summaryrefslogtreecommitdiff
path: root/server
AgeCommit message (Collapse)AuthorFilesLines
2010-02-10Make return values more specific during password changeSumit Bose3-37/+58
- return PAM_AUTHTOK_ERR instead of PAM_SYSTEM_ERR if the password change operation fails - send a message to the user if the system is offline and the password cannot be changed
2010-02-10Updating PL translationPiotr Drąg1-4/+6
2010-02-10Fix handling of the global context in the leak detectorSumit Bose2-1/+3
2010-02-10Send a message to the user if the login is delayedSumit Bose5-35/+91
2010-02-05Update translatable stringsStephen Gallagher9-549/+675
2010-02-05Document when LDAP referral chasing is availableSumit Bose2-0/+17
2010-02-05Reactivate old fd handling conditionallySumit Bose5-1/+82
Older versions of openLDAP do not provide a connection callback. This patch adds a configure check to see if the callback is available and activates the old way of handling the file description of the LDAP connection. This also means that it is not possible to follow referrals.
2010-02-05Add mandatory flag to SSSD config schemaStephen Gallagher8-207/+455
Also add list_mandatory_options() to both SSSDService and SSSDDomain objects. There is a new list_options_with_mandatory() function that will return a longer tuple than list_options(), including the mandatory flag directly.
2010-02-05Remove unnecessary explicit defaults from SSSDConfig APIStephen Gallagher2-10/+10
2010-02-05Added option to use libcrypto instead of NSS.George McCollister7-11/+416
crypto_sha512crypt.c is a clone of nss_sha512crypt.c with the exception that all usage of NSS and related libraries has been switched to libcrypto. I renamed nss_sha512crypt.h to sha512crypt.h since it is common to both crypto_sha512crypt.c and nss_sha512crypt.c. Note that the random number generator is not seeded manually and thus relies on seeding done automatically by libcrypto. On some systems without /dev/urandom seeding may not be performed. See http://www.openssl.org/docs/crypto/RAND_add.html. Signed-off-by: George McCollister <georgem@novatech-llc.com>
2010-02-05Internationalize the command-line help messageStephen Gallagher5-15/+15
2010-02-05Enable debug_timestamps by defaultStephen Gallagher7-11/+11
It can be overridden in the sssd.conf or on the commandline with --debug-timestamps=0
2010-02-03Make krb5 and open checks work if forking is disabledSumit Bose2-1/+6
When CK_FORK is set to 'no' the fixtures are executed for every new test inside of the same process. Global variables must be set to the expected values by the fixtures. check_and_open-tests.c: the filename template for mkstemp() was a globally defined character string. After the first call to mkstemp() the trailing XXXXXX are substituted by random values, a second call to mkstemp() with this character string fails. This patch initialize the filename template before mkstemp() is called with the help of strdup() and the memory is freed in the teardown fixture. krb5_utils-tests.c: this patch sets the just freed global talloc context to NULL to make a consistency check in the setup fixture pass.
2010-02-03Make resolve and failover test work with CK_FORK=noSumit Bose4-6/+11
The leak checking code which is used by the resolve and failover tests frees talloc's autofree context which is not recommended. As a consequence the initialization of tevent failed when it was called by the second test and CF_FORK=no, because it holds some data in the autofree context. This patch introduces a global talloc context which should be uses by the test as the root of their memory hierarchy instead of NULL. This global context is used in the leak checking routines. Not all types of memory leaks can be detected by the new version , it is recommended to use valgrind or similar tools additionally.
2010-02-03Split off libini_config into a shared libraryStephen Gallagher3-5/+23
2010-02-03Split off libcollection into a shared libraryStephen Gallagher3-6/+24
2010-02-02Warn the user if authentication happens offlineSumit Bose4-13/+132
2010-02-02Add offline failed login counterSumit Bose9-17/+631
2010-02-02Add new option ldap_referralsSumit Bose7-1/+30
2010-02-02Use ldap connection callbacks to get file descriptorsSumit Bose4-43/+121
2010-02-02Check cache_credentials in sysdb_cache_auth_send()Sumit Bose2-0/+14
2010-02-01Force offline operation with SIGUSR1Stephen Gallagher3-0/+69
If the monitor receives SIGUSR1, it will instruct all providers to enter offline operation. If any individual provider receives SIGUSR1, it alone will enter offline operation.
