summaryrefslogtreecommitdiffstats
path: root/proxy/src/gp_rpc_release_handle.c
diff options
context:
space:
mode:
authorSimo Sorce <simo@redhat.com>2013-10-14 16:20:11 -0400
committerSimo Sorce <simo@redhat.com>2013-10-14 17:30:53 -0400
commitf513734b61873fa9bbbaec78f1221d291a0c94a5 (patch)
treef272be015995e05f7900f71453d2c3799c6b09af /proxy/src/gp_rpc_release_handle.c
parent66f3183c54e3c27c0224226fa60bf8b933190b4a (diff)
downloadgss-proxy-f513734b61873fa9bbbaec78f1221d291a0c94a5.tar.gz
gss-proxy-f513734b61873fa9bbbaec78f1221d291a0c94a5.tar.xz
gss-proxy-f513734b61873fa9bbbaec78f1221d291a0c94a5.zip
Allow arbitrary users to connect to a service
The rpc.gssd daemon is changing to fork and change uid to the unprivileged user it wants to authenticate, this means gssproxy needs to allow connection from any euid. When this is done though, the trusted flag needs to be dropped, if the connecting euid does not match the default trusted uid to prevent improper impersonation. Resolves: https://fedorahosted.org/gss-proxy/ticket/103
Diffstat (limited to 'proxy/src/gp_rpc_release_handle.c')
-rw-r--r--proxy/src/gp_rpc_release_handle.c3
1 files changed, 1 insertions, 2 deletions
diff --git a/proxy/src/gp_rpc_release_handle.c b/proxy/src/gp_rpc_release_handle.c
index a9f5ee2..97fc896 100644
--- a/proxy/src/gp_rpc_release_handle.c
+++ b/proxy/src/gp_rpc_release_handle.c
@@ -25,8 +25,7 @@
#include "gp_rpc_process.h"
-int gp_release_handle(struct gssproxy_ctx *gpctx,
- struct gp_service *gpsvc,
+int gp_release_handle(struct gp_call_ctx *gpcall,
union gp_rpc_arg *arg,
union gp_rpc_res *res)
{