<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd.git/contrib, branch libwbclient-0.13</title>
<subtitle>Unnamed repository; edit this file to name it for gitweb.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/'/>
<entry>
<title>MAN: sssd-secrets documentation</title>
<updated>2016-09-30T07:09:26+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2016-08-08T15:48:51+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=54c64aad71e6792edb7cf99988d9a7f4bc2b0c61'/>
<id>54c64aad71e6792edb7cf99988d9a7f4bc2b0c61</id>
<content type='text'>
Resolves:
    https://fedorahosted.org/sssd/ticket/3053

Documents the API and the purpose of the sssd-secrets responder.

Reviewed-by: Fabiano Fidêncio &lt;fidencio@redhat.com&gt;
Reviewed-by: Pavel Březina &lt;pbrezina@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Resolves:
    https://fedorahosted.org/sssd/ticket/3053

Documents the API and the purpose of the sssd-secrets responder.

Reviewed-by: Fabiano Fidêncio &lt;fidencio@redhat.com&gt;
Reviewed-by: Pavel Březina &lt;pbrezina@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SPEC: Rename python packages using macro %python_provide</title>
<updated>2016-09-22T19:44:41+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2016-09-14T12:31:29+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=705bc4480a68f69d287b1c89fe9463a0191987c8'/>
<id>705bc4480a68f69d287b1c89fe9463a0191987c8</id>
<content type='text'>
Fedora and epel contains macro %python_provide
for simpler renaming of python packages. It will generate correct
provides and obsoletes.

Reviewed-by: Michal Židek &lt;mzidek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fedora and epel contains macro %python_provide
for simpler renaming of python packages. It will generate correct
provides and obsoletes.

Reviewed-by: Michal Židek &lt;mzidek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>TESTS: Add simple test for double semicolon</title>
<updated>2016-09-21T14:46:19+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2016-09-17T19:12:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=6ad1f2da4055e2cfe9bf8c79b79e408dba171691'/>
<id>6ad1f2da4055e2cfe9bf8c79b79e408dba171691</id>
<content type='text'>
Reviewed-by: Pavel Březina &lt;pbrezina@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-by: Pavel Březina &lt;pbrezina@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>TESTS: Add integration tests for the sssd-secrets</title>
<updated>2016-09-20T15:34:39+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2016-08-08T15:49:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=db0982c52294ee5ea08ed242d27660783fde29cd'/>
<id>db0982c52294ee5ea08ed242d27660783fde29cd</id>
<content type='text'>
Implements a simple HTTP client and uses it to talk to the sssd-secrets
responder. Only the local provider is tested at the moment.

Resolves:
https://fedorahosted.org/sssd/ticket/3054

Reviewed-by: Petr Čech &lt;pcech@redhat.com&gt;
Reviewed-by: Lukáš Slebodník &lt;lslebodn@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Implements a simple HTTP client and uses it to talk to the sssd-secrets
responder. Only the local provider is tested at the moment.

Resolves:
https://fedorahosted.org/sssd/ticket/3054

Reviewed-by: Petr Čech &lt;pcech@redhat.com&gt;
Reviewed-by: Lukáš Slebodník &lt;lslebodn@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SPEC: Fix typo in Summary</title>
<updated>2016-08-26T13:27:15+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2016-08-19T16:06:45+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=afa6891a809db262a49f68913f82a3a6137d8e2e'/>
<id>afa6891a809db262a49f68913f82a3a6137d8e2e</id>
<content type='text'>
Reviewed-by: Jakub Hrozek &lt;jhrozek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-by: Jakub Hrozek &lt;jhrozek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>BUILD: Allow to read private pipes for root</title>
<updated>2016-08-26T12:29:30+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2016-08-19T08:46:12+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=f49724cd6b3e0e3274302c3d475e93f7a7094f40'/>
<id>f49724cd6b3e0e3274302c3d475e93f7a7094f40</id>
<content type='text'>
Root can read anything from any directory even with permissions 000.

