<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd.git/src/responder/pam, branch refactor</title>
<subtitle>sssd with jhrozek's patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/'/>
<entry>
<title>Add new option default_domain_suffix</title>
<updated>2012-10-01T19:45:21+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-09-21T16:30:30+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=1542b85f13d72329685bdd97aa879c36d11f81be'/>
<id>1542b85f13d72329685bdd97aa879c36d11f81be</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SELinux: Always use the default if it exists on the server</title>
<updated>2012-09-13T16:11:59+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-09-13T08:07:29+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=ebb1f28998c06984765e3e78d30911c1c3ec84e2'/>
<id>ebb1f28998c06984765e3e78d30911c1c3ec84e2</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1513

This is a counterpart of the FreeIPA ticket https://fedorahosted.org/freeipa/ticket/3045

During an e-mail discussion, it was decided that

    * if the default is set in the IPA config object, the SSSD would use
      that default no matter what
    * if the default is not set (aka empty or missing), the SSSD
      would just use the system default and skip creating the login
      file altogether
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1513

This is a counterpart of the FreeIPA ticket https://fedorahosted.org/freeipa/ticket/3045

During an e-mail discussion, it was decided that

    * if the default is set in the IPA config object, the SSSD would use
      that default no matter what
    * if the default is not set (aka empty or missing), the SSSD
      would just use the system default and skip creating the login
      file altogether
</pre>
</div>
</content>
</entry>
<entry>
<title>Check if the SELinux login directory exists</title>
<updated>2012-09-04T08:14:18+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-08-27T06:23:57+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=3d038d2e0dc7af04ec2f7c85ae325accb39f6237'/>
<id>3d038d2e0dc7af04ec2f7c85ae325accb39f6237</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1492
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1492
</pre>
</div>
</content>
</entry>
<entry>
<title>Only create the SELinux login file if there are mappings on the server</title>
<updated>2012-08-16T11:31:03+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-08-05T20:37:09+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=f004e23af14fe020d81b8f97f30b448105b79606'/>
<id>f004e23af14fe020d81b8f97f30b448105b79606</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1455

In case there are no rules on the IPA server, we must simply avoid generating
the login file. That would make us fall back to the system-wide default
defined in /etc/selinux/targeted/seusers.

The IPA default must be only used if there *are* rules on the server,
but none matches.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1455

In case there are no rules on the IPA server, we must simply avoid generating
the login file. That would make us fall back to the system-wide default
defined in /etc/selinux/targeted/seusers.

The IPA default must be only used if there *are* rules on the server,
but none matches.
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not try to remove the temp login file if already renamed</title>
<updated>2012-08-16T11:30:58+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-08-05T20:03:11+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=79402313dc0d7f854b4334dd427e03b7baf0b9db'/>
<id>79402313dc0d7f854b4334dd427e03b7baf0b9db</id>
<content type='text'>
write_selinux_string() would try to unlink the temporary file even after
it was renamed. Failure to unlink the file would not be fatal, but would
produce a confusing error message.

Also don't use "0" for the default fd number, that's reserved for stdin.
Using -1 is safer.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
write_selinux_string() would try to unlink the temporary file even after
it was renamed. Failure to unlink the file would not be fatal, but would
produce a confusing error message.

Also don't use "0" for the default fd number, that's reserved for stdin.
Using -1 is safer.
</pre>
</div>
</content>
</entry>
<entry>
<title>Build SELinux code in responder conditionally</title>
<updated>2012-08-16T09:11:24+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-08-15T13:10:42+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=af824bac568ebe8a03273f73246ac78b415ea756'/>
<id>af824bac568ebe8a03273f73246ac78b415ea756</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1480
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1480
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix bad check</title>
<updated>2012-08-01T19:13:07+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-08-01T16:11:22+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=39b20025db12d88cd564666b3de0dbe0ce09ff2c'/>
<id>39b20025db12d88cd564666b3de0dbe0ce09ff2c</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Write SELinux config files in responder instead of PAM module</title>
<updated>2012-07-27T12:46:16+00:00</updated>
<author>
<name>Jan Zeleny</name>
<email>jzeleny@redhat.com</email>
</author>
<published>2012-07-27T07:35:38+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=300c772767c1b12077cac1d148ac89738b058f97'/>
<id>300c772767c1b12077cac1d148ac89738b058f97</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Move SELinux processing from session to account PAM stack</title>
<updated>2012-07-27T08:37:06+00:00</updated>
<author>
<name>Jan Zeleny</name>
<email>jzeleny@redhat.com</email>
</author>
<published>2012-07-24T19:36:10+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=7016947229edcaa268a82bf69fde37e521b13233'/>
<id>7016947229edcaa268a82bf69fde37e521b13233</id>
<content type='text'>
The idea is to rename session provider to selinux provider. Processing
of SELinux rules has to be performed in account stack in order to ensure
that pam_selinux (which is the first module in PAM session stack) will
get the correct input from SSSD.

Processing of account PAM stack is bound to access provider. That means
we need to have two providers executed when SSS_PAM_ACCT_MGMT message
is received from PAM responder. Change in data_provider_be.c ensures
just that - after access provider finishes its actions, the control is
given to selinux provider and only after this provider finishes is the
result returned to PAM responder.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The idea is to rename session provider to selinux provider. Processing
of SELinux rules has to be performed in account stack in order to ensure
that pam_selinux (which is the first module in PAM session stack) will
get the correct input from SSSD.

Processing of account PAM stack is bound to access provider. That means
we need to have two providers executed when SSS_PAM_ACCT_MGMT message
is received from PAM responder. Change in data_provider_be.c ensures
just that - after access provider finishes its actions, the control is
given to selinux provider and only after this provider finishes is the
result returned to PAM responder.
</pre>
</div>
</content>
</entry>
<entry>
<title>PAM: Fix off-by-one-error in the SELinux session code</title>
<updated>2012-07-18T19:10:38+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2012-07-18T18:35:45+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/jhrozek/public_git/sssd.git/commit/?id=5266c7472ffb94504b8249310aee5c8a5511a922'/>
<id>5266c7472ffb94504b8249310aee5c8a5511a922</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