2010-02-01Avoid 'PAM' at the beginning of define and enum namesSumit Bose5-25/+26
2010-02-01Rename PAM_USER_INFO to PAM_SYSTEM_INFOSumit Bose2-3/+3
2010-01-25Fix size error on 64-bit systemsStephen Gallagher1-1/+1
2010-01-22Handle IPv6 addresses with the async resolverStephen Gallagher4-13/+65
2010-01-22Pointers to non 32 bit aligned data were being cast to uint32_t *George McCollister2-9/+11
uint32_t pointers must point to 32 bit aligned data on ARM. Instead of padding the data to force it into alignment I altered the code to memcpy the data to an aligned location. I'd appreciate any and all feedback especially on whether I took the best approach. pam_test_client auth and pam_test_client acct now work on my armeb-xscale-linux-gnueabi target. Signed-off-by: George McCollister <georgem@opteron.novatech-llc.com>
2010-01-22Fix async resolver integration with teventStephen Gallagher1-7/+19
We weren't properly setting read/write flags on the tevent fd events, so c-ares was unable to perform bidirectional communication for TCP DNS (in situations where the response is too large to send by UDP)
2010-01-21Add missing link for KerberosStephen Gallagher1-1/+2
2010-01-21Use version.m4 for setting the SSSD versionStephen Gallagher1-1/+4
This is the preferred way of setting the version in a file, as autotools will properly monitor this file for changes and rerun autoconf/configure when necessary to update the version. This means that we don't need to manually perform an autoreconf in order to build a new RPM
2010-01-20Split off libdhash into a shared libraryStephen Gallagher3-5/+23
Right now, the pkg-config checks for the system version of libdhash are forcibly disabled, requiring the SSSD to build it from its own tree. In the future, when we split the libraries off from the SSSD, it will be easy to switch this check to the external library.
2010-01-20Fix a double free bugSumit Bose1-3/+0
2010-01-20Fix timeout memory heirarchyStephen Gallagher1-2/+14
This fixes two issues: 1) Eliminates a double-free when a timeout occurs (we were freeing the running event context) 2) Ensures that we don't continue to schedule unnecessary timeout checks
2010-01-20Deleting nonexistent users or groups is not a noopJakub Hrozek2-4/+2
The manual pages for userdel and groupdel utilities incorrectly stated that deleting a nonexistent user or group is a noop. We changed that behavior, but forgot to sync the documentation.
2010-01-20document debug_timestampsJakub Hrozek2-0/+22
2010-01-20Add sysdb request to authenticate against a cached passwordSumit Bose8-217/+378
The code for authentication against a cached password is moved from the pam responder to a generic sysdb tevent request. The new code can be used by other components of sssd to verify passwords on their own. Tests for the sysdb_cache_password and sysdb_cache_auth request are added and some unneeded or unused code and variables are removed.
2010-01-20sss_groupshow - a utility to print properties of a local groupJakub Hrozek9-2/+452
This patch adds a utility called sss_groupshow that allows user to print properties of a group in the local domain. Fixes: #306
2010-01-14Copy-edit, mainly fixing typos and EnglishDavid O'Brien2-71/+68
Some reformatting to stay within 79 char line length. Better definition of server vs. machine usage in failover section.
2010-01-14Make sure callbacks never retry when ares channel is destroyedMartin Nagy1-4/+12
When the resolv context destructor is invoked, the callbacks for pending queries could have been called with ARES_EDESTRUCTION and try to re-send the query.
2010-01-14Don't recursively call ares_process_fd() from fd_event()Martin Nagy1-17/+0
Since ares_process_fd() might also cause fd_event() to be called again, calling ares_process_fd() is unwise. The bug will cause a crash if c-ares is using tcp connections. Fixes: #384
2010-01-14Make periodic checks for DNS timeoutsMartin Nagy1-1/+82
Since we only call c-ares to process input on FD when there is an activity on them, c-ares never gets a chance to react to a timed-out request. This caused SSSD to hang. Fixes: #381
2010-01-14Explicitly set async DNS timeoutStephen Gallagher5-6/+15
We will allow 5s per DNS server, no retries.
2010-01-12Fix #382, a segfault bug in the memberof plugin.Simo Sorce1-1/+1
2010-01-12Re-create c-ares channels if /etc/resolv.conf is modifiedMartin Nagy3-14/+95
Fixes: #378
2010-01-12Remove local and kerberos providers from the access_provider listStephen Gallagher3-6/+2
Update tests to reflect these removals.
2010-01-12Update SV translationPiotr Drąg1-3/+2
2010-01-11Fix return value when offline and TGT is validSumit Bose1-1/+1
Fixes CVE-2010-0014
2010-01-05Update SV translationGöran Uddeborg1-3/+3
2010-01-05Update translations for masterStephen Gallagher9-411/+402
2010-01-05Don't free timer events within the handler.Simo Sorce1-16/+12
Tevent frees timer handlers once done, so freeing the timer within the event is going to cause double frees. Just attach the timer event to the request it depends on and make sure to steal it on NULL if we are going to free the request from within the handler.