However SELinux checks discretionary access control (DAC)
and deny access if access is not allowed for root by DAC.
The pam_sss use different unix socket /var/lib/sss/pipes/private/pam
for user with uid 0. Therefore root need to be able read content
of directory with private pipes.

type=AVC msg=audit(08/19/2016 10:58:34.081:3369) : avc:  denied
  { dac_read_search } for  pid=20257 comm=vsftpd capability=dac_read_search
  scontext=system_u:system_r:ftpd_t:s0-s0:c0.c1023
  tcontext=system_u:system_r:ftpd_t:s0-s0:c0.c1023 tclass=capability

type=AVC msg=audit(08/19/2016 10:58:34.081:3369) : avc:  denied
  { dac_override } for  pid=20257 comm=vsftpd capability=dac_override
  scontext=system_u:system_r:ftpd_t:s0-s0:c0.c1023
  tcontext=system_u:system_r:ftpd_t:s0-s0:c0.c1023 tclass=capability

Resolves:
https://fedorahosted.org/sssd/ticket/3143

Reviewed-by: Jakub Hrozek &lt;jhrozek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Root can read anything from any directory even with permissions 000.

However SELinux checks discretionary access control (DAC)
and deny access if access is not allowed for root by DAC.
The pam_sss use different unix socket /var/lib/sss/pipes/private/pam
for user with uid 0. Therefore root need to be able read content
of directory with private pipes.

type=AVC msg=audit(08/19/2016 10:58:34.081:3369) : avc:  denied
  { dac_read_search } for  pid=20257 comm=vsftpd capability=dac_read_search
  scontext=system_u:system_r:ftpd_t:s0-s0:c0.c1023
  tcontext=system_u:system_r:ftpd_t:s0-s0:c0.c1023 tclass=capability

type=AVC msg=audit(08/19/2016 10:58:34.081:3369) : avc:  denied
  { dac_override } for  pid=20257 comm=vsftpd capability=dac_override
  scontext=system_u:system_r:ftpd_t:s0-s0:c0.c1023
  tcontext=system_u:system_r:ftpd_t:s0-s0:c0.c1023 tclass=capability

Resolves:
https://fedorahosted.org/sssd/ticket/3143

Reviewed-by: Jakub Hrozek &lt;jhrozek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>BUILD: Ship systemd service file for sssd-secrets</title>
<updated>2016-08-17T14:55:31+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2016-08-15T12:10:23+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=733100a12138a701d0ae7ef5af2b04b08e225033'/>
<id>733100a12138a701d0ae7ef5af2b04b08e225033</id>
<content type='text'>
Adds two new files: sssd-secrets.socket and sssd-secrets.service. These
can be used to socket-acticate the secrets responder even without
explicitly starting it in the sssd config file.

The specfile activates the socket after installation which means that
the admin would just be able to use the secrets socket and the
sssd_secrets responder would be started automatically by systemd.

The sssd-secrets responder is started as root, mostly because I didn't
think of an easy way to pass the uid/gid to the responders without
asking about the sssd user identity in the first place. But nonetheless,
the sssd-secrets responder wasn't tested as non-root and at least the
initialization should be performed as root for the time being.

Reviewed-by: Fabiano Fidêncio &lt;fabiano@fidencio.org&gt;
Reviewed-by: Lukáš Slebodník &lt;lslebodn@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Adds two new files: sssd-secrets.socket and sssd-secrets.service. These
can be used to socket-acticate the secrets responder even without
explicitly starting it in the sssd config file.

The specfile activates the socket after installation which means that
the admin would just be able to use the secrets socket and the
sssd_secrets responder would be started automatically by systemd.

The sssd-secrets responder is started as root, mostly because I didn't
think of an easy way to pass the uid/gid to the responders without
asking about the sssd user identity in the first place. But nonetheless,
the sssd-secrets responder wasn't tested as non-root and at least the
initialization should be performed as root for the time being.

