summaryrefslogtreecommitdiffstats
path: root/Makefile.am
Commit message (Collapse)AuthorAgeFilesLines
* ldap: Fallback option for rfc2307 schemaSimo Sorce2013-04-151-0/+1
| | | | | | | | | | | Add option to fallback to fetch local users if rfc2307is being used. This is useful for cases where people added local users as LDAP members and rely on these group memberships to be maintained on the local host. Disabled by default as it violates identity domain separation. Ticket: https://fedorahosted.org/sssd/ticket/1020
* Resolve GIDs in the simple access providerJakub Hrozek2013-04-151-4/+13
| | | | | | | | | | | | | | Changes the simple access provider's interface to be asynchronous. When the simple access provider encounters a group that has gid, but no meaningful name, it attempts to resolve the name using the be_file_account_request function. Some providers (like the AD provider) might perform initgroups without resolving the group names. In order for the simple access provider to work correctly, we need to resolve the groups before performing the access check. In AD provider, the situation is even more tricky b/c the groups HAVE name, but their name attribute is set to SID and they are set as non-POSIX
* TOOLS: Refresh memcache after changes to local users and groupsJakub Hrozek2013-01-151-2/+8
|
* TOOLS: Split querying nss responder into a separate functionJakub Hrozek2013-01-151-6/+11
| | | | | | The tools query the responder in order to sync the memcache after performing changes to the local database. The functions will be reused by other tools so I split them into a separate functions.
* TOOLS: move memcache related functions to tools_mc_utils.cJakub Hrozek2013-01-151-0/+1
| | | | | | | The upcoming patches will link only users of this file with client libs, so it's better to have it separate. There is no functional change in this patch
* Add tests for get_gids_from_pac()Sumit Bose2013-01-081-0/+1
|
* Add responder_sbus.h to noinst_HEADERS1.9.2-50Jakub Hrozek2012-12-181-0/+1
|
* tools: sss_userdel and groupdel remove entries from memory cache1.9.2-44Michal Zidek2012-12-141-0/+8
| | | | https://fedorahosted.org/sssd/ticket/1659
* link sss_ssh_authorizedkeys and sss_ssh_knownhostsproxy with -lpthreadTimo Aaltonen2012-12-141-0/+2
| | | | | | | | There used to be an overlinked dependency that's gone now, so to fix a build error add CLIENT_LIBS to sss_ssh_knownhostsproxy_LDFLAGS. v2: Fix sss_ssh_authorizedkeys linking as well.
* avoid versioning libsss_sudoPavel Březina2012-12-061-3/+4
|
* Include the auth_utils.h header in the distributionJakub Hrozek2012-11-151-0/+1
|
* util: Added new file util_lock.cMichal Zidek2012-11-061-1/+2
|
* krb5_child: send PAC to PAC responderSumit Bose2012-11-051-2/+4
| | | | | | If the authenticated user comes from a different realm the service ticket which was returned during the validation of the TGT is used to extract the PAC which is send to the pac responder for evaluation.
* Remove libsss_sudo.pc and move libsss_sudo.so to libsss_sudoJakub Hrozek2012-10-121-1/+0
|
* BUILD: Include the patch file in the tarballStephen Gallagher2012-10-011-0/+1
|
* Adding -std=gnu99 flag.Michal Zidek2012-09-041-1/+2
|
* RPM: Switch the default ccache locationJakub Hrozek2012-08-281-0/+1
| | | | https://fedorahosted.org/sssd/ticket/1500
* Use PTHREAD_MUTEX_ROBUST to avoid deadlock in the clientJakub Hrozek2012-08-271-1/+11
| | | | https://fedorahosted.org/sssd/ticket/1460
* Clean up cache on server reinitializationPavel Březina2012-08-231-0/+1
| | | | | | | | | | | | | | | | | | https://fedorahosted.org/sssd/ticket/734 We successfully detect when the server is reinitialized by testing the new lastUSN value. The maximum USN values are set to zero, but the current cache content remains. This patch removes records that were deleted from the server. It uses the following approach: 1. remove entryUSN attribute from all entries 2. run enumeration 3. remove records that doesn't have entryUSN attribute updated We don't need to do this for sudo rules, they will be refreshed automatically during next smart/full refresh, or when an expired rule is deleted.
