<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd2.git/src/tests, branch sssd-1-9</title>
<subtitle>System Security Services Daemon [okos' clone]</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/'/>
<entry>
<title>Only try to relink ghost users if we're not enumerating</title>
<updated>2013-04-29T18:44:19+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-04-29T12:37:27+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=3896c82a127ec0858429e04b8019773dbf7e7b92'/>
<id>3896c82a127ec0858429e04b8019773dbf7e7b92</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1893

When SSSD is not enumerating (which is the default), we are trying to
link any "ghost" entries with a newly created user entry. However, when
enumeration is on, this means a spurious search on adding any user.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1893

When SSSD is not enumerating (which is the default), we are trying to
link any "ghost" entries with a newly created user entry. However, when
enumeration is on, this means a spurious search on adding any user.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix simple access group control in case-insensitive domains</title>
<updated>2013-04-15T13:03:45+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-04-11T07:18:56+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=4f57212955827a9062b150c768e8a0c2fb613193'/>
<id>4f57212955827a9062b150c768e8a0c2fb613193</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1880

In the simple access provider, we need to only canonicalize user names when
comparing with values in the ACL, not when searching the cache. The sysdb
searches might do a base search with a DN constructed with the username
which fails if the username is lower case.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1880

In the simple access provider, we need to only canonicalize user names when
comparing with values in the ACL, not when searching the cache. The sysdb
searches might do a base search with a DN constructed with the username
which fails if the username is lower case.
</pre>
</div>
</content>
</entry>
<entry>
<title>Resolve GIDs in the simple access provider</title>
<updated>2013-03-19T21:14:02+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-02-23T09:44:54+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=8b8019fe3dd1564fba657e219ec20ff816c7ffdb'/>
<id>8b8019fe3dd1564fba657e219ec20ff816c7ffdb</id>
<content type='text'>
Changes the simple access provider's interface to be asynchronous. When
the simple access provider encounters a group that has gid, but no
meaningful name, it attempts to resolve the name using the
be_file_account_request function.

Some providers (like the AD provider) might perform initgroups
without resolving the group names. In order for the simple access
provider to work correctly, we need to resolve the groups before
performing the access check. In AD provider, the situation is
even more tricky b/c the groups HAVE name, but their name
attribute is set to SID and they are set as non-POSIX
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Changes the simple access provider's interface to be asynchronous. When
the simple access provider encounters a group that has gid, but no
meaningful name, it attempts to resolve the name using the
be_file_account_request function.

Some providers (like the AD provider) might perform initgroups
without resolving the group names. In order for the simple access
provider to work correctly, we need to resolve the groups before
performing the access check. In AD provider, the situation is
even more tricky b/c the groups HAVE name, but their name
attribute is set to SID and they are set as non-POSIX
</pre>
</div>
</content>
</entry>
<entry>
<title>Add unit tests for simple access test by groups</title>
<updated>2013-03-19T21:14:02+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-03-03T20:43:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=754b09b5444e6da88ed58d6deaed8b815e268b6b'/>
<id>754b09b5444e6da88ed58d6deaed8b815e268b6b</id>
<content type='text'>
I realized that the current unit tests for the simple access provider
only tested the user directives. To have a baseline and be able to
detect new bugs in the upcoming patch, I implemented unit tests for the
group lists, too.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
I realized that the current unit tests for the simple access provider
only tested the user directives. To have a baseline and be able to
detect new bugs in the upcoming patch, I implemented unit tests for the
group lists, too.
</pre>
</div>
</content>
</entry>
<entry>
<title>krb5-utils-tests: remove invalid condition</title>
<updated>2013-03-13T12:33:54+00:00</updated>
<author>
<name>Pavel Březina</name>
<email>pbrezina@redhat.com</email>
</author>
<published>2013-03-13T10:51:18+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=b49ca26cebae5bdc53c08239cf19afcb9f8ff579'/>
<id>b49ca26cebae5bdc53c08239cf19afcb9f8ff579</id>
<content type='text'>
This condition is invalid because different_realm is not set, when
EINVAL is returned. It can make the test fail sometimes.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This condition is invalid because different_realm is not set, when
EINVAL is returned. It can make the test fail sometimes.
</pre>
</div>
</content>
</entry>
<entry>
<title>TOOLS: Use file descriptor to avoid races when creating a home directory</title>
<updated>2013-01-23T12:58:16+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-01-20T19:27:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=3843b284cd3e8f88327772ebebc7249990fd87b9'/>
<id>3843b284cd3e8f88327772ebebc7249990fd87b9</id>
<content type='text'>
When creating a home directory, the destination tree can be modified in
various ways while it is being constructed because directory permissions
are set before populating the directory. This can lead to file creation
and permission changes outside the target directory tree, using hard links.

This security problem was assigned CVE-2013-0219

https://fedorahosted.org/sssd/ticket/1782
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When creating a home directory, the destination tree can be modified in
various ways while it is being constructed because directory permissions
are set before populating the directory. This can lead to file creation
and permission changes outside the target directory tree, using hard links.

This security problem was assigned CVE-2013-0219

https://fedorahosted.org/sssd/ticket/1782
</pre>
</div>
</content>
</entry>
<entry>
<title>Refactor gid handling in the PAC responder</title>
<updated>2013-01-08T13:57:29+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-12-20T20:10:49+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=8fe509ca10ff54bd81698e3e6ddcd2b4f711bfde'/>
<id>8fe509ca10ff54bd81698e3e6ddcd2b4f711bfde</id>
<content type='text'>
Instead of using a single array of gid-domain_pointer pairs, Simo
suggested to use a gid array for each domain an store it with a pointer
to the domain.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Instead of using a single array of gid-domain_pointer pairs, Simo
suggested to use a gid array for each domain an store it with a pointer
to the domain.
</pre>
</div>
</content>
</entry>
<entry>
<title>Add tests for get_gids_from_pac()</title>
<updated>2013-01-08T13:57:29+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-12-04T12:55:13+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=4044e7de63f6904a9a0f8a8f7d330b58c25fff42'/>
<id>4044e7de63f6904a9a0f8a8f7d330b58c25fff42</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add find_domain_by_id()</title>
<updated>2013-01-08T13:57:29+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-11-26T11:33:11+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=2d9aa35d2102256bc7195dd1f55aa2e60149294e'/>
<id>2d9aa35d2102256bc7195dd1f55aa2e60149294e</id>
<content type='text'>
Currently domains can only be searched by name in the global domain
list. To make it easier to find the domain for a given SID
find_domain_by_id() which returns a pointer to the domain or subdomain
entry in the global domain list if a matching id was found.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Currently domains can only be searched by name in the global domain
list. To make it easier to find the domain for a given SID
find_domain_by_id() which returns a pointer to the domain or subdomain
entry in the global domain list if a matching id was found.
</pre>
</div>
</content>
</entry>
<entry>
<title>Use struct pac_grp instead of gid_t for groups from PAC</title>
<updated>2013-01-08T13:57:29+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2012-11-23T17:35:08+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/okos/public_git/sssd2.git/commit/?id=7856e34732fdb7b80980d98f80da447a5419e8ee'/>
<id>7856e34732fdb7b80980d98f80da447a5419e8ee</id>
<content type='text'>
To be able to handle groupmemberships from other domains more data than
just the gid must be kept for groups given in the PAC.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
To be able to handle groupmemberships from other domains more data than
just the gid must be kept for groups given in the PAC.
</pre>
</div>
</content>
</entry>
</feed>