Reviewed-by: Fabiano Fidêncio &lt;fabiano@fidencio.org&gt;
Reviewed-by: Lukáš Slebodník &lt;lslebodn@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SPEC: Own the secrets DB path</title>
<updated>2016-08-17T14:15:17+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2016-08-16T14:45:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=b72bf8cf70f8973d805c73a02ec681156ac9396d'/>
<id>b72bf8cf70f8973d805c73a02ec681156ac9396d</id>
<content type='text'>
Reviewed-by: Lukáš Slebodník &lt;lslebodn@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-by: Lukáš Slebodník &lt;lslebodn@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>CI: Use /bin/sh as a CONFIG SHELL</title>
<updated>2016-07-22T06:57:05+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2016-07-21T15:44:58+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=35f29b17699c3d52f77857c530300318b14148f8'/>
<id>35f29b17699c3d52f77857c530300318b14148f8</id>
<content type='text'>
There is a bug on debian_testing in bash.
  sh$ valgrind /bin/bash
  ==25145== Memcheck, a memory error detector
  ==25145== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
  ==25145== Using Valgrind-3.12.0.SVN and LibVEX; rerun with -h for copyright info
  ==25145== Command: /bin/bash
  ==25145==
  ==25145== Invalid read of size 1
  ==25145==    at 0x4B90B1: ??? (in /bin/bash)
  ==25145==    by 0x43FE9B: initialize_shell_variables (in /bin/bash)
  ==25145==    by 0x41E4C0: ??? (in /bin/bash)
  ==25145==    by 0x41F722: main (in /bin/bash)
  ==25145==  Address 0x58307f8 is 8 bytes before a block of size 31 alloc'd
  ==25145==    at 0x4C2BBCF: malloc (vg_replace_malloc.c:299)
  ==25145==    by 0x475D1A: xmalloc (in /bin/bash)
  ==25145==    by 0x4B7F4A: tilde_expand (in /bin/bash)
  ==25145==    by 0x42E63D: bash_tilde_expand (in /bin/bash)
  ==25145==    by 0x43FE79: initialize_shell_variables (in /bin/bash)
  ==25145==    by 0x41E4C0: ??? (in /bin/bash)
  ==25145==    by 0x41F722: main (in /bin/bash)
  ==25145==

  malloc: .././variables.c:570: assertion botched
  free: called with unallocated block argument
  last command: (null)
  Aborting...==25145==

And /bin/bash was used as a default SHELL in scripts generated by
configure+libtool. It starting to fail with the latest valgrind
valgrind-3.12.0~svn20160714-1

Workaround is to use /bin/sh which is a symlink to /bin/dash

Reviewed-by: Petr Cech &lt;pcech@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
There is a bug on debian_testing in bash.
  sh$ valgrind /bin/bash
  ==25145== Memcheck, a memory error detector
  ==25145== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
  ==25145== Using Valgrind-3.12.0.SVN and LibVEX; rerun with -h for copyright info
  ==25145== Command: /bin/bash
  ==25145==
  ==25145== Invalid read of size 1
  ==25145==    at 0x4B90B1: ??? (in /bin/bash)
  ==25145==    by 0x43FE9B: initialize_shell_variables (in /bin/bash)
  ==25145==    by 0x41E4C0: ??? (in /bin/bash)
  ==25145==    by 0x41F722: main (in /bin/bash)
  ==25145==  Address 0x58307f8 is 8 bytes before a block of size 31 alloc'd
  ==25145==    at 0x4C2BBCF: malloc (vg_replace_malloc.c:299)
  ==25145==    by 0x475D1A: xmalloc (in /bin/bash)
  ==25145==    by 0x4B7F4A: tilde_expand (in /bin/bash)
  ==25145==    by 0x42E63D: bash_tilde_expand (in /bin/bash)
  ==25145==    by 0x43FE79: initialize_shell_variables (in /bin/bash)
  ==25145==    by 0x41E4C0: ??? (in /bin/bash)
  ==25145==    by 0x41F722: main (in /bin/bash)
  ==25145==

  malloc: .././variables.c:570: assertion botched
  free: called with unallocated block argument
  last command: (null)
  Aborting...==25145==

And /bin/bash was used as a default SHELL in scripts generated by
configure+libtool. It starting to fail with the latest valgrind
valgrind-3.12.0~svn20160714-1

Workaround is to use /bin/sh which is a symlink to /bin/dash

Reviewed-by: Petr Cech &lt;pcech@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>SPEC: Move nfsidmap plugin to separate package</title>
<updated>2016-07-18T12:02:36+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2016-07-04T16:12:31+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/sssd.git/commit/?id=4767ba5ddf13ffe51a48634fd9907391222d967c'/>
<id>4767ba5ddf13ffe51a48634fd9907391222d967c</id>
<content type='text'>
Resolves:
https://fedorahosted.org/sssd/ticket/3024

Reviewed-by: Noam Meltzer &lt;tsnoam@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Resolves:
https://fedorahosted.org/sssd/ticket/3024

Reviewed-by: Noam Meltzer &lt;tsnoam@gmail.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