* Add python bindings for murmurhash3Sumit Bose2012-08-151-3/+18
|
* tests: build sysdb ssh tests conditionallyPavel Březina2012-08-031-1/+4
|
* Create a domain-realm mapping for krb5.conf to be includedJakub Hrozek2012-08-011-0/+1
| | | | | | | | When new subdomains are discovered, the SSSD creates a file that includes the domain-realm mappings. This file can in turn be included in the krb5.conf using the includedir directive, such as: includedir /var/lib/sss/pubconf/realm_mappings
* First-boot sss_seed toolNick Guay2012-08-011-1/+9
|
* Added unit test for sysdb_ssh.cMichal Zidek2012-08-011-0/+14
|
* Write SELinux config files in responder instead of PAM moduleJan Zeleny2012-07-271-1/+1
|
* tests: allow changing cwd in all testsPavel Březina2012-07-271-1/+4
|
* Renamed session provider to selinux providerJan Zeleny2012-07-271-2/+2
|
* pac responder: limit access by checking UIDsSumit Bose2012-07-101-1/+16
| | | | | | | | | | | | A check for allowed UIDs is added in the common responder code directly after accept(). If the platform does not support reading the UID of the peer but allowed UIDs are configured, access is denied. Currently only the PAC responder sets the allowed UIDs for a socket. The default is that only root is allowed to access the socket of the PAC responder. Fixes: https://fedorahosted.org/sssd/ticket/1382
* AD: Add manpages and SSSDConfig entriesStephen Gallagher2012-07-061-0/+1
|
* AD: Add AD access-control providerStephen Gallagher2012-07-061-0/+2
| | | | | This patch adds support for checking whether a user is expired or disabled in AD.
* AD: Add AD identity providerStephen Gallagher2012-07-061-0/+42
| | | | | | This new identity provider takes advantage of existing code for the LDAP provider, but provides sensible defaults for operating against an Active Directory 2008 R2 or later server.
* KRB5: Create a common init routine for krb5_child optionsStephen Gallagher2012-07-061-1/+3
| | | | | This will reduce code duplication between the krb5, ipa and ad providers
* sudo ldap provider: load host filter configuration on initPavel Březina2012-06-291-0/+1
| | | | | | | We need to load host information during provider initialization. Currently it loads only values from configuration files, but it is implemented as an asynchrounous request as it will later try to autodetect these settings (which will need to contact DNS).
* sudo ldap provider: add new timer APIPavel Březina2012-06-291-0/+1
|
* sudo provider: remove old timerPavel Březina2012-06-291-2/+0
|
* sudo ldap provider: move async routines to sdap_async_sudo.cPavel Březina2012-06-291-0/+1
|
* sudo responder: discard in-memory cachePavel Březina2012-06-291-1/+0
|
* libsss_sudo: bump version to 2:0:1Pavel Březina2012-06-291-1/+1
|
* Build pac responder tests only if pac responder is buildSumit Bose2012-06-251-2/+6
|
* Add support for ID rangesSumit Bose2012-06-211-0/+1
|
* PAC client: add krb5 authdata pluginSumit Bose2012-06-211-0/+21
|
* PAC responder: test suiteJan Zeleny2012-06-211-1/+18
|
* PAC responder: add some utility functionsJan Zeleny2012-06-211-0/+1
|
* PAC responder: add basic infrastructureSumit Bose2012-06-211-0/+21
| | | | | This adds only the basic outline of the PAC responder, it won't support any operations, it will just start and initialize itself.
* Add a credential cache back end structureJakub Hrozek2012-06-141-0/+3
| | | | | | To be able to add support for new credential cache types easily, this patch creates a new structure sss_krb5_cc_be that defines common operations with a credential cache, such as create, check if used or remove.
* Add a krb5_child test toolJakub Hrozek2012-06-141-0/+24
| | | | https://fedorahosted.org/sssd/ticket/1127
* LDAP: Add support for AD chain matching extension in initgroupsStephen Gallagher2012-06-131-0/+1
|
* LDAP: Add support for AD chain matching extension in group lookupsStephen Gallagher2012-06-131-0/+1
|
* SSSDConfig: Make default config and schema file locations configurableStephen Gallagher2012-05-311-5/+27
| | | | https://fedorahosted.org/sssd/ticket/1008
* SSSDConfig: Make SSSDConfig a packageStephen Gallagher2012-05-311-3/+3
| | | | | We were polluting the primary Python space with several dependencies. We will now install them their own directory/module.