summaryrefslogtreecommitdiffstats
path: root/Makefile.am
Commit message (Collapse)AuthorAgeFilesLines
...
* BUILD: Build shared components as an internal shared libraryStephen Gallagher2013-03-011-6/+19
| | | | | | | There is a large amount of duplicated code being linked into multiple SSSD binaries. Instead of statically linking this code throughout the SSSD, we should instead create private shared libraries for them and drop this code on the system only once.
* Don't use srcdir with testsJakub Hrozek2013-02-041-3/+3
| | | | Fixes build with automake 1.13 or newer.
* Introduce be_req_terminate() helperSimo Sorce2013-01-211-1/+0
| | | | | Call it everywhere instead of directly dereferencing be_req->fn This is in preparation of making be_req opaque.
* Split simple_access_check function outSimo Sorce2013-01-211-1/+2
| | | | | Need to split out the function or new additions to the handler funtion will not allow simple access tests to compile anymore.
* Move ldap provider access functionsSimo Sorce2013-01-211-0/+1
| | | | | | It was confusing to see the ldap provider own handler mixed with the generic ldap access code used also by the ipa and ad providers. So move the ldap provider handler code in its own file.
* TOOLS: Refresh memcache after changes to local users and groupsJakub Hrozek2013-01-151-2/+8
|
* TOOLS: Split querying nss responder into a separate functionJakub Hrozek2013-01-151-6/+11
| | | | | | The tools query the responder in order to sync the memcache after performing changes to the local database. The functions will be reused by other tools so I split them into a separate functions.
* TOOLS: move memcache related functions to tools_mc_utils.cJakub Hrozek2013-01-151-0/+1
| | | | | | | The upcoming patches will link only users of this file with client libs, so it's better to have it separate. There is no functional change in this patch
* Change pam data auth tokens.Simo Sorce2013-01-101-0/+2
| | | | Use the new authtok abstraction and interfaces throught the code.
* Add authtok utility functions.Simo Sorce2013-01-101-0/+2
| | | | | | These functions allow handling of auth tokens in a completely opaque way, with clear semantics and accessor fucntions that guarantee consistency, proper access to data and error conditions.
* Add tests for get_gids_from_pac()Sumit Bose2013-01-081-0/+1
|
* Add responder_sbus.h to noinst_HEADERSJakub Hrozek2012-12-181-0/+1
|
* tools: sss_userdel and groupdel remove entries from memory cacheMichal Zidek2012-12-131-0/+8
| | | | https://fedorahosted.org/sssd/ticket/1659
* link sss_ssh_authorizedkeys and sss_ssh_knownhostsproxy with -lpthreadTimo Aaltonen2012-12-041-0/+2
| | | | | | | | There used to be an overlinked dependency that's gone now, so to fix a build error add CLIENT_LIBS to sss_ssh_knownhostsproxy_LDFLAGS. v2: Fix sss_ssh_authorizedkeys linking as well.
* avoid versioning libsss_sudoPavel Březina2012-12-021-3/+4
|
* Include the auth_utils.h header in the distributionJakub Hrozek2012-11-121-0/+1
|
* util: Added new file util_lock.cMichal Zidek2012-11-061-1/+2
|
* krb5_child: send PAC to PAC responderSumit Bose2012-10-261-2/+4
| | | | | | If the authenticated user comes from a different realm the service ticket which was returned during the validation of the TGT is used to extract the PAC which is send to the pac responder for evaluation.
* Remove libsss_sudo.pc and move libsss_sudo.so to libsss_sudoJakub Hrozek2012-10-121-1/+0
|
* BUILD: Include the patch file in the tarballStephen Gallagher2012-10-011-0/+1
|
* Adding -std=gnu99 flag.Michal Zidek2012-09-041-1/+2
|
* RPM: Switch the default ccache locationJakub Hrozek2012-08-281-0/+1
| | | | https://fedorahosted.org/sssd/ticket/1500
* Use PTHREAD_MUTEX_ROBUST to avoid deadlock in the clientJakub Hrozek2012-08-271-1/+11
| | | | https://fedorahosted.org/sssd/ticket/1460
* Clean up cache on server reinitializationPavel Březina2012-08-231-0/+1
| | | | | | | | | | | | | | | | | | https://fedorahosted.org/sssd/ticket/734 We successfully detect when the server is reinitialized by testing the new lastUSN value. The maximum USN values are set to zero, but the current cache content remains. This patch removes records that were deleted from the server. It uses the following approach: 1. remove entryUSN attribute from all entries 2. run enumeration 3. remove records that doesn't have entryUSN attribute updated We don't need to do this for sudo rules, they will be refreshed automatically during next smart/full refresh, or when an expired rule is deleted.
