summaryrefslogtreecommitdiffstats
path: root/src/providers/ldap/sdap_async_groups_ad.c
diff options
context:
space:
mode:
authorJakub Hrozek <jhrozek@redhat.com>2013-07-31 10:59:43 +0200
committerJakub Hrozek <jhrozek@redhat.com>2014-06-03 11:31:59 +0200
commit2969084519478a5ad75ba44d6039941216a7572c (patch)
treee0c1f6f660a50f2b46dda982aec779e5fc4d2203 /src/providers/ldap/sdap_async_groups_ad.c
parent7f42b25ce49b818b534015d078bd51ee612c465c (diff)
downloadsssd-2969084519478a5ad75ba44d6039941216a7572c.tar.gz
sssd-2969084519478a5ad75ba44d6039941216a7572c.tar.xz
sssd-2969084519478a5ad75ba44d6039941216a7572c.zip
LDAP: Make it possible to extend an attribute map
https://fedorahosted.org/sssd/ticket/2073 This commit adds a new option ldap_user_extra_attrs that is unset by default. When set, the option contains a list of LDAP attributes the LDAP provider would download and store in addition to the usual set. The list can either contain LDAP attribute names only, or colon-separated tuples of LDAP attribute and SSSD cache attribute name. In case only LDAP attribute name is specified, the attribute is saved to the cache verbatim. Using a custom SSSD attribute name might be required by environments that configure several SSSD domains with different LDAP schemas. Reviewed-by: Simo Sorce <simo@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Diffstat (limited to 'src/providers/ldap/sdap_async_groups_ad.c')
-rw-r--r--src/providers/ldap/sdap_async_groups_ad.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/providers/ldap/sdap_async_groups_ad.c b/src/providers/ldap/sdap_async_groups_ad.c
index 9bb21d29b..8db587c96 100644
--- a/src/providers/ldap/sdap_async_groups_ad.c
+++ b/src/providers/ldap/sdap_async_groups_ad.c
@@ -72,7 +72,7 @@ sdap_get_ad_match_rule_members_send(TALLOC_CTX *mem_ctx,
state->search_bases = opts->sdom->user_search_bases;
/* Request all of the user attributes that we know about. */
- ret = build_attrs_from_map(state, opts->user_map, SDAP_OPTS_USER,
+ ret = build_attrs_from_map(state, opts->user_map, opts->user_map_cnt,
NULL, &state->attrs, NULL);
if (ret != EOK) {
DEBUG(SSSDBG_MINOR_FAILURE,
@@ -157,7 +157,7 @@ sdap_get_ad_match_rule_members_next_base(struct tevent_req *req)
state->search_bases[state->base_iter]->basedn,
state->search_bases[state->base_iter]->scope,
state->filter, state->attrs,
- state->opts->user_map, SDAP_OPTS_USER,
+ state->opts->user_map, state->opts->user_map_cnt,
state->timeout, true);
if (!subreq) {
return ENOMEM;