summaryrefslogtreecommitdiffstats
path: root/src/providers/ldap
Commit message (Collapse)AuthorAgeFilesLines
* Fix segfault in GSSAPI reconnect codeStephen Gallagher2010-05-072-57/+41
| | | | | Also clean up some duplicated code into a single common routine sdap_account_info_common_done()
* Avoid freeing sdap_handle too earlySimo Sorce2010-05-032-18/+46
| | | | | Prevent freeing the sdap_handle by failing in the destructor if we are trying to recurse.
* Better handle sdap_handle memory from callers.Simo Sorce2010-05-034-33/+139
| | | | | | | | | | | | | Always just mark the sdap_handle as not connected and let later _send() functions to take care of freeing the handle before reconnecting. Introduce restart functions to avoid calling _send() functions in _done() functions error paths as this would have the same effect as directly freeing the sdap_handle and cause access to freed memory in sdap_handle_release() By freeing sdap_handle only in the connection _recv() function we guarantee it can never be done within sdap_handle_release() but only in a following event.
* Silence warnings with -O2Jakub Hrozek2010-04-301-2/+4
|
* Display a message if a password reset by root failsSumit Bose2010-04-261-0/+8
|
* Make the handling of fd events opaqueSumit Bose2010-04-265-184/+278
| | | | | | | Depending on the version of the OpenLDAP libraries we use two different schemes to find the file descriptor of the connection to the LDAP server. This patch removes the related ifdefs from the main code and introduces helper functions which can handle the specific cases.
* Set LDAP_OPT_RESTART for all LDAP connectionsSumit Bose2010-04-261-7/+7
|
* Make ID provider init functions clearerStephen Gallagher2010-04-161-3/+3
| | | | | | | | | | | Using sssm_*_init() as the name of the initialization function for identity providers was a holdover from earlier development when we thought we would only have a single "provider" entry in the config file. As we have now separated out the initialization functions for auth, chpass and access, we should rename sssm_*_init() to sssm_*_id_init() for a cleaner interface.
* sysdb: remove remaining traces of sysdb_handleSimo Sorce2010-04-121-2/+0
|
* sysdb: convert sysdb_get_user_attrSimo Sorce2010-04-121-134/+69
|
* Remove remaining use of sysdb_transaction_sendSimo Sorce2010-04-121-319/+99
|
* sysdb: convert sysdb_search_groupsSimo Sorce2010-04-121-133/+57
|
* sysdb: delete sysdb_delete_groupSimo Sorce2010-04-122-125/+55
|
* sysdb: convert sysdb_delete_userSimo Sorce2010-04-122-195/+70
|
* sysdb: convert sysdb_search_usersSimo Sorce2010-04-121-67/+37
|
* sysdb: convert sysdb_cache_passwordSimo Sorce2010-04-121-32/+11
|
* sysdb: convert sysdb_store/add(_basic)_groupSimo Sorce2010-04-121-295/+100
|
* sysdb: convert sysdb_store/add(_basic)_userSimo Sorce2010-04-121-195/+85
|
* sysdb: convert sysdb_search_entry and sysdb_delete_recursiveSimo Sorce2010-04-121-37/+11
|
* Allow arbitrary-length PAM messagesStephen Gallagher2010-03-251-6/+6
| | | | | | | | | The PAM standard allows for messages of any length to be returned to the client. We were discarding all messages of length greater than 255. This patch dynamically allocates the message buffers so we can pass the complete message. This resolves https://fedorahosted.org/sssd/ticket/432
* Fix warnings from -Wmissing-field-initializersSumit Bose2010-03-251-1/+3
| | | | This patch removes some tab-indentations from pamsrv.c, too.
* Set LDAP_OPT_RESTART for ldap_sasl_interactive_bind_s()Sumit Bose2010-03-251-0/+7
| | | | | | | This option is needed for the rare case where a poll() call during ldap_sasl_interactive_bind_s() is interrupted by a signal. LDAP_OPT_RESTART enables the handling of the EINTR error instead of returning an error.
* Improvements for LDAP Password Policy supportRalf Haferkamp2010-03-224-13/+103
| | | | | | | | Display warnings about remaining grace logins and password expiration to the user, when LDAP Password Policies are used. Improved detection if LDAP Password policies are supported by LDAP Server.
* Lower debug level of unexpected LDAP result codesSumit Bose2010-03-221-0/+5
|
* Fix error message for ldap_start_tlsStephen Gallagher2010-03-181-1/+1
|
* Fixed authentication check for CHAUTHTOK_PRELIMRalf Haferkamp2010-03-151-1/+1
| | | | | When changing passwords, treat SDAP_AUTH_PW_EXPIRED as a successful authentication in SSS_PAM_CHAUTHTOK_PRELIM.
* Fixed check for expired passwordsRalf Haferkamp2010-03-151-2/+4
| | | | | | When the user's password is expired it might also be indicated by the bind operation returning "INVALID_CREDENTIALS" with the ppolicy control's errorcode set to "PP_passwordExpired".
* Improve safe alignment buffer handling macrosSimo Sorce2010-03-032-18/+18
| | | | | | | | | Make the counter optional so that alignment safe macros can be used also where there is no counter to update. Change arguments names so that they are not deceiving (ptr normlly identify a pointer) Turn the memcpy substitute into an inline function so that passing a pointer to rp and checking for it doesn't make the compiler spit lots of warnings.
* Fix check for values of expiration limitsJakub Hrozek2010-02-251-1/+1
| | | | | There were inconsistencies between what sssd.conf manpage said and what the code enforces.
* Remove a check that was left behindJakub Hrozek2010-02-251-7/+1
| | | | | When refactoring talloc_asprintf calls a check was left behind that cased the backend to go offline immediately.
* Better cleanup task handlingJakub Hrozek2010-02-233-37/+239
| | | | | | | | | | | | | | | | Implements a different mechanism for cleanup task. Instead of just deleting expired entries, this patch adds a new option account_cache_expiration for domains. If an entry is expired and the last login was more days in the past that account_cache_expiration, the entry is deleted. Groups are deleted if they are expired and and no user references them (no user has memberof: attribute pointing at that group). The parameter account_cache_expiration is not LDAP-specific, so that other future backends might use the same timeout setting. Fixes: #391
* Do not check entries during cleanup taskJakub Hrozek2010-02-232-81/+59
| | | | | | | Do not attempt to validate expired entries in cache, just delete them. Also increase the cache timeouts. Fixes: #331
* Do not schedule enumeration after a cleanupJakub Hrozek2010-02-231-2/+2
|
* Handle expired passwords like other PAM modulesSumit Bose2010-02-231-1/+1
| | | | | | | | | | | | | So far we handled expired password during authentication. Other PAM modules typically detect expired password during account management and return PAM_NEW_AUTHTOK_REQD if the password is expired and should be changed. The PAM library then calls the change password routines. To meet these standards pam_sss is change accordingly. As a result it is now possible to update an expired password via ssh if sssd is running with PasswordAuthentication=yes. One drawback due to limitations of PAM is that the user now has to type his current password again before setting a new one.
* Rename server/ directory to src/Stephen Gallagher2010-02-1816-0/+9851
Also update BUILD.txt