summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Update translations for 1.9.0 beta 4 releasesssd-1_9_0_beta4sssd-1_8_94Jakub Hrozek2012-07-1032-9370/+15153
|
* Cast uid_t to unsigned long long in DEBUG messagesJakub Hrozek2012-07-104-10/+11
|
* Print based on pointer contents not addressJakub Hrozek2012-07-101-1/+3
|
* Fix segfault when using local providerStephen Gallagher2012-07-101-6/+5
| | | | | | | | | The name context was not being initialized for local provider domains because it was handled after skipping over the back-end initialization routine. This patch moves the name context init routine to occur earlier. https://fedorahosted.org/sssd/ticket/1412
* pac responder: limit access by checking UIDsSumit Bose2012-07-1010-11/+394
| | | | | | | | | | | | A check for allowed UIDs is added in the common responder code directly after accept(). If the platform does not support reading the UID of the peer but allowed UIDs are configured, access is denied. Currently only the PAC responder sets the allowed UIDs for a socket. The default is that only root is allowed to access the socket of the PAC responder. Fixes: https://fedorahosted.org/sssd/ticket/1382
* Remove dead code in ipa_subdomains_handler_done()Sumit Bose2012-07-101-1/+1
| | | | Fixes https://fedorahosted.org/sssd/ticket/1410
* Remove resource leak in sssdpac_import_authdataSumit Bose2012-07-101-3/+1
| | | | Fixes https://fedorahosted.org/sssd/ticket/1409
* Fix incorrect error-checkStephen Gallagher2012-07-091-1/+1
| | | | Coverity #12770
* Check for errors from krb5_unparse_nameStephen Gallagher2012-07-091-1/+8
| | | | Coverity #12781
* Add missing return value checkStephen Gallagher2012-07-091-1/+1
| | | | Coverity #12782
* Avoid NULL-dereference in error-handlingStephen Gallagher2012-07-091-1/+3
| | | | Coverity #12783
* Fix uninitialized memcpy errorStephen Gallagher2012-07-091-0/+2
| | | | Coverity #12784
* Fix uninitialized value returnStephen Gallagher2012-07-091-1/+1
| | | | Coverity #12786
* Fix potential NULL-dereferenceStephen Gallagher2012-07-091-1/+3
| | | | Coverity #12797
* Fix incorrect return value in testsStephen Gallagher2012-07-091-0/+2
| | | | Coverity #12798
* Fix potential NULL-dereferenceStephen Gallagher2012-07-091-1/+2
| | | | Coverity #12800
* Fix potential NULL-dereferenceStephen Gallagher2012-07-091-1/+3
| | | | Coverity #12801
* Fix uninitialized variableStephen Gallagher2012-07-091-0/+1
| | | | Coverity #12802
* Fix use-after-freeStephen Gallagher2012-07-091-0/+1
| | | | Coverity #12803
* heimdal: use sss_krb5_princ_realm to access realmRambaldi2012-07-091-4/+11
|
* heimdal: fix compile error in krb5-child-testRambaldi2012-07-092-0/+5
|
* Revert commit 4c157ecedd52602f75574605ef48d0c48e9bfbe8Stef Walter2012-07-064-187/+0
| | | | | | | | * This broke corner cases when used with default_tkt_types = des-cbc-crc and DES enabled on an AD domain. * This is fixed in kerberos instead, in a more correct way and in a way which we cannot replicate.
* AD: Force case-insensitive operation in AD providerStephen Gallagher2012-07-061-0/+18
|
* CONFDB: Add the ability to set a boolean value in the confdbStephen Gallagher2012-07-062-0/+80
|
* AD: Add manpages and SSSDConfig entriesStephen Gallagher2012-07-069-2/+290
|
* AD: use krb5_keytab for validation and GSSAPIStephen Gallagher2012-07-063-3/+12
| | | | | | This simplifies configuration by eliminating the need to specifiy both krb5_keytab and ldap_krb5_keytab if the keytab is not located at /etc/krb5.keytab
* AD: Add AD provider to the spec fileStephen Gallagher2012-07-061-0/+1
|
* AD: Add AD access-control providerStephen Gallagher2012-07-065-1/+190
| | | | | This patch adds support for checking whether a user is expired or disabled in AD.
