diff options
author | Sumit Bose <sbose@redhat.com> | 2011-08-25 13:15:26 +0200 |
---|---|---|
committer | Stephen Gallagher <sgallagh@redhat.com> | 2011-08-25 13:30:47 -0400 |
commit | 79cbbd1359599a0fbec1adbfc87611fd82d8df19 (patch) | |
tree | dd11d52266d0d1c1aaaa7e5053c9bd9fa170938f | |
parent | d214d6a5c22887a6a3b503183c3306cebf6074be (diff) | |
download | sssd_unused-79cbbd1359599a0fbec1adbfc87611fd82d8df19.tar.gz sssd_unused-79cbbd1359599a0fbec1adbfc87611fd82d8df19.tar.xz sssd_unused-79cbbd1359599a0fbec1adbfc87611fd82d8df19.zip |
Improve password policy error code and message
Instead of returning PAM_SYSTEM_ERR if they necessary attributes for the
requested password policy cannot be found we return PAM_PERM_DENIED.
Additionally the log message says that the access is denied.
-rw-r--r-- | src/providers/ldap/ldap_auth.c | 13 |
1 files changed, 9 insertions, 4 deletions
diff --git a/src/providers/ldap/ldap_auth.c b/src/providers/ldap/ldap_auth.c index 5857e537..43492607 100644 --- a/src/providers/ldap/ldap_auth.c +++ b/src/providers/ldap/ldap_auth.c @@ -278,8 +278,9 @@ static errno_t find_password_expiration_attributes(TALLOC_CTX *mem_ctx, } } else { DEBUG(1, ("No Kerberos password expiration attributes found, " - "but MIT Kerberos password policy was requested.\n")); - return EINVAL; + "but MIT Kerberos password policy was requested. " + "Access will be denied.\n")); + return EACCES; } } else if (strcasecmp(pwd_policy, PWD_POL_OPT_SHADOW) == 0) { mark = ldb_msg_find_attr_as_string(msg, SYSDB_SHADOWPW_LASTCHANGE, NULL); @@ -321,8 +322,9 @@ static errno_t find_password_expiration_attributes(TALLOC_CTX *mem_ctx, return EOK; } else { DEBUG(1, ("No shadow password attributes found, " - "but shadow password policy was requested.\n")); - return EINVAL; + "but shadow password policy was requested. " + "Access will be denied.\n")); + return EACCES; } } @@ -661,6 +663,9 @@ int auth_recv(struct tevent_req *req, if (err == ETIMEDOUT) { *result = SDAP_UNAVAIL; return EOK; + } else if (err == EACCES) { + *result = SDAP_AUTH_FAILED; + return EOK; } else { *result = SDAP_ERROR; return err; |