<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd.git/src/providers/ad, branch subdommem</title>
<subtitle>System Security Services Daemon [okos' clone]</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/'/>
<entry>
<title>KRB5: Do not send PAC in server mode</title>
<updated>2013-07-23T12:18:03+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-07-19T05:36:28+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=48657b5de36a63b0c13ed5d53065871d59d8f10b'/>
<id>48657b5de36a63b0c13ed5d53065871d59d8f10b</id>
<content type='text'>
The krb5 child contacts the PAC responder for any user except for the
IPA native users if the PAC is configured. This works fine for the
general case but the ipa_server_mode is a special one. The PAC responder
is there, but since in the server mode we should be operating as AD
provider default, the PAC shouldn't be analyzed either in this case.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The krb5 child contacts the PAC responder for any user except for the
IPA native users if the PAC is configured. This works fine for the
general case but the ipa_server_mode is a special one. The PAC responder
is there, but since in the server mode we should be operating as AD
provider default, the PAC shouldn't be analyzed either in this case.
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: Set the bool value same as default value in opts</title>
<updated>2013-07-19T11:51:17+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-07-16T17:07:09+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=35872dc24058c5e8028cb4082fd405a27835dcd1'/>
<id>35872dc24058c5e8028cb4082fd405a27835dcd1</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/2023

When the option values are copied using dp_opt_copy_map, the .val member
is used if it's not NULL. At the same time, the bool options are never
NULL, unlike integers or strings that can have special NULL-like values
such as NULL_STRING. This effectively means that when copying a bool
option, the .val member is always used.

But in the AD maps, some .val fields were set differently from the
.def_val fields. The effect was that when the AD subdomain provider was
initialized from IPA subdomain provider using only the defaults, some
options (notably referral chasing) were set to a value that didn't make
sense for the AD provider.

This patch makes sure that for all boolean option, the .val is always
the same as .def_val.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/2023

When the option values are copied using dp_opt_copy_map, the .val member
is used if it's not NULL. At the same time, the bool options are never
NULL, unlike integers or strings that can have special NULL-like values
such as NULL_STRING. This effectively means that when copying a bool
option, the .val member is always used.

But in the AD maps, some .val fields were set differently from the
.def_val fields. The effect was that when the AD subdomain provider was
initialized from IPA subdomain provider using only the defaults, some
options (notably referral chasing) were set to a value that didn't make
sense for the AD provider.

This patch makes sure that for all boolean option, the .val is always
the same as .def_val.
</pre>
</div>
</content>
</entry>
<entry>
<title>IPA: Look up AD users directly if IPA server mode is on</title>
<updated>2013-06-28T20:22:20+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-19T08:51:19+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=3d28e0e560b787b5c57ed7327d184310342a7e38'/>
<id>3d28e0e560b787b5c57ed7327d184310342a7e38</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1962

If the ipa_server_mode is selected IPA subdomain user and group lookups
are not done with the help of the extdom plugin but directly against AD
using the AD ID code.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1962

If the ipa_server_mode is selected IPA subdomain user and group lookups
are not done with the help of the extdom plugin but directly against AD
using the AD ID code.
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: Move storing sdap_domain for subdomain to generic LDAP code</title>
<updated>2013-06-28T20:22:20+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-19T11:00:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=4e3ba17a3376b635cb0d9ae60a6d4e712ded01a0'/>
<id>4e3ba17a3376b635cb0d9ae60a6d4e712ded01a0</id>
<content type='text'>
Makes creating the sdap_domain structure for a subdomain reusable
outside AD subdomain code where it was created initially.

Subtask of:
    https://fedorahosted.org/sssd/ticket/1962
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Makes creating the sdap_domain structure for a subdomain reusable
outside AD subdomain code where it was created initially.

Subtask of:
    https://fedorahosted.org/sssd/ticket/1962
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: initialize failover with custom realm, domain and failover service</title>
<updated>2013-06-28T20:22:20+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-19T08:49:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=59415636c92c6e9764ddc65a85ad61002310519d'/>
<id>59415636c92c6e9764ddc65a85ad61002310519d</id>
<content type='text'>
This is needed so we can initialize failover using IPA realm and
on-the-fly discovered DNS domain. The subdomains discovered on-thefly
will use the subdomain name for realm, domain and failover service to
avoid conflicts.

