summaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Releasing version 1.2.4sssd-1_2_4Stephen Gallagher2010-10-0814-191/+214
|
* Add fake users during saving of RFC2307 groupJakub Hrozek2010-10-081-2/+604
|
* Shortcut for save_group() to accept sysdb DNs as member attributesJakub Hrozek2010-10-081-7/+27
| | | | | | | | This patch is a backport of original written by Ralf Haferkamp. Addtional parameter "populate_members" for save_group() and save_groups() to indicate that the "member" attribute of the groups is populated with sysdb DNs of the members (instead of LDAP DNs).
* sysdb interface for adding expired user entriesJakub Hrozek2010-10-084-4/+198
|
* Add proper nested initgroup support for RFC2307bis serversStephen Gallagher2010-10-081-1/+1014
|
* Modify sysdb_add_group_member_send to accept users and groupsStephen Gallagher2010-10-084-27/+66
| | | | | Previously, it assumed that all members were users. This changes the interface so that either a user or a group can be specified.
* Make user argument of sysdb_update_members_send a constStephen Gallagher2010-10-082-2/+2
|
* Handle nested groups in RFC2307bisStephen Gallagher2010-10-081-1/+854
| | | | | | | | This first approach handles the non-optimized "pure" RFC2307bis case. It recursively calls into nested groups until it it has found them all or hits the pre-defined nesting limit. It then saves all member users first, then all groups to the sysdb
* Make sdap_save_users_send handle zero users gracefullyStephen Gallagher2010-10-081-0/+9
| | | | | If we send a zero num_users value, we should just immediately return success, rather than starting a useless transaction
* Add option to limit nested groupsSimo Sorce2010-10-084-4/+7
|
* Add fake groups during initgroupsJakub Hrozek2010-10-081-31/+284
| | | | | | | | | If during initgroups operation we find out that any of the groups the user is a member of is not cached yet we add a incomplete, expired group entry. That way, we save ourselves from looking up and saving all the potential user entries the group may also consist of. Because the group is expired, it will be refreshed during the next getgrgid/getgrnam call and correct member list will be returned.
* sysdb interface for adding incomplete group entriesJakub Hrozek2010-10-083-0/+255
| | | | Useful for optimizing the initgroups operation.
* End update_members request if there's nothing to doJakub Hrozek2010-10-081-0/+8
|
* Add common hash table setupStephen Gallagher2010-10-083-1/+59
| | | | | sss_hash_create() produces a dhash table living in the talloc hierarchy.
* Disable events on ldap fd when offline.Jan Zeleny2010-10-081-2/+4
| | | | | | | | | Erase events on LDAP socket when backend is offline and an event appears on the socket. Normally this would lead to infinite loop, because event is present on the fd, but instead of being processed, an error log is written and the program continues to wait for the event. Ticket: #599
* Request the correct attribute nameJakub Hrozek2010-09-231-1/+1
|
* Fix sysdb_attrs_to_listJakub Hrozek2010-09-231-2/+2
|
* Fix sysdb_group_dn_nameJakub Hrozek2010-09-231-1/+9
|
* Request all group attributes during initgroups processingStephen Gallagher2010-09-231-5/+6
| | | | | | | We tried to be too clever and only requested the name of the group, but we require the objectClass to validate the results. https://fedorahosted.org/sssd/ticket/622
* Updating ES translationHéctor Daniel Cabrera2010-09-021-163/+146
|
* Treat a zero-length password as a failureStephen Gallagher2010-08-241-0/+7
| | | | | Some LDAP servers allow binding with blank passwords. We should not allow a blank password to authenticate the SSSD.
* Fix chpass operations with LDAP providerStephen Gallagher2010-08-041-0/+1
| | | | | | | The initial verification of the old password was returning an error because we were not explicitly setting dp_err to DP_ERR_SUCCESS and it was initialized earlier in the function to DP_ERR_FATAL.
