summaryrefslogtreecommitdiffstats
path: root/src/providers
Commit message (Collapse)AuthorAgeFilesLines
* Fix error message for ldap_start_tlsStephen Gallagher2010-03-181-1/+1
|
* Fix a series of memory leaks in the SBUSStephen Gallagher2010-03-171-1/+5
|
* Properly handle dbus send attempts on a closed connectionStephen Gallagher2010-03-151-22/+1
| | | | | | | | dbus_connection_send_with_reply() will report success and return a NULL pending_reply when the connection is not open for communication. This patch creates a new wrapper around dbus_connection_send_with_reply() to properly detect this condition and report it as an error.
* Fixed authentication check for CHAUTHTOK_PRELIMRalf Haferkamp2010-03-151-1/+1
| | | | | When changing passwords, treat SDAP_AUTH_PW_EXPIRED as a successful authentication in SSS_PAM_CHAUTHTOK_PRELIM.
* Fixed check for expired passwordsRalf Haferkamp2010-03-151-2/+4
| | | | | | When the user's password is expired it might also be indicated by the bind operation returning "INVALID_CREDENTIALS" with the ppolicy control's errorcode set to "PP_passwordExpired".
* Add krb5_kpasswd optionSumit Bose2010-03-127-32/+208
|
* Write the IP address of the KDC to the kdcinfo fileSumit Bose2010-03-112-19/+21
|
* Add expandable sequences to krb5_ccachedirSumit Bose2010-03-116-21/+292
| | | | | | | As with krb5_ccname_template sequences like %u can be used in the krb5_ccachedir parameter which are expanded at runtime. If the directory does not exist, it will be created. Depending on the used sequences it is created as a public or private directory.
* Add simple access providerSumit Bose2010-03-082-0/+196
|
* Reopen logs when SIGHUP is caughtJakub Hrozek2010-03-081-0/+1
| | | | | | | | Upon receiving SIGHUP, the monitor signals all services to reopen their debug logs. It is also possible to signal individual services to reopen their particular files. Fixes: #332
* Add forgotten \n in DEBUG statementsMartin Nagy2010-03-042-2/+2
| | | | | | Logs from confdb with missing '\n' in the DEBUG statements annoyed me so I decided to fix them. I also made a quick grep through the code and found other places so I fixed them too.
* Improve safe alignment buffer handling macrosSimo Sorce2010-03-034-49/+50
| | | | | | | | | Make the counter optional so that alignment safe macros can be used also where there is no counter to update. Change arguments names so that they are not deceiving (ptr normlly identify a pointer) Turn the memcpy substitute into an inline function so that passing a pointer to rp and checking for it doesn't make the compiler spit lots of warnings.
* proxy: use correct _recv functionSimo Sorce2010-03-031-1/+1
|
* Fix check for values of expiration limitsJakub Hrozek2010-02-251-1/+1
| | | | | There were inconsistencies between what sssd.conf manpage said and what the code enforces.
* Remove a check that was left behindJakub Hrozek2010-02-251-7/+1
| | | | | When refactoring talloc_asprintf calls a check was left behind that cased the backend to go offline immediately.
* Better cleanup task handlingJakub Hrozek2010-02-235-39/+242
| | | | | | | | | | | | | | | | Implements a different mechanism for cleanup task. Instead of just deleting expired entries, this patch adds a new option account_cache_expiration for domains. If an entry is expired and the last login was more days in the past that account_cache_expiration, the entry is deleted. Groups are deleted if they are expired and and no user references them (no user has memberof: attribute pointing at that group). The parameter account_cache_expiration is not LDAP-specific, so that other future backends might use the same timeout setting. Fixes: #391
* Do not check entries during cleanup taskJakub Hrozek2010-02-232-81/+59
| | | | | | | Do not attempt to validate expired entries in cache, just delete them. Also increase the cache timeouts. Fixes: #331
* Do not schedule enumeration after a cleanupJakub Hrozek2010-02-231-2/+2
|
* Handle expired passwords like other PAM modulesSumit Bose2010-02-232-2/+2
| | | | | | | | | | | | | So far we handled expired password during authentication. Other PAM modules typically detect expired password during account management and return PAM_NEW_AUTHTOK_REQD if the password is expired and should be changed. The PAM library then calls the change password routines. To meet these standards pam_sss is change accordingly. As a result it is now possible to update an expired password via ssh if sssd is running with PasswordAuthentication=yes. One drawback due to limitations of PAM is that the user now has to type his current password again before setting a new one.
* Restrict family lookupsJakub Hrozek2010-02-223-15/+84
| | | | | | | Adds a new option that tells resolver which address family to prefer or use exclusively. Fixes: #404
* Remove unnecessary domain parameter from PAM requestsStephen Gallagher2010-02-222-28/+5
| | | | | | If we're sending a message to the backend, we already know which domain the request is targeting. Carrying this information is not useful and confuses the interface.
* Remove unnecessary "domain" parameter from DP registrationStephen Gallagher2010-02-223-7/+4
| | | | | | This was a holdover from when the DP and the providers were unique processes. The NSS and PAM registrations do not need to send the domain, as it is not ambiguous which one they are talking to.
* Add documentation for PAM response messagesSumit Bose2010-02-191-0/+69
|
* Remove unneeded items from struct pam_dataSumit Bose2010-02-196-69/+69
|
* Send Kerberos environment after password changeSumit Bose2010-02-191-1/+1
|
* Fix licensing issues in SSSDStephen Gallagher2010-02-181-0/+24
|
* Rename server/ directory to src/Stephen Gallagher2010-02-1848-0/+24031
Also update BUILD.txt