summaryrefslogtreecommitdiff
path: root/server/config
AgeCommit message (Collapse)AuthorFilesLines
2009-12-08Make SSSDDomain.remove_provider() remove configured optionsStephen Gallagher2-6/+54
We will remove all options for a provider that are not also required by another configured provider. (For example, we will not remove krb5_realm when deleting the krb5 auth provider if the LDAP provider is in use, since it may still require this argument).
2009-12-08SSSDDomain.remove_provider() requires only the provider typeStephen Gallagher2-12/+18
There was no valid reason to require the backend type when specifying a provider to remove.
2009-12-08Fail on nonexistent input fileJakub Hrozek2-3/+12
2009-12-08Handle spaces in config parserJakub Hrozek3-2/+43
Fixes: #301
2009-11-23Add ldap_pwd_policy optionSumit Bose2-0/+4
2009-11-20Validate Kerberos credentials with local keytabSumit Bose3-1/+11
2009-11-20upgrade_config fixes for SSSD 0.6 and laterJakub Hrozek1-1/+19
Incorporates changes we made to v2 after 0.6, or that were missed by the original upgrade script: * removes magic_private_groups option * removes libPath option * changes provider=files to provider=proxy proxy_lib_name=files * changes store-legacy-passwords to store_legacy_passwords
2009-11-20SSSDConfigAPI fixesJakub Hrozek2-399/+133
* splitlist is a function * shared SSSDConfigObject to reduce code duplication * added missing exception class * fixed some typos * remove extra 'pass' in unittests * use assertRaises in unittests
2009-11-20Convert SSSDConfig API to ipachangeconfJakub Hrozek3-59/+70
With this patch, SSSDConfigAPI is able to keep comments and ordering of sections. Fixes: #226
2009-11-20Change the upgrade script to use ipachangeconfJakub Hrozek1-0/+383
With this patch, the upgrade script we use for changing the config files is able to keep ordering and comments. Fixes: #249
2009-11-20SSSDChangeConf - a wrapper around ipachangeconfJakub Hrozek1-0/+91
Provides a convenient wrapper around ipachangeconf that is closer API-wise to ConfigParser
2009-11-20Add Simo's ipachangeconfJakub Hrozek2-0/+460
2009-11-18Make the password field configurable in NSSJakub Hrozek2-0/+2
Per the discussion on sssd-devel list, nss_sss should not return a hardcoded value but this should rather be configurable to allow whatever the OS or distribution thinks is the best for the particular case. Fixes: #266
2009-11-10Add cleanup taskSimo Sorce1-0/+1
2009-11-05Update midpoint refresh logic to be relative to cache timeoutStephen Gallagher1-1/+1
2009-11-03Rename sdap_id_map to sdap_attr_mapSimo Sorce1-0/+2
Also start adding some infrastructure to use the USN counter when available. In particular add a place to add generic attrs mapping, ie attributes that are neither user nor group specific.
2009-11-03Add complete pydoc for SSSDConfig APIStephen Gallagher1-1/+534
2009-11-03Add support for option descriptions to SSSDConfig APIStephen Gallagher2-14/+148
Addresses https://fedorahosted.org/sssd/ticket/242 related to authconfig integration
2009-11-03Remove magic_private_groups from SSSDConfig API schemaStephen Gallagher2-3/+0
2009-11-03Make config_file_version a hidden setting in SSSDConfig APIStephen Gallagher5-17/+134
The config_file_version should never be changed by the API, so we will hide the option inside the SSSDConfig API and remove it from the schema. Guarantee that the config file is of the correct version
2009-10-29Tidy up ipa optionsSimo Sorce2-5/+1
Do not replicate every and each option we may want to set in ipa. Just read out ldap and krb provider options (added reference in the manual too, and removed mention of ipa specific timeout values, use ldap options for that) Avoid calling auth module initialization twice, just pass the auth context to the chpass module too. Add a new ldap option SDAP_SEARCH_BASE, so that a single searching base can be used for both users and groups. the user and group search bases can still be set separately if necessary but they are now optional and set to be identical to SDAP_SEARCH_BASE if not explicitly specified in the configuration.
2009-10-28Fix sssd.api.conf with correct entry_cache_timeoutStephen Gallagher2-2/+5
Changeset 3a21103f61bf9b60256cc2d0da54b757b634319f moved the wrong option to the domain list, and also didn't update the unit tests.
2009-10-27Move responsibility for entry expiration timeoutSimo Sorce2-2/+1
The providers are now responsible for determining how long a cached entry is considered valid. The default is the same as before (600s)
2009-10-26Add IPA conf templateSimo Sorce1-0/+9
2009-10-22Add support for offline auth cache timeoutStephen Gallagher1-0/+1
This adds a new option (offline_credentials_expiration) to the [PAM] section of the sssd.conf If the user does not perform an online authentication within the timeout (in days), they will be denied auth once the timeout passes.
2009-10-22Bring SSSDConfig API options up-to-dateStephen Gallagher3-21/+68
2009-10-13Package SSSDConfig APIStephen Gallagher1-0/+34
2009-10-13Add plugin configuration schema for proxy providerStephen Gallagher1-0/+7
2009-10-12Add new SSSDConfig python APIStephen Gallagher9-0/+2111
Also adds unit tests for the SSSDConfig API