<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/daemons/ipa-sam, branch patternfly</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/'/>
<entry>
<title>ipa-sam: cache gid to sid and uid to sid requests in idmap cache</title>
<updated>2014-03-12T11:19:06+00:00</updated>
<author>
<name>Jason Woods</name>
<email>devel@jasonwoods.me.uk</email>
</author>
<published>2014-03-07T16:38:24+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=d6a7923f71eb69bac53d6ff904086a9abd103dbc'/>
<id>d6a7923f71eb69bac53d6ff904086a9abd103dbc</id>
<content type='text'>
Add idmap_cache calls to ipa-sam to prevent huge numbers of LDAP calls to the
directory service for gid/uid&lt;-&gt;sid resolution.

Additionally, this patch further reduces number of queries by:
 - fast fail on uidNumber=0 which doesn't exist in FreeIPA,
 - return fallback group correctly when looking up user primary group as is
   done during init,
 - checking for group objectclass in case insensitive way

Patch by Jason Woods &lt;devel@jasonwoods.me.uk&gt;

Reviewed-by: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;

https://fedorahosted.org/freeipa/ticket/4234
and
https://bugzilla.redhat.com/show_bug.cgi?id=1073829
https://bugzilla.redhat.com/show_bug.cgi?id=1074314

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add idmap_cache calls to ipa-sam to prevent huge numbers of LDAP calls to the
directory service for gid/uid&lt;-&gt;sid resolution.

Additionally, this patch further reduces number of queries by:
 - fast fail on uidNumber=0 which doesn't exist in FreeIPA,
 - return fallback group correctly when looking up user primary group as is
   done during init,
 - checking for group objectclass in case insensitive way

Patch by Jason Woods &lt;devel@jasonwoods.me.uk&gt;

Reviewed-by: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;

https://fedorahosted.org/freeipa/ticket/4234
and
https://bugzilla.redhat.com/show_bug.cgi?id=1073829
https://bugzilla.redhat.com/show_bug.cgi?id=1074314

Reviewed-By: Sumit Bose &lt;sbose@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipasam: delete trusted child domains before removing the trust</title>
<updated>2014-01-21T11:31:54+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2014-01-20T14:42:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=c29211671cfd7d7734b932c8d6d70c94c849b5d1'/>
<id>c29211671cfd7d7734b932c8d6d70c94c849b5d1</id>
<content type='text'>
LDAP protocol doesn't allow deleting non-leaf entries. One needs to
remove all leaves first before removing the tree node.

https://fedorahosted.org/freeipa/ticket/4126
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
LDAP protocol doesn't allow deleting non-leaf entries. One needs to
remove all leaves first before removing the tree node.

https://fedorahosted.org/freeipa/ticket/4126
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove CFLAGS duplication.</title>
<updated>2013-12-06T13:44:41+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2013-12-06T10:47:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=5e2f7b68f0cb8e7fd6ea4f3236e84f1a8d075a13'/>
<id>5e2f7b68f0cb8e7fd6ea4f3236e84f1a8d075a13</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3896
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3896
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove generation and handling of LM hashes</title>
<updated>2013-11-01T08:28:35+00:00</updated>
<author>
<name>Sumit Bose</name>
<email>sbose@redhat.com</email>
</author>
<published>2013-10-29T11:19:01+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=d876a22732d83ddf8e37ead89e6f23bf7aa0d69c'/>
<id>d876a22732d83ddf8e37ead89e6f23bf7aa0d69c</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3795
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3795
</pre>
</div>
</content>
</entry>
<entry>
<title>ipasam: for subdomains pick up defaults for missing values</title>
<updated>2013-10-04T08:25:31+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-27T12:00:22+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=0ab40cdf6b354e8b760f604f2f94cf3c2292217e'/>
<id>0ab40cdf6b354e8b760f604f2f94cf3c2292217e</id>
<content type='text'>
We don't store trust type, attributes, and direction for subdomains
of the existing trust. Since trust is always forest level, these parameters
can be added as defaults when they are missing.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We don't store trust type, attributes, and direction for subdomains
of the existing trust. Since trust is always forest level, these parameters
can be added as defaults when they are missing.
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-sam: report supported enctypes based on Kerberos realm configuration</title>
<updated>2013-09-20T07:59:02+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-10T08:56:40+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=a9843d6918f73c2236d0083b1e8adf54ca34eb0d'/>
<id>a9843d6918f73c2236d0083b1e8adf54ca34eb0d</id>
<content type='text'>
We store Kerberos realm configuration in cn=REALM,cn=kerberos,$SUFFIX.
Along other configuration options, this container has list of default
supported encryption types, in krbDefaultEncSaltTypes.

