summaryrefslogtreecommitdiffstats
path: root/server/providers/ldap/sdap_async.c
Commit message (Collapse)AuthorAgeFilesLines
* added generic LDAP search sdap_get_generic_send/_recvSumit Bose2009-10-221-0/+201
|
* Check for expired passwords in LDAP providerSumit Bose2009-10-151-0/+25
|
* Make options parser available to all providersSimo Sorce2009-10-141-32/+32
|
* make sdap_id_connect_* independent of sdap_id_ctxSumit Bose2009-10-141-0/+172
| | | | | | | | The sdap_id_connect_* request tries to bind to an LDAP server with the default credentials. Only the opts component of the sdap_id_ctx context is used. A new request sdap_cli_connect_* is created which expects only the opts pointer as parameter and not the whole context. This makes it reusable by other providers.
* add a replacement if ldap_control_create is missingSumit Bose2009-10-131-6/+6
|
* Differentiate between search and network timeoutsSimo Sorce2009-10-091-3/+3
| | | | | | Network timeouts are used in quick operations like bind. Search timeout is used for operations that can "legally" require more time. Change defaults to 6 and 60 seconds respectively.
* add support for server side LDAP password policiesSumit Bose2009-10-081-10/+119
| | | | | | | - password policy request controls are send during bind and change password extended operation - the response control is evaluated to see if the password is expired or will expire, soon
* remove redundant talloc_freeSumit Bose2009-10-051-3/+0
| | | | - this patch should fix bug #213, a double free in the sdap timeout handler
* Fix long timeout on ldap operationSimo Sorce2009-10-011-3/+12
| | | | | Always use the network timeout defined in the options. But raise defaults to 60 seconds or enumerations can easily fail.
* Initial implementation of sasl bind supportSimo Sorce2009-10-011-5/+382
| | | | | | Inits krb5 credentials, if sasl mech is GSSAPI. Tested with GSSAPI and host keytab as well as user credentials. Updates also manpages with the new options.
* Let backend respond while fetching large resultsSimo Sorce2009-09-251-2/+11
| | | | | | | Timers always come before fd events, wait 5 microseconds between processing operations so that tevent has a chance of cactching an fd event in between. This allows the backend to reply to pings even while processing very large ldap results (importanty especially during the first enumeration).
* Revert "Use syslog for logging error conditions in SSSD"Stephen Gallagher2009-09-231-3/+3
| | | | | | | | This reverts commit 8c50bd085c0efe5fde354deee2c8118887aae29d. Amended: commit 1016af2b1b97ad4290ccce8fa462cc7e3c191b2e also made use of the SYSLOG_ERROR() macro, so those portions of that code also needed to be reverted.
* Use syslog for logging error conditions in SSSDJakub Hrozek2009-09-211-3/+3
| | | | | This is just a band-aid until ELAPI is fully functional and ready to use.
* Check if SSL/TLS handler is already in placeSumit Bose2009-09-161-1/+8
| | | | | | | | | Authentication against a LDAP server should always use an encrypted connection. To acchive this the LDAP provider calls ldap_start_tls which will fail if the connection is already encrypted, e.g. if an ldaps tunnel is already established. Because the error message from ldap_start_tls is not specific we check the status with ldap_tls_inplace before calling ldap_start_tls.
* Turn ldap driver options into multitypeSimo Sorce2009-09-141-21/+24
| | | | | | | | | | This patch makes basic options multiype, the init function assigns a type from the initialization array, and processes values fetched from confdb accordingly. 4 types are supported so far: string, number, blob and boolean Also convert defines into enums where appropriate. Add fetch functions that check the requested type.
* Complete the removal of "legacy" option.Simo Sorce2009-09-111-21/+186
| | | | | | | | | The code was still dependent on it for the ldap driver. Changed the driver code to depend on the schema type. Fix defaults for user and groups trees. ATM if you use the rfc2307bis schema you have to put users and groups in 2 separate trees (what people does by default anyway. If this limitation will turn to be too hard, we will change this later.
