summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* NSS: Fix off-by-one error in parse_getservbynameJakub Hrozek2012-09-131-1/+1
| | | | https://fedorahosted.org/sssd/ticket/1438
* backend: initialize sudo only when it is enabled in servicesPavel Březina2012-09-121-3/+63
| | | | | | | https://fedorahosted.org/sssd/ticket/1458 When the responder is disabled and sudo_provider is set explicitly, a warning is print and the module will be initialized.
* be_process_init(): free ctx on errorPavel Březina2012-09-121-15/+21
|
* netgroup: resolve hostgroup membership correctlyPavel Březina2012-09-121-1/+1
| | | | | | | | https://fedorahosted.org/sssd/ticket/1519 IPA host refactoring changed mapping of memberOf attribute which caused SSSD being unable to retrieve membership of hostgroup when being interpreted as netgroup.
* Remove obsolete commentSimo Sorce2012-09-121-5/+0
| | | | Made obsolete by commit e2d17ea806d273784b621583dd0490c2f69f237d
* KRB5: Add a missing string argumentJakub Hrozek2012-09-101-1/+2
|
* SYSDB: NULL-terminate the output of sysdb_get_{ranges,subdomains}Jakub Hrozek2012-09-103-4/+7
|
* RPM: BuildRequire selinux-policy-targetedJakub Hrozek2012-09-101-0/+1
| | | | | | selinux-policy-targeted contains the /etc/selinux/targeted/logins directory that is checked during build time to determine if the platform supports SELinux user logins.
* KRB5: Return PAM_AUTH_ERR on incorrect passwordJakub Hrozek2012-09-101-19/+32
| | | | https://fedorahosted.org/sssd/ticket/1515
* KRB5: cancel the sysdb transaction on one place onlyJakub Hrozek2012-09-101-1/+0
| | | | | | | https://fedorahosted.org/sssd/ticket/1516 If sysdb_set_user_attr failed, we would cancel the transaction, then go to the error handler and attempt to close it again.
* Out-of-bounds read fix in hmac-sha-1Ondrej Kos2012-09-071-1/+3
|
* libsss_sudo should have a versioned dependency on SSSDJakub Hrozek2012-09-071-0/+1
| | | | https://fedorahosted.org/sssd/ticket/1509
* Bumping version for the 1.9.0 beta 7 releaseJakub Hrozek2012-09-051-1/+1
|
* Update translations for 1.9.0 beta 7 releasesssd-1_9_0_beta7sssd-1_8_97Jakub Hrozek2012-09-0534-8623/+15821
|
* SIGUSR2 should force SSSD to reread resolv.conf as wellAriel Barria2012-09-051-2/+19
|
* Don't terminate the same connection twiceJakub Hrozek2012-09-051-6/+0
| | | | https://fedorahosted.org/sssd/ticket/1488
* Retry the next server if bind during LDAP auth times outJakub Hrozek2012-09-051-1/+6
|
* SYSDB: Abort unit test if sysdb_getpwnam failsJakub Hrozek2012-09-051-0/+3
|
* SYSDB: Commit transaction in sysdb_store_userJakub Hrozek2012-09-051-17/+19
|
* Unify usage of sysdb transactions (part 2).Michal Zidek2012-09-049-270/+330
|
* Check flat names when searching for sub-domains as wellSumit Bose2012-09-041-1/+3
|
* SSH: Add support for OpenSSH-style public keysJan Cholasta2012-09-041-13/+37
|
* SSH: Simplify public key formatting functionJan Cholasta2012-09-044-46/+12
|
* SSH: Return error code in SSH utility functionsJan Cholasta2012-09-044-29/+54
|
* Adding -std=gnu99 flag.Michal Zidek2012-09-041-1/+2
|
* Check if the SELinux login directory existsJakub Hrozek2012-09-043-3/+13
| | | | https://fedorahosted.org/sssd/ticket/1492
* RPM: Always include the patch fileJakub Hrozek2012-08-291-2/+0
|
* RPM: Switch the default ccache locationJakub Hrozek2012-08-283-1/+29
| | | | https://fedorahosted.org/sssd/ticket/1500
* Use PTHREAD_MUTEX_ROBUST to avoid deadlock in the clientJakub Hrozek2012-08-273-8/+115
| | | | https://fedorahosted.org/sssd/ticket/1460
* Use new debug levels in validate_tgt()Sumit Bose2012-08-241-13/+16
|
* Fix fallback in validate_tgt()Sumit Bose2012-08-241-8/+20
| | | | | | | | | | To validate a TGT a keytab entry from the client realm is preferred but if none ca be found the last entry should be used. But the entry was freed and zeroed before it could be used. This should also fix the trusted domain use case mentioned in https://fedorahosted.org/sssd/ticket/1396 although a different approach then suggested in the ticket is used.