* AD: Add AD auth and chpass providersStephen Gallagher2012-07-064-1/+159
| | | | | | These new providers take advantage of existing code for the KRB5 provider, providing sensible defaults for operating against an Active Directory 2008 R2 or later server.
* AD: Add AD identity providerStephen Gallagher2012-07-068-0/+1316
| | | | | | This new identity provider takes advantage of existing code for the LDAP provider, but provides sensible defaults for operating against an Active Directory 2008 R2 or later server.
* LDAP: Rename user and group maps for ADStephen Gallagher2012-07-062-4/+4
| | | | This will eliminate ambiguity for the AD provider
* KRB5: Create a common init routine for krb5_child optionsStephen Gallagher2012-07-065-99/+138
| | | | | This will reduce code duplication between the krb5, ipa and ad providers
* KRB5: Drop memctx parameter of krb5_try_kdcipStephen Gallagher2012-07-064-15/+17
| | | | | | | | | | | | | | | | This function is not supposed to return any newly-allocated memory directly. It was actually leaking the memory for krb5_servers if krb5_kdcip was being used, though it was undetectable because it was allocated on the provided memctx. This patch removes the memctx parameter and allocates krb5_servers temporarily on NULL and ensures that it is freed on all exit conditions. It is not necessary to retain this memory, as dp_opt_set_string() performs a talloc_strdup onto the appropriate context internally. It also updates the DEBUG messages for this function to the appropriate new macro levels.
* KRB5_LOCATOR: Print the filename that couldn't be openedStephen Gallagher2012-07-061-1/+2
|
* KRB5: Some logging enhancements for krb5_childStephen Gallagher2012-07-061-6/+13
|
* MAN: Unify "SEE ALSO" sectionsStephen Gallagher2012-07-0622-331/+111
|
* Set file descriptor limits in pac responderSumit Bose2012-07-061-0/+15
|
* Fix SSSDConfigTest for separate build directoriesSumit Bose2012-07-061-8/+9
|
* Fix crash when interface doesn't have an addressStef Walter2012-07-061-0/+3
| | | | * This is similar to the code in ipa_dyndns_update_send()
* LDAP: Print extended failure message for SASL bindStephen Gallagher2012-07-021-2/+14
|
* IPA: Don't hang onto memory longer than necessaryStephen Gallagher2012-07-021-0/+1
| | | | | This request and attached memory would be freed at the end of access-check processing, but it's a waste to keep it around.
* Fix segfault when sudo is not configured.Simo Sorce2012-06-301-1/+2
| | | | | Sudo support is optional, when it is not configured sudorules_map is not initialized and dereferencing it will cause a segmentation fault.
* KRB5: Initialize the credential cache type properlyStephen Gallagher2012-06-291-0/+11
| | | | | | | | | We weren't guaranteeing that the cctype-specific callbacks were initialized before using them. This bug only presented itself for users who were logging in without a ccacheFile attribute in the LDB (for example, first-time logins).
* DEBUG: Log to syslog if we are unable to open a debug fdStephen Gallagher2012-06-291-0/+5
|
* TESTS: Print messages when LDAP options do not matchStephen Gallagher2012-06-291-2/+10
|
* sudo: manpage updatedPavel Březina2012-06-292-34/+131
| | | | Removes old options and adds new ones.
* sudo ldap provider: support autoconfiguration of IP addressesPavel Březina2012-06-291-1/+179
| | | | | sudoHost attribute may contain IPv4 or IPv6 host/network address. This patch adds support for autoconfiguration of these information.
* sudo ldap provider: do per-host updatesPavel Březina2012-06-291-3/+160
| | | | Add host information to LDAP filters.
* sudo ldap provider: mark sdap_sudo_setup_periodical_refresh() as staticPavel Březina2012-06-291-2/+2
|
* sudo ldap provider: load host filter configuration on initPavel Březina2012-06-296-5/+186
| | | | | | | We need to load host information during provider initialization. Currently it loads only values from configuration files, but it is implemented as an asynchrounous request as it will later try to autodetect these settings (which will need to contact DNS).