* Fix memory mishandling.Simo Sorce2009-09-111-10/+7
| | | | | | | | By attaching the reply to a subreq, we ended up freeing the operations list element before we used it to skip to the next one. Do not steal the context and let the unlocking code free the old reply, when it moves onto processing the next one. Got this one with valgrind.
* Fix Ldap id backend offline codeSimo Sorce2009-09-101-8/+19
| | | | | | | After the recent changes we lost the capability to actually go offline. Put back code that would mark the backend as offline when timeouts happen. Make sure the enumeration code also obbeys the offline timeout, and contributes in determining if we are offline or not.
* Fix two possible uninitialized valuesSimo Sorce2009-09-081-1/+1
| | | | Make counter for used messages explicit.
* Avoid crash when timestamp is NULLRalf Haferkamp2009-09-031-1/+3
| | | | | Check if the timestamp argument of sdap_save_group_recv is NULL before using it.
* Fix initgroups search filter when using rfc2307bisRalf Haferkamp2009-09-031-2/+2
| | | | | sdap_get_initgr_process() was using the wrong sdap_id_map struct when creating the searchfilter for the initgroups() call.
* check if gid attribute is emptySumit Bose2009-08-281-0/+6
|
* Make enumeration an independent taskSimo Sorce2009-08-271-15/+133
| | | | | | Always immediately return to DP, and update users/groups in the background. Also implements an optimization to retrieve only changed/new users/groups by filtering using the modifyTimestamp after the first query.
* Always save using member/memberOfSimo Sorce2009-08-271-0/+5
| | | | | First pass to remove the legacy option and make it just a property of the provider
* Do not fail enumerations if a single store failsSimo Sorce2009-08-241-40/+45
| | | | Try as hard as possible to store as much data as we can.
* some UPN handling fixesSumit Bose2009-08-241-3/+27
| | | | | | - making the realm part upper case is now optional and done in the LDAP backend - using a username@realm UPN is now optional
* store additional LDAP attributesSumit Bose2009-08-211-4/+45
| | | | | If available the original DN and the user principle will be stored in sysdb.
* enable usage of defaultBindDnSumit Bose2009-08-191-0/+18
|
* Do not fail enumerations because of range checksSimo Sorce2009-08-101-3/+15
|
* Fix race condition in sdap codeSimo Sorce2009-08-041-82/+163
| | | | | | | Retrieving ldap results and storing users could sometimes results in race conditions where the final ldap result was retrieved before the store operations where finished resulting in the operations to be aborted before termination. Implement a serialization mechanism per operation.
* Fix search replies getting ignoredSimo Sorce2009-08-031-14/+12
|
* Fix race condition that was causing segfaultsSimo Sorce2009-07-241-80/+136
| | | | | | | | The sdap_handle might be freed when processing a message. Rearrange data flow so that the sdap_handle is never used after a message is processed but a new event (dependent on the handle) is instead scheduled. If the sdap_handle is freed, the scheduled event is also removed and not fired
* added LDAP change password backend targetSumit Bose2009-07-211-0/+134
|
* Rework the engine that deals with openldap librariesSimo Sorce2009-07-201-478/+367
| | | | | | | The way openldap libraries work, require to have a single engine per connection as all replies are read at the same time. So we need to always read anything that comes in from the wire and then loop to dispatch results to the requests that are waiting.
* Implement the ldap identity module.Simo Sorce2009-07-081-32/+435
| | | | This uses and exapands the async helpers.
* Unify password caching ops in sysdbSimo Sorce2009-07-081-97/+0
|
* Add async helper functionsSimo Sorce2009-07-081-0/+1446
These functions use the tevent_req async model, where a pair of _send/_recv functions pilot requests, with additional helpers like _done functions, and where needed multiple stage helpers.