Subtaks of:
https://fedorahosted.org/sssd/ticket/1962
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is needed so we can initialize failover using IPA realm and
on-the-fly discovered DNS domain. The subdomains discovered on-thefly
will use the subdomain name for realm, domain and failover service to
avoid conflicts.

Subtaks of:
https://fedorahosted.org/sssd/ticket/1962
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: decouple ad_id_ctx initialization</title>
<updated>2013-06-28T20:22:20+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-17T16:32:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=ebc6ab564dc2a0a2b08c42d727fc403dde4a2dc9'/>
<id>ebc6ab564dc2a0a2b08c42d727fc403dde4a2dc9</id>
<content type='text'>
The IPA subdomain code will perform lookups on its own in the server
mode. For this, the AD provider must offer a way to initialize the
ad_id_ctx for external consumers.

Subtask of:
https://fedorahosted.org/sssd/ticket/1962
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The IPA subdomain code will perform lookups on its own in the server
mode. For this, the AD provider must offer a way to initialize the
ad_id_ctx for external consumers.

Subtask of:
https://fedorahosted.org/sssd/ticket/1962
</pre>
</div>
</content>
</entry>
<entry>
<title>Save mpg state for subdomains</title>
<updated>2013-06-28T18:20:59+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-06-27T19:49:26+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=09d7c105839bfc7447ea0f766413ed86675ca075'/>
<id>09d7c105839bfc7447ea0f766413ed86675ca075</id>
<content type='text'>
The information of a subdomain will use magic private groups (mpg) or
not will be stored together with other information about the domain in
the cache.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The information of a subdomain will use magic private groups (mpg) or
not will be stored together with other information about the domain in
the cache.
</pre>
</div>
</content>
</entry>
<entry>
<title>Replace new_subdomain() with find_subdomain_by_name()</title>
<updated>2013-06-28T18:20:59+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-06-27T15:07:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=b8d703cf3aba81800cf1b8ccca64bb00ef0b30f7'/>
<id>b8d703cf3aba81800cf1b8ccca64bb00ef0b30f7</id>
<content type='text'>
new_subdomain() will create a new domain object and should not be used
anymore in the priovder code directly. Instead a reference to the domain
from the common domain object should be used.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
new_subdomain() will create a new domain object and should not be used
anymore in the priovder code directly. Instead a reference to the domain
from the common domain object should be used.
</pre>
</div>
</content>
</entry>
<entry>
<title>Add now options ldap_min_id and ldap_max_id</title>
<updated>2013-06-28T18:20:59+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-06-12T10:17:08+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=eceefd520802efe356d413a13247c5f68d8e27c8'/>
<id>eceefd520802efe356d413a13247c5f68d8e27c8</id>
<content type='text'>
Currently the range for Posix IDs stored in an LDAP server is unbound.
This might lead to conflicts in a setup with AD and trusts when the
configured domain uses IDs from LDAP. With the two noe options this
conflict can be avoided.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Currently the range for Posix IDs stored in an LDAP server is unbound.
This might lead to conflicts in a setup with AD and trusts when the
configured domain uses IDs from LDAP. With the two noe options this
conflict can be avoided.
</pre>
</div>
</content>
</entry>
<entry>
<title>AD: Write out domain-realm mappings</title>
<updated>2013-06-27T16:43:57+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-06-26T20:39:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd.git/commit/?id=58dd26b1c5b60ee992dd5d1214bb168aebb42d54'/>
<id>58dd26b1c5b60ee992dd5d1214bb168aebb42d54</id>
<content type='text'>
This patch reuses the code from IPA provider to make sure that
domain-realm mappings are written even for AD sub domains.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This patch reuses the code from IPA provider to make sure that
domain-realm mappings are written even for AD sub domains.
</pre>
</div>
</content>
</entry>
</feed>