* Fix: IPv6 address with square brackets doesn't work.Michal Zidek2012-08-236-1/+67
| | | | https://fedorahosted.org/sssd/ticket/1365
* Unify usage of sysdb transactionsMichal Zidek2012-08-2320-67/+270
| | | | | | Removing bad examples of usage of sysdb_transaction_start/commit/end functions and making it more consistent (all files except of src/db/sysdb_*.c).
* Typo in debug message (SSSd -> SSSD).Michal Zidek2012-08-231-1/+1
| | | | https://fedorahosted.org/sssd/ticket/1434
* Clean up cache on server reinitializationPavel Březina2012-08-236-4/+404
| | | | | | | | | | | | | | | | | | https://fedorahosted.org/sssd/ticket/734 We successfully detect when the server is reinitialized by testing the new lastUSN value. The maximum USN values are set to zero, but the current cache content remains. This patch removes records that were deleted from the server. It uses the following approach: 1. remove entryUSN attribute from all entries 2. run enumeration 3. remove records that doesn't have entryUSN attribute updated We don't need to do this for sudo rules, they will be refreshed automatically during next smart/full refresh, or when an expired rule is deleted.
* Consolidation of functions that make realm upper-caseOndrej Kos2012-08-235-31/+28
|
* AD context was set to null due to type mismatchOndrej Kos2012-08-233-1/+14
|
* Remove compilation warning: ret may be uninitializedPavel Březina2012-08-211-0/+2
|
* Unbreak build on RHEL5: replace ldap_destroy() with ldap_unbind_ext()Pavel Březina2012-08-211-1/+1
| | | | ldap_destroy() is not present in RHEL5
* Close LDAP connection when unable to install TLSPavel Březina2012-08-211-13/+13
| | | | | | | We were not closing LDAP connection when using SSL with invalid certificate. https://fedorahosted.org/sssd/ticket/1490
* accept_fd_handler: add missing returnSumit Bose2012-08-211-0/+1
|
* SYSDB: Make sysdb_attrs_get_el_int() publicStephen Gallagher2012-08-212-8/+10
| | | | Also rename it to sysdb_attrs_get_el_ext()
* Process all groups from a single nesting levelJakub Hrozek2012-08-211-4/+14
| | | | | | | | https://bugzilla.redhat.com/show_bug.cgi?id=846664 If the first group was cached when processing the nested group membership, we would call tevent_req_done, effectivelly marking the whole nesting level as done.
* Fix compilation error in Python murmurhash bindingsJakub Hrozek2012-08-162-4/+10
| | | | | | The compilation produced an error due to missing declaration of uint32_t and a couple of warnings caused by different prototypes of argument parsing functions in older Python releases.
* Only create the SELinux login file if there are mappings on the serverJakub Hrozek2012-08-162-51/+78
| | | | | | | | | | | https://fedorahosted.org/sssd/ticket/1455 In case there are no rules on the IPA server, we must simply avoid generating the login file. That would make us fall back to the system-wide default defined in /etc/selinux/targeted/seusers. The IPA default must be only used if there *are* rules on the server, but none matches.
* Do not try to remove the temp login file if already renamedJakub Hrozek2012-08-161-2/+3
| | | | | | | | | write_selinux_string() would try to unlink the temporary file even after it was renamed. Failure to unlink the file would not be fatal, but would produce a confusing error message. Also don't use "0" for the default fd number, that's reserved for stdin. Using -1 is safer.
* Build SELinux code in responder conditionallyJakub Hrozek2012-08-161-0/+7
| | | | https://fedorahosted.org/sssd/ticket/1480
* Fix LOCAL domain lookupsPavel Březina2012-08-151-19/+22
| | | | | | https://fedorahosted.org/sssd/ticket/1436 Now subdomains are not evaluated for local domains.
* Add python bindings for murmurhash3Sumit Bose2012-08-154-3/+184
|
* KRB5: Only return PAM error for unreachable kpasswd when performing chpassJakub Hrozek2012-08-151-2/+4
| | | | https://fedorahosted.org/sssd/ticket/1452