-2011 |
Pavel Březina <pbrezina@redhat.com> |
debug_timestamps fixes
Fixed: could not overwrite debug_timestamps when set in sssd.conf
Fixed: invalid description of debug_timestamps in sssd man page |
2e1973b90ea87b343d39fef1f6393cc201989ecd |
|
11-Jul-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Move IP adress escaping from the LDAP namespace |
0fc334e130cb3ca30c29c2f5d8c378393ad0d072 |
|
23-May-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Import config.h earlier
On RHEL 5 and other older platforms, failing to set _GNU_SOURCE
early would cause some functions - such as strndup() - to be
unavailable. |
d3750f3c3a9e232629c8b634b7b5407114667700 |
|
04-May-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Override config file debug_level with command-line
This patch also makes the following changes:
1) The [sssd] debug_level setting no longer acts as a default for
all other sections.
2) We will now skip passing the debug argument to the child
processes from the master unless the SSSD was run with a
command-line argument for the debug level.
https://fedorahosted.org/sssd/ticket/764 |
86aa3e41afb1b47b59ddfbd52b84b977bb1bb2f8 |
|
11-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Add overflow check to SAFEALIGN_COPY_*_CHECK macros |
f15683b4b100351e24e305d25bd4785c79ac8f55 |
|
11-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Validate user supplied size of data items
Specially crafted packages might lead to an integer overflow and the
parsing of the input buffer might not continue as expected. This issue
was identified by Sebastian Krahmer <krahmer@suse.de>. |
b770be929d9c786b1ac671cca59dfd3314e65fdd |
|
20-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Introduce sss_hash_create_ex() |
1709edfb690bb4ffa4b96c64d08853f47390eda3 |
|
03-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
krb5_child returns TGT lifetime |
d1571f8c173ca9172fa295e6aac48b8c0c367950 |
|
02-Dec-2010 |
Sumit Bose <sbose@redhat.com> |
Add a special filter type to handle enumerations |
ca92350db6ad6ac344181f7b8ec695eda29da675 |
|
15-Nov-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add utility function to sanitize LDAP/LDB filters
Also adds a unit test. |
50b2537f88bfe1d1eacd25818bbac50aec86d21c |
|
13-Oct-2010 |
Sumit Bose <sbose@redhat.com> |
Add a missing include file
strcasecmp() is defined in strings.h which might not be included under
certain conditions. |
3b1df539835367cb81cd5ff0f9959947d5642e55 |
|
09-Oct-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add common hash table setup
sss_hash_create() produces a dhash table living in the talloc
hierarchy. |
e5ba9ef0d556a6195db692f87deedbefc2fbef17 |
|
08-Sep-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Add safe copy/move macros for uint16_t |
dae0af263a9490c57962c2d43ede2083d618e637 |
|
03-Aug-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add dup_string_list() utility function |
dbd09f5703d721a58210e490609cfacb7eb56fcf |
|
03-Aug-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add diff_string_lists utility function
Includes a unit test |
5c705137ea853613318a29f0cd760688ab4daef3 |
|
09-Jul-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add sss_log() function
Right now, this log function writes to the syslog. In the future,
it could be modified to work with ELAPI or another logging API. |
8b420102e0d91edb2acbd2e8a40fc7d9995de2ba |
|
27-May-2010 |
Sumit Bose <sbose@redhat.com> |
Move parse_args() to util |
ebb6e30d687a4d6626c735234c85cbb5b06a26aa |
|
16-May-2010 |
Sumit Bose <sbose@redhat.com> |
Add ldap_krb5_ticket_lifetime option |
67607dda05e36c4d0be4647160ad376b89d89c51 |
|
07-May-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Clean up kdcinfo and kpasswdinfo files when exiting |
ff57c6aeb80a52b1f52bd1dac9308a69dc7a4774 |
|
16-Apr-2010 |
eindenbom <eindenbom@gmail.com> |
Avoid accessing half-deallocated memory when using talloc_zfree macro.
The correct memory deallocation sequence is:
- clear pointer to memory first
- then deallocate memory |
55a0f220ba8b35d7ea8e47ad19babdb05dd2bbe9 |
|
06-Apr-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Protect against check-and-open race conditions
There is a small window between running lstat() on a filename and
opening it where it's possible for the file to have been modified.
We were protecting against this by saving the stat data from the
original file and verifying that it was the same file (by device
and inode) when we opened it again, but this is an imperfect
solution, as it is still possible for an attacker to modify the
permissions during this window.
It is much better to simply open the file and test on the active
file descriptor.
Resolves https://fedorahosted.org/sssd/ticket/425 incidentally, as
without the initial lstat, we are implicitly accepting symlinks
and only verifying the target file. |
71cd2f7ce705561d8d8f3cb7f385a57bedad1ef1 |
|
08-Mar-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Reopen logs when SIGHUP is caught
Upon receiving SIGHUP, the monitor signals all services to reopen their
debug logs. It is also possible to signal individual services to reopen
their particular files.
Fixes: #332 |
6adf5b8a078f2b37f2d3d91cd060b891c2a7efaa |
|
03-Mar-2010 |
Simo Sorce <ssorce@redhat.com> |
Improve safe alignment buffer handling macros
Make the counter optional so that alignment safe macros can be used also where
there is no counter to update.
Change arguments names so that they are not deceiving (ptr normlly identify a
pointer)
Turn the memcpy substitute into an inline function so that passing a pointer to
rp and checking for it doesn't make the compiler spit lots of warnings. |
978bea5902ece9b9f01d1d6525dbe0889a410ffc |
|
23-Feb-2010 |
Sumit Bose <sbose@redhat.com> |
Check and set permissions on SBUS sockets |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |