<feed xmlns='http://www.w3.org/2005/Atom'>
<title>sssd.git/src/responder, branch sasl_ad_compat</title>
<subtitle>Experimental work on SSSD - Systen Security Services Daemon</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/'/>
<entry>
<title>PAM: Set negcache if user is not found after provider check</title>
<updated>2013-08-07T22:44:19+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-08-07T09:25:50+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=efa8ca8cea5fb6153a42799544ab45fc96bc7ea5'/>
<id>efa8ca8cea5fb6153a42799544ab45fc96bc7ea5</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>PAM: Check negcache when searching for fully qualified users, too</title>
<updated>2013-08-07T22:44:19+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-08-07T09:25:20+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=ddbe6bc5595767e52a3893355515fc260b8f4be4'/>
<id>ddbe6bc5595767e52a3893355515fc260b8f4be4</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>NSS: Clear cached netgroups if a request comes in from the sss_cache</title>
<updated>2013-08-07T22:38:31+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-07-29T13:24:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=db440b3ba6b848010cf2a1fe9f76db394ce860da'/>
<id>db440b3ba6b848010cf2a1fe9f76db394ce860da</id>
<content type='text'>
In order for sss_cache to work correctly, we must also signal the nss
responder to invalidate the hash table requests.

https://fedorahosted.org/sssd/ticket/1759
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In order for sss_cache to work correctly, we must also signal the nss
responder to invalidate the hash table requests.

https://fedorahosted.org/sssd/ticket/1759
</pre>
</div>
</content>
</entry>
<entry>
<title>NSS: allow removing entries from netgroup hash table</title>
<updated>2013-08-07T22:38:31+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-07-29T12:45:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=ada4d12f2e625ad553c6944b7d84bff144c31398'/>
<id>ada4d12f2e625ad553c6944b7d84bff144c31398</id>
<content type='text'>
There is a timed desctructor in the nss responder that, when the
entry timeout passes, removes the netgroup from the hash table while
the netgroup is freed. This patch adds a hash delete callback so that if the
netgroup is removed from the hash table with hash_delete, its hash table
pointer will be invalidated. Later, when the entry is being freed, the
destructor won't attempt to remove it from the hash table.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
There is a timed desctructor in the nss responder that, when the
entry timeout passes, removes the netgroup from the hash table while
the netgroup is freed. This patch adds a hash delete callback so that if the
netgroup is removed from the hash table with hash_delete, its hash table
pointer will be invalidated. Later, when the entry is being freed, the
destructor won't attempt to remove it from the hash table.
</pre>
</div>
</content>
</entry>
<entry>
<title>SSH: Ensure that cmd_ctx-&gt;name will not be NULL.</title>
<updated>2013-08-05T14:48:23+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-07-31T12:12:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=1d45113cd45f8509d1088f941da932c29dd8ab2a'/>
<id>1d45113cd45f8509d1088f941da932c29dd8ab2a</id>
<content type='text'>
If cmd_ctx-&gt;name was not initialized by sss_parse_name
then copy of name will be used.

https://fedorahosted.org/sssd/ticket/1970
Coverity ID: 11647
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If cmd_ctx-&gt;name was not initialized by sss_parse_name
then copy of name will be used.

https://fedorahosted.org/sssd/ticket/1970
Coverity ID: 11647
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix netgroup lookup when using fully qualified name</title>
<updated>2013-07-31T09:00:55+00:00</updated>
<author>
<name>Pavel Březina</name>
<email>pbrezina@redhat.com</email>
</author>
<published>2013-07-29T09:33:19+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=b410c7a9a80b0e44e3740f17d36574d3421626b7'/>
<id>b410c7a9a80b0e44e3740f17d36574d3421626b7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Netgroups should ignore the 'use_fully_qualified_names' setting</title>
<updated>2013-07-29T10:59:17+00:00</updated>
<author>
<name>Stephen Gallagher</name>
<email>sgallagh@redhat.com</email>
</author>
<published>2013-07-11T14:06:09+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=1933ff17513da1d979dd22776a03478341ef5e6b'/>
<id>1933ff17513da1d979dd22776a03478341ef5e6b</id>
<content type='text'>
Netgroups often have memberNisNetgroup entries included in them
that will never process correctly if we require fully-qualified
names on the nested lookup. This patch alters the behavior of
netgroup lookups to check *all* domains for an unqualified
netgroup name, instead of only the ones not requiring fully-
qualified names.

https://fedorahosted.org/sssd/ticket/2013
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Netgroups often have memberNisNetgroup entries included in them
that will never process correctly if we require fully-qualified
names on the nested lookup. This patch alters the behavior of
netgroup lookups to check *all* domains for an unqualified
netgroup name, instead of only the ones not requiring fully-
qualified names.

https://fedorahosted.org/sssd/ticket/2013
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove unused memory context</title>
<updated>2013-07-29T10:57:31+00:00</updated>
<author>
<name>Lukas Slebodnik</name>
<email>lslebodn@redhat.com</email>
</author>
<published>2013-07-20T14:37:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=680ddbdf8478f26cbb5efc9b712ea35714e089ba'/>
<id>680ddbdf8478f26cbb5efc9b712ea35714e089ba</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SUDO: realloc with sizeof(uint32_t) when adding uint32_t</title>
<updated>2013-07-22T11:51:31+00:00</updated>
<author>
<name>Jakub Hrozek</name>
<email>jhrozek@redhat.com</email>
</author>
<published>2013-07-22T07:56:45+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=1b3144586978c47506eaa39db505e6231e3b0c0a'/>
<id>1b3144586978c47506eaa39db505e6231e3b0c0a</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not try to set password when authtok_length is zero</title>
<updated>2013-07-18T14:04:42+00:00</updated>
<author>
<name>Ondrej Kos</name>
<email>okos@redhat.com</email>
</author>
<published>2013-06-24T14:58:23+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/sssd.git/commit/?id=3df593099ecb4b7570548bc14ca58960f79bc9b2'/>
<id>3df593099ecb4b7570548bc14ca58960f79bc9b2</id>
<content type='text'>
https://fedorahosted.org/sssd/ticket/1814

When the authtok_length is zero, it shouldn't call
sss_authtok_set_password, because it tries to determine lenght of passed
string by itself and would read parts of DBus message behind boundaries
of authtok.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/sssd/ticket/1814

When the authtok_length is zero, it shouldn't call
sss_authtok_set_password, because it tries to determine lenght of passed
string by itself and would read parts of DBus message behind boundaries
of authtok.
</pre>
</div>
</content>
</entry>
</feed>
