summaryrefslogtreecommitdiffstats
path: root/src/providers/ldap
Commit message (Collapse)AuthorAgeFilesLines
...
* Sanitize ldap attributes in the config fileStephen Gallagher2010-11-151-2/+21
| | | | https://fedorahosted.org/sssd/ticket/458
* Properly document ldap_purge_cache_timeoutStephen Gallagher2010-11-151-1/+9
| | | | Also allow it to be disabled entirely
* Sanitize search filters in LDAP providerStephen Gallagher2010-11-154-7/+61
|
* Sanitize sysdb dn for memberof lookupStephen Gallagher2010-11-151-1/+11
|
* Sanitize sysdb filters in the LDAP providerStephen Gallagher2010-11-151-2/+11
|
* Review comments for namingContexts patchesSumit Bose2010-11-052-14/+14
|
* Make ldap_search_base a non-mandatory optionSumit Bose2010-11-041-35/+25
|
* Use (default)namingContext to set empty search basesSumit Bose2010-11-044-1/+117
|
* Add defaultNamingContext to RootDSE attributesSumit Bose2010-11-042-0/+3
|
* Don't clean up groups for which a user has it as primary GIDStephen Gallagher2010-11-041-2/+15
| | | | | | | | | | We were cleaning up all groups that were expired and for which there existed no user with memberOf: <thegroup> as an attribute. This patch modifies the search to also check for cached users with this group's GID as their primary GID. Fixes https://fedorahosted.org/sssd/ticket/624
* Fix misused SDAP_SEARCH_BASEMoritz Baumann2010-11-011-1/+1
|
* Allow authentication for referralsSumit Bose2010-10-271-0/+193
|
* Always use uint32_t for UID/GID numbersJakub Hrozek2010-10-262-23/+17
|
* Add some missing ldap_memfree()Sumit Bose2010-10-222-3/+6
|
* Add ldap_deref optionSumit Bose2010-10-224-1/+52
|
* set in_transaction explicitly to falseJakub Hrozek2010-10-181-1/+1
|
* Use unsigned long for conversion to id_tJakub Hrozek2010-10-182-34/+16
| | | | | | | | We used strtol() on a number of places to convert into uid_t or gid_t from a string representation such as LDAP attribute, but on some platforms, unsigned long might be necessary to store big id_t values. This patch converts to using strtoul() instead.
* Add proper nested initgroup support for RFC2307bis serversStephen Gallagher2010-10-181-3/+761
|
* Modify sysdb_[add|remove]_group_member to accept users and groupsStephen Gallagher2010-10-181-0/+1
| | | | | | | | Previously, it assumed that all members were users. This changes the interface so that either a user or a group can be specified. Also, it eliminates the need for a memory context to be passed, since the internal memory should be self-contained.
* Handle nested groups in RFC2307bisStephen Gallagher2010-10-181-1/+776
| | | | | | | | This first approach handles the non-optimized "pure" RFC2307bis case. It recursively calls into nested groups until it it has found them all or hits the pre-defined nesting limit. It then saves all member users first, then all groups to the sysdb
* Make sdap_save_users_send handle zero users gracefullyStephen Gallagher2010-10-181-0/+5
| | | | | If we send a zero num_users value, we should just immediately return success, rather than starting a useless transaction
* Add option to limit nested groupsSimo Sorce2010-10-182-1/+3
|
* Save dummy member users during RFC2307 getgr{nam,gid}Jakub Hrozek2010-10-151-82/+279
|
* sysdb interface for adding fake usersJakub Hrozek2010-10-151-3/+4
|
* Save dummy groups to cache during initgroupsJakub Hrozek2010-10-151-0/+125
| | | | | | | | | If during initgroups operation we find out that any of the groups the user is a member of is not cached yet we add a incomplete, expired group entry. That way, we save ourselves from looking up and saving all the potential user entries the group may also consist of. Because the group is expired, it will be refreshed during the next getgrgid/getgrnam call and correct member list will be returned.