* Add python bindings for murmurhash3Sumit Bose2012-08-151-3/+18
|
* tests: build sysdb ssh tests conditionallyPavel Březina2012-08-031-1/+4
|
* Create a domain-realm mapping for krb5.conf to be includedJakub Hrozek2012-08-011-0/+1
| | | | | | | | When new subdomains are discovered, the SSSD creates a file that includes the domain-realm mappings. This file can in turn be included in the krb5.conf using the includedir directive, such as: includedir /var/lib/sss/pubconf/realm_mappings
* First-boot sss_seed toolNick Guay2012-08-011-1/+9
|
* Added unit test for sysdb_ssh.cMichal Zidek2012-08-011-0/+14
|
* Write SELinux config files in responder instead of PAM moduleJan Zeleny2012-07-271-1/+1
|
* tests: allow changing cwd in all testsPavel Březina2012-07-271-1/+4
|
* Renamed session provider to selinux providerJan Zeleny2012-07-271-2/+2
|
* pac responder: limit access by checking UIDsSumit Bose2012-07-101-1/+16
| | | | | | | | | | | | A check for allowed UIDs is added in the common responder code directly after accept(). If the platform does not support reading the UID of the peer but allowed UIDs are configured, access is denied. Currently only the PAC responder sets the allowed UIDs for a socket. The default is that only root is allowed to access the socket of the PAC responder. Fixes: https://fedorahosted.org/sssd/ticket/1382
* AD: Add manpages and SSSDConfig entriesStephen Gallagher2012-07-061-0/+1
|
* AD: Add AD access-control providerStephen Gallagher2012-07-061-0/+2
| | | | | This patch adds support for checking whether a user is expired or disabled in AD.
* AD: Add AD identity providerStephen Gallagher2012-07-061-0/+42
| | | | | | This new identity provider takes advantage of existing code for the LDAP provider, but provides sensible defaults for operating against an Active Directory 2008 R2 or later server.
* KRB5: Create a common init routine for krb5_child optionsStephen Gallagher2012-07-061-1/+3
| | | | | This will reduce code duplication between the krb5, ipa and ad providers
* sudo ldap provider: load host filter configuration on initPavel Březina2012-06-291-0/+1
| | | | | | | We need to load host information during provider initialization. Currently it loads only values from configuration files, but it is implemented as an asynchrounous request as it will later try to autodetect these settings (which will need to contact DNS).
* sudo ldap provider: add new timer APIPavel Březina2012-06-291-0/+1
|
* sudo provider: remove old timerPavel Březina2012-06-291-2/+0
|
* sudo ldap provider: move async routines to sdap_async_sudo.cPavel Březina2012-06-291-0/+1
|
* sudo responder: discard in-memory cachePavel Březina2012-06-291-1/+0
|
* libsss_sudo: bump version to 2:0:1Pavel Březina2012-06-291-1/+1
|
* Build pac responder tests only if pac responder is buildSumit Bose2012-06-251-2/+6
|
* Add support for ID rangesSumit Bose2012-06-211-0/+1
|
* PAC client: add krb5 authdata pluginSumit Bose2012-06-211-0/+21
|
* PAC responder: test suiteJan Zeleny2012-06-211-1/+18
|
* PAC responder: add some utility functionsJan Zeleny2012-06-211-0/+1
|
* PAC responder: add basic infrastructureSumit Bose2012-06-211-0/+21
| | | | | This adds only the basic outline of the PAC responder, it won't support any operations, it will just start and initialize itself.
* Add a credential cache back end structureJakub Hrozek2012-06-141-0/+3
| | | | | | To be able to add support for new credential cache types easily, this patch creates a new structure sss_krb5_cc_be that defines common operations with a credential cache, such as create, check if used or remove.