<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd.git/src/providers/simple, branch ccname</title>
<subtitle>Experimental work on SSSD - Systen Security Services Daemon</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/'/>
<entry>
<title>simple provider: obey case sensitivity for subdomain users and groups</title>
<updated>2013-09-17T14:02:20+00:00</updated>
<author>
<name>Pavel Březina</name>
<email>pbrezina@redhat.com</email>
</author>
<published>2013-09-12T11:15:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=a0d010f488bf15fb3e170ce04092013fa494401f'/>
<id>a0d010f488bf15fb3e170ce04092013fa494401f</id>
<content type='text'>
When comparing username and his groups to access list, we will
obey case sensitivity of object from access list.

Resolves:
https://fedorahosted.org/sssd/ticket/2034
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When comparing username and his groups to access list, we will
obey case sensitivity of object from access list.

Resolves:
https://fedorahosted.org/sssd/ticket/2034
</pre>
</div>
</content>
</entry>
<entry>
<title>simple provider: support subdomain groups</title>
<updated>2013-09-17T14:02:20+00:00</updated>
<author>
<name>Pavel Březina</name>
<email>pbrezina@redhat.com</email>
</author>
<published>2013-08-28T09:35:27+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=115241b0eeedd033d34d9721a896f031140944d7'/>
<id>115241b0eeedd033d34d9721a896f031140944d7</id>
<content type='text'>
Resolves:
https://fedorahosted.org/sssd/ticket/2034
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Resolves:
https://fedorahosted.org/sssd/ticket/2034
</pre>
</div>
</content>
</entry>
<entry>
<title>simple provider: support subdomain users</title>
<updated>2013-09-17T14:02:20+00:00</updated>
<author>
<name>Pavel Březina</name>
<email>pbrezina@redhat.com</email>
</author>
<published>2013-08-27T12:02:42+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=721241198c369596c4f13445c70f227b199fdcd0'/>
<id>721241198c369596c4f13445c70f227b199fdcd0</id>
<content type='text'>
Resolves:
https://fedorahosted.org/sssd/ticket/2034
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Resolves:
https://fedorahosted.org/sssd/ticket/2034
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix formating of variables with type: gid_t</title>
<updated>2013-09-11T17:44:56+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-09-04T14:52:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=a4bf85ccc902490c3b75b44532010fbb32169801'/>
<id>a4bf85ccc902490c3b75b44532010fbb32169801</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix formating of variables with type: size_t</title>
<updated>2013-09-11T17:44:54+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-07-17T10:41:33+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=0e65abe5cf2abf5d4b431cf6bd161b419f07901d'/>
<id>0e65abe5cf2abf5d4b431cf6bd161b419f07901d</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>simple access provider: allow fully qualified names</title>
<updated>2013-08-07T11:18:22+00:00</updated>
<author>
<name>Pavel Březina</name>
<email>pbrezina@redhat.com</email>
</author>
<published>2013-07-26T08:17:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=ffb83ee934f6ea1d9077ab601530436eff2d20e4'/>
<id>ffb83ee934f6ea1d9077ab601530436eff2d20e4</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/2026
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/2026
</pre>
</div>
</content>
</entry>
<entry>
<title>Convert the simple access check to new error codes</title>
<updated>2013-04-19T16:53:41+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-04-17T09:33:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=18f01e63c1968c29bddb9e48c279b583c0444730'/>
<id>18f01e63c1968c29bddb9e48c279b583c0444730</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/453

It makes sense to keep using the boolean for access granted/denied, but
when the user/group is not found, the request would now return
ERR_ACCOUNT_UNKNOWN
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/453

It makes sense to keep using the boolean for access granted/denied, but
when the user/group is not found, the request would now return
ERR_ACCOUNT_UNKNOWN
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix simple access group control in case-insensitive domains</title>
<updated>2013-04-15T12:56:45+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-04-11T07:18:56+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=8e195a545d41647e591c1d06082133cbd25dc0a4'/>
<id>8e195a545d41647e591c1d06082133cbd25dc0a4</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1713

In the simple access provider, we need to only canonicalize user names when
comparing with values in the ACL, not when searching the cache. The sysdb
searches might do a base search with a DN constructed with the username
which fails if the username is lower case.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1713

In the simple access provider, we need to only canonicalize user names when
comparing with values in the ACL, not when searching the cache. The sysdb
searches might do a base search with a DN constructed with the username
which fails if the username is lower case.
</pre>
</div>
</content>
</entry>
<entry>
<title>Resolve GIDs in the simple access provider</title>
<updated>2013-03-19T20:47:30+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-02-23T09:44:54+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=c0bca1722d6f9dfb654ad78397be70f79ff39af1'/>
<id>c0bca1722d6f9dfb654ad78397be70f79ff39af1</id>
<content type='text'>
Changes the simple access provider's interface to be asynchronous. When
the simple access provider encounters a group that has gid, but no
meaningful name, it attempts to resolve the name using the
be_file_account_request function.

Some providers (like the AD provider) might perform initgroups
without resolving the group names. In order for the simple access
provider to work correctly, we need to resolve the groups before
performing the access check. In AD provider, the situation is
even more tricky b/c the groups HAVE name, but their name
attribute is set to SID and they are set as non-POSIX
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Changes the simple access provider's interface to be asynchronous. When
the simple access provider encounters a group that has gid, but no
meaningful name, it attempts to resolve the name using the
be_file_account_request function.

Some providers (like the AD provider) might perform initgroups
without resolving the group names. In order for the simple access
provider to work correctly, we need to resolve the groups before
performing the access check. In AD provider, the situation is
even more tricky b/c the groups HAVE name, but their name
attribute is set to SID and they are set as non-POSIX
</pre>
</div>
</content>
</entry>
<entry>
<title>Add be_req_get_data() helper funciton.</title>
<updated>2013-01-21T21:17:34+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2013-01-11T23:13:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=cbaba2f47da96c4191971bce86f03afb3f88864a'/>
<id>cbaba2f47da96c4191971bce86f03afb3f88864a</id>
<content type='text'>
In preparation for making struct be_req opaque.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In preparation for making struct be_req opaque.
</pre>
</div>
</content>
</entry>
</feed>