* Check for GSSAPI before attempting to kinitJakub Hrozek2010-10-151-8/+12
|
* Implement netgroup support for LDAP providerSumit Bose2010-10-135-1/+982
|
* Add infrastructure to LDAP provider for netgroup supportSumit Bose2010-10-132-2/+51
|
* Initialize kerberos service for GSSAPIJakub Hrozek2010-10-136-4/+294
|
* Make ldap_child report kerberos return code to parentJakub Hrozek2010-10-134-13/+31
|
* Report Kerberos error code from ldap_child_get_tgt_syncJakub Hrozek2010-10-131-23/+16
|
* Add KDC to the list of LDAP optionsJakub Hrozek2010-10-132-0/+2
|
* Return all group members from getgr(nam|gid)Ralf Haferkamp2010-10-131-12/+374
| | | | | | | getgrnam()/getgrgid() should return all group members instead of only those which have already been cached (in sysdb). To achieve this every member that is currently not in the cache is looked up via LDAP and saved to the cache.
* Shortcut for save_group() to accept sysdb DNs as member attributesRalf Haferkamp2010-10-131-4/+19
| | | | | | Addtional parameter "populate_members" for save_group() and save_groups() to indicate that the "member" attribute of the groups is populated with sysdb DNs of the members (instead of LDAP DNs).
* Disable events on ldap fd when offline.Jan Zeleny2010-10-081-2/+4
| | | | | | | | | Erase events on LDAP socket when backend is offline and an event appears on the socket. Normally this would lead to infinite loop, because event is present on the fd, but instead of being processed, an error log is written and the program continues to wait for the event. Ticket: #599
* Return offline instead of errorStephen Gallagher2010-10-041-1/+2
| | | | | | | | When the failover code returns that there are no available servers while we are marked offline, we were returning an error to the PAM authentication code. Instead, we should return success with a result value of SDAP_UNAVAIL so that the PAM responder will mark the domain offline and attempt offline authentication.
* Suppress some 'may be used uninitialized' warningsSumit Bose2010-09-281-1/+1
| | | | | Additionally the handling of errno and the errno_t return value of functions is fixed in krb5_common.c.
* Request the correct attribute nameJakub Hrozek2010-09-221-1/+1
|
* Request all group attributes during initgroups processingStephen Gallagher2010-09-222-5/+7
| | | | | | | We tried to be too clever and only requested the name of the group, but we require the objectClass to validate the results. https://fedorahosted.org/sssd/ticket/622
* Check if control is supported before using it.Simo Sorce2010-09-154-14/+39
|
* Revert "Make ldap bind asynchronous"Jakub Hrozek2010-09-157-1219/+167
| | | | This reverts 56d8d19ac9d857580a233d8264e851883b883c67
* Store rootdse supported features in sdap_handlerSumit Bose2010-09-156-61/+110
|
* Dead assignments cleanup in providers codeJan Zeleny2010-09-082-14/+7
| | | | | | | Dead assignments were deleted. Also prototype of function sdap_access_decide_offline() has been changed, since its return code was never used. Ticket: #586
* Deobfuscate password in back endsJakub Hrozek2010-09-081-7/+52
| | | | | | When obfuscated password is used in config file, the LDAP backend converts it back to clear text and uses it to authenticate to the server.
* Fixed printing of undefined value in sdap_async_accounts.cJan Zeleny2010-09-021-1/+1
| | | | | | | If sysdb_attrs_get_el() call failed in function sdap_save_group(), it would result in printing an undefined value of variable name. This is now fixed by initializing the variable. Ticket: #579
* Make ldap bind asynchronousMartin Nagy2010-09-027-167/+1219
| | | | | | Every ldap function that could possibly create a new connection is now wrapped in a tevent_req. If the connection is created, we will call the function again after the socket is ready for writing.
* Properly handle errors from a password change operationStephen Gallagher2010-09-021-8/+14
|
* Treat a zero-length password as a failureStephen Gallagher2010-08-241-0/+7
| | | | | Some LDAP servers allow binding with blank passwords. We should not allow a blank password to authenticate the SSSD.
* Fix chpass operations with LDAP providerStephen Gallagher2010-08-041-0/+1
| | | | | | | The initial verification of the old password was returning an error because we were not explicitly setting dp_err to DP_ERR_SUCCESS and it was initialized earlier in the function to DP_ERR_FATAL.
* Clean up initgroups processing for RFC2307Stephen Gallagher2010-08-031-11/+89
| | | | | | | | Instead of recursively updating all users of each group the user being queried belongs to, just add or remove membership for the requested user. Fixes https://fedorahosted.org/sssd/ticket/478