Fetch krbDefaultEncSaltTypes value on ipa-sam initialization and convert
discovered list to the mask of supported encryption types according to
security.idl from Samba:
        typedef [public,bitmap32bit] bitmap {
                KERB_ENCTYPE_DES_CBC_CRC             = 0x00000001,
                KERB_ENCTYPE_DES_CBC_MD5             = 0x00000002,
                KERB_ENCTYPE_RC4_HMAC_MD5            = 0x00000004,
                KERB_ENCTYPE_AES128_CTS_HMAC_SHA1_96 = 0x00000008,
                KERB_ENCTYPE_AES256_CTS_HMAC_SHA1_96 = 0x00000010
        } kerb_EncTypes;

Part of https://fedorahosted.org/freeipa/ticket/3898
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We store Kerberos realm configuration in cn=REALM,cn=kerberos,$SUFFIX.
Along other configuration options, this container has list of default
supported encryption types, in krbDefaultEncSaltTypes.

Fetch krbDefaultEncSaltTypes value on ipa-sam initialization and convert
discovered list to the mask of supported encryption types according to
security.idl from Samba:
        typedef [public,bitmap32bit] bitmap {
                KERB_ENCTYPE_DES_CBC_CRC             = 0x00000001,
                KERB_ENCTYPE_DES_CBC_MD5             = 0x00000002,
                KERB_ENCTYPE_RC4_HMAC_MD5            = 0x00000004,
                KERB_ENCTYPE_AES128_CTS_HMAC_SHA1_96 = 0x00000008,
                KERB_ENCTYPE_AES256_CTS_HMAC_SHA1_96 = 0x00000010
        } kerb_EncTypes;

Part of https://fedorahosted.org/freeipa/ticket/3898
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-sam: do not leak LDAPMessage on ipa-sam initialization</title>
<updated>2013-09-20T07:59:02+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-09T12:52:17+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=860a3ff6477db1004773742e019603032239991e'/>
<id>860a3ff6477db1004773742e019603032239991e</id>
<content type='text'>
We used to handle some of code paths to free memory allocated by the LDAP library
but there are few more unhandled. In addition, search result wasn't freed on successful
initialization, leaking for long time.

https://fedorahosted.org/freeipa/ticket/3913
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We used to handle some of code paths to free memory allocated by the LDAP library
but there are few more unhandled. In addition, search result wasn't freed on successful
initialization, leaking for long time.

https://fedorahosted.org/freeipa/ticket/3913
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-sam: do not modify objectclass when trust object already created</title>
<updated>2013-09-20T07:59:02+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-09-05T05:13:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=9cf8ec79c9e9d05ce9f21b4b187077e1fa650c95'/>
<id>9cf8ec79c9e9d05ce9f21b4b187077e1fa650c95</id>
<content type='text'>
When trust is established, last step done by IPA framework is to set
encryption types associated with the trust. This operation fails due
to ipa-sam attempting to modify object classes in trust object entry
which is not allowed by ACI.

Additionally, wrong handle was used by dcerpc.py code when executing
SetInformationTrustedDomain() against IPA smbd which prevented even to
reach the point where ipa-sam would be asked to modify the trust object.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When trust is established, last step done by IPA framework is to set
encryption types associated with the trust. This operation fails due
to ipa-sam attempting to modify object classes in trust object entry
which is not allowed by ACI.

Additionally, wrong handle was used by dcerpc.py code when executing
SetInformationTrustedDomain() against IPA smbd which prevented even to
reach the point where ipa-sam would be asked to modify the trust object.
</pre>
</div>
</content>
</entry>
<entry>
<title>ipasam: add enumeration of UPN suffixes based on the realm domains</title>
<updated>2013-03-29T12:45:50+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2013-03-22T15:30:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=cc56723151c9ebf58d891e85617319d861af14a4'/>
<id>cc56723151c9ebf58d891e85617319d861af14a4</id>
<content type='text'>
PASSDB API in Samba adds support for specifying UPN suffixes. The change
in ipasam will allow to pass through list of realm domains as UPN suffixes
so that Active Directory domain controller will be able to recognize
non-primary UPN suffixes as belonging to IPA and properly find our KDC
for cross-realm TGT.

Since Samba already returns primary DNS domain separately, filter it out
from list of UPN suffixes.

Also enclose provider of UPN suffixes into #ifdef to support both
Samba with and without pdb_enum_upn_suffixes().

Part of https://fedorahosted.org/freeipa/ticket/2848
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
PASSDB API in Samba adds support for specifying UPN suffixes. The change
in ipasam will allow to pass through list of realm domains as UPN suffixes
so that Active Directory domain controller will be able to recognize
non-primary UPN suffixes as belonging to IPA and properly find our KDC
for cross-realm TGT.

Since Samba already returns primary DNS domain separately, filter it out
from list of UPN suffixes.

Also enclose provider of UPN suffixes into #ifdef to support both
Samba with and without pdb_enum_upn_suffixes().

Part of https://fedorahosted.org/freeipa/ticket/2848
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove build warnings</title>
<updated>2013-03-29T07:59:36+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2013-03-12T14:28:58+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=13b1028ac832c29656c6711834f05f7b34c75cfa'/>
<id>13b1028ac832c29656c6711834f05f7b34c75cfa</id>
<content type='text'>
Fix rpm build warnings report in Fedora 19 build.

https://fedorahosted.org/freeipa/ticket/3500
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix rpm build warnings report in Fedora 19 build.

https://fedorahosted.org/freeipa/ticket/3500
</pre>
</div>
</content>
</entry>
</feed>