* be_pam_handler(): Fix potential NULL dereferenceStephen Gallagher2010-08-031-1/+2
|
* Fix incorrect NULL checkStephen Gallagher2010-08-031-1/+1
|
* Release SSSD 1.2.2sssd-1_2_2Stephen Gallagher2010-08-0214-144/+156
|
* Clean up initgroups processing for RFC2307Stephen Gallagher2010-07-301-16/+196
| | | | | | | | Instead of recursively updating all users of each group the user being queried belongs to, just add or remove membership for the requested user. Fixes https://fedorahosted.org/sssd/ticket/478
* Add sysdb_update_members functionStephen Gallagher2010-07-303-0/+369
| | | | | | | | This function will take a user, a list of groups that this user should be added to and a list of groups the user should be removed from and will recursively call sysdb_[add|remove]_group_member Includes a unit test
* Add dup_string_list() utility functionStephen Gallagher2010-07-302-0/+37
|
* Add sysdb_group_dn_name utility functionStephen Gallagher2010-07-302-0/+24
|
* Add diff_string_lists utility functionStephen Gallagher2010-07-304-1/+449
| | | | Includes a unit test
* Add sysdb_attrs_to_list() utility functionStephen Gallagher2010-07-303-0/+112
|
* Allow sssd clients to reconnectSumit Bose2010-07-231-4/+3
| | | | | | | Currently the PAM and NSS client just return an error if there are problems on an open socket. This will lead to problems in long running programs like gdm if sssd is restarted, e.g. during an update. With this patch the socket is closed and reopened.
* Log TLS errors to syslogStephen Gallagher2010-07-092-1/+23
| | | | | Also adds support for detecting LDAPS errors by adding a check for SDAP_DIAGNOSTIC_MESSAGE after ldap_search_ext()
* Add syslog messages for LDAP GSSAPI bindStephen Gallagher2010-07-091-2/+58
| | | | | We will now emit a level 0 debug message on keytab errors, and also write to the syslog (LOG_DAEMON)
* Add log notifications for startup and shutdown.Stephen Gallagher2010-07-091-1/+4
|
* Add sss_log() functionStephen Gallagher2010-07-093-1/+83
| | | | | Right now, this log function writes to the syslog. In the future, it could be modified to work with ELAPI or another logging API.
* Make RootDSE optionalStephen Gallagher2010-06-282-3/+17
| | | | | | | | | | | In violation of the standard, some LDAP servers control access to the RootDSE, thus preventing us from being able to read it before performing a bind. This patch will allow us to continue on if the RootDSE was inaccessible. All of the places that we use the return value of the RootDSE after this are already checked for NULL and use sane defaults if the RootDSE is unavailable
* Add explicit requests for several operational attrsAlexander Gordeev2010-06-281-1/+12
| | | | | | | | | | | | | | | | Operational attributes are not returned in searched requests unless explicitly requested according to RFC 4512 section 5.1. Therefore to get several standard attributes of root DSE we have to request for them. The requested attrs are: - altServer - namingContexts - supportedControl - supportedExtension - supportedFeatures - supportedLDAPVersion - supportedSASLMechanisms Signed-off-by: Alexander Gordeev <lasaine@lvk.cs.msu.su>
* Fix SASL authenticationSumit Bose2010-06-281-2/+2
|
* Releasing SSSD 1.2.1sssd-1_2_1Stephen Gallagher2010-06-1814-1726/+1643
|
* Protect against segfault in remove_ldap_connection_callbacksStephen Gallagher2010-06-181-1/+6
| | | | | | | | | If sdap_mark_offline() is called before a live connection is established, sdap_fd_events could be NULL, causing a segfault when remove_ldap_connection_callbacks() attempts to free the sdap_fd_events->conncb https://fedorahosted.org/sssd/ticket/545
* Fix return value from remove_connection_callback() destructorStephen Gallagher2010-06-181-9/+2
| | | | | ldap_get_option() can only fail if the option we're removing has already been removed. It is sufficient to log this and continue.
* Fix potential resource leak in remove_tree_with_ctx()Stephen Gallagher2010-06-171-1/+10
| | | | https://fedorahosted.org/sssd/ticket/515
* Honor filter_users in PAMStephen Gallagher2010-06-173-10/+47
|
* Move setup of filter_users and filter_groups to negcache.cStephen Gallagher2010-06-173-187/+220
| | | | | Creates a new function - sss_ncache_prepopulate() - that can be shared with other responders, such as PAM.
* Refactor the negative cacheStephen Gallagher2010-06-176-67/+68
| | | | | Rename functions from nss_ncache_* to sss_ncache_* Move negative cache to responder/common and rename as negcache.c/h
* Initialize len before looping to read the pidfileStephen Gallagher2010-06-171-1/+1
| | | | https://fedorahosted.org/sssd/ticket/544
* Standardize on correct spelling of "principal" for krb5Stephen Gallagher2010-06-168-19/+19
| | | | https://fedorahosted.org/sssd/ticket/542
* Remove references to the DP service from the SSSDConfig API testsStephen Gallagher2010-06-162-6/+0
|
* Handle (ignore) unknown options in get_domain() and get_service()Stephen Gallagher2010-06-163-10/+72
| | | | | We will now eliminate any unknown options and providers to guarantee that the domain is safe for use.