summaryrefslogtreecommitdiff
path: root/server
AgeCommit message (Collapse)AuthorFilesLines
2010-02-05Added option to use libcrypto instead of NSS.George McCollister7-11/+416
crypto_sha512crypt.c is a clone of nss_sha512crypt.c with the exception that all usage of NSS and related libraries has been switched to libcrypto. I renamed nss_sha512crypt.h to sha512crypt.h since it is common to both crypto_sha512crypt.c and nss_sha512crypt.c. Note that the random number generator is not seeded manually and thus relies on seeding done automatically by libcrypto. On some systems without /dev/urandom seeding may not be performed. See http://www.openssl.org/docs/crypto/RAND_add.html. Signed-off-by: George McCollister <georgem@novatech-llc.com>
2010-02-05Internationalize the command-line help messageStephen Gallagher5-15/+15
2010-02-05Enable debug_timestamps by defaultStephen Gallagher7-11/+11
It can be overridden in the sssd.conf or on the commandline with --debug-timestamps=0
2010-02-03Make krb5 and open checks work if forking is disabledSumit Bose2-1/+6
When CK_FORK is set to 'no' the fixtures are executed for every new test inside of the same process. Global variables must be set to the expected values by the fixtures. check_and_open-tests.c: the filename template for mkstemp() was a globally defined character string. After the first call to mkstemp() the trailing XXXXXX are substituted by random values, a second call to mkstemp() with this character string fails. This patch initialize the filename template before mkstemp() is called with the help of strdup() and the memory is freed in the teardown fixture. krb5_utils-tests.c: this patch sets the just freed global talloc context to NULL to make a consistency check in the setup fixture pass.
2010-02-03Make resolve and failover test work with CK_FORK=noSumit Bose4-6/+11
The leak checking code which is used by the resolve and failover tests frees talloc's autofree context which is not recommended. As a consequence the initialization of tevent failed when it was called by the second test and CF_FORK=no, because it holds some data in the autofree context. This patch introduces a global talloc context which should be uses by the test as the root of their memory hierarchy instead of NULL. This global context is used in the leak checking routines. Not all types of memory leaks can be detected by the new version , it is recommended to use valgrind or similar tools additionally.
2010-02-03Split off libini_config into a shared libraryStephen Gallagher3-5/+23
2010-02-03Split off libcollection into a shared libraryStephen Gallagher3-6/+24
2010-02-02Warn the user if authentication happens offlineSumit Bose4-13/+132
2010-02-02Add offline failed login counterSumit Bose9-17/+631
2010-02-02Add new option ldap_referralsSumit Bose7-1/+30
2010-02-02Use ldap connection callbacks to get file descriptorsSumit Bose4-43/+121
2010-02-02Check cache_credentials in sysdb_cache_auth_send()Sumit Bose2-0/+14
2010-02-01Force offline operation with SIGUSR1Stephen Gallagher3-0/+69
If the monitor receives SIGUSR1, it will instruct all providers to enter offline operation. If any individual provider receives SIGUSR1, it alone will enter offline operation.
2010-02-01Avoid 'PAM' at the beginning of define and enum namesSumit Bose5-25/+26
2010-02-01Rename PAM_USER_INFO to PAM_SYSTEM_INFOSumit Bose2-3/+3
2010-01-25Fix size error on 64-bit systemsStephen Gallagher1-1/+1
2010-01-22Handle IPv6 addresses with the async resolverStephen Gallagher4-13/+65
2010-01-22Pointers to non 32 bit aligned data were being cast to uint32_t *George McCollister2-9/+11
uint32_t pointers must point to 32 bit aligned data on ARM. Instead of padding the data to force it into alignment I altered the code to memcpy the data to an aligned location. I'd appreciate any and all feedback especially on whether I took the best approach. pam_test_client auth and pam_test_client acct now work on my armeb-xscale-linux-gnueabi target. Signed-off-by: George McCollister <georgem@opteron.novatech-llc.com>
2010-01-22Fix async resolver integration with teventStephen Gallagher1-7/+19
We weren't properly setting read/write flags on the tevent fd events, so c-ares was unable to perform bidirectional communication for TCP DNS (in situations where the response is too large to send by UDP)
2010-01-21Add missing link for KerberosStephen Gallagher1-1/+2
2010-01-21Use version.m4 for setting the SSSD versionStephen Gallagher1-1/+4
This is the preferred way of setting the version in a file, as autotools will properly monitor this file for changes and rerun autoconf/configure when necessary to update the version. This means that we don't need to manually perform an autoreconf in order to build a new RPM
2010-01-20Split off libdhash into a shared libraryStephen Gallagher3-5/+23
Right now, the pkg-config checks for the system version of libdhash are forcibly disabled, requiring the SSSD to build it from its own tree. In the future, when we split the libraries off from the SSSD, it will be easy to switch this check to the external library.
2010-01-20Fix a double free bugSumit Bose1-3/+0
2010-01-20Fix timeout memory heirarchyStephen Gallagher1-2/+14
This fixes two issues: 1) Eliminates a double-free when a timeout occurs (we were freeing the running event context) 2) Ensures that we don't continue to schedule unnecessary timeout checks
2010-01-20Deleting nonexistent users or groups is not a noopJakub Hrozek2-4/+2
The manual pages for userdel and groupdel utilities incorrectly stated that deleting a nonexistent user or group is a noop. We changed that behavior, but forgot to sync the documentation.
2010-01-20document debug_timestampsJakub Hrozek2-0/+22
2010-01-20Add sysdb request to authenticate against a cached passwordSumit Bose8-217/+378
The code for authentication against a cached password is moved from the pam responder to a generic sysdb tevent request. The new code can be used by other components of sssd to verify passwords on their own. Tests for the sysdb_cache_password and sysdb_cache_auth request are added and some unneeded or unused code and variables are removed.
2010-01-20sss_groupshow - a utility to print properties of a local groupJakub Hrozek9-2/+452
This patch adds a utility called sss_groupshow that allows user to print properties of a group in the local domain. Fixes: #306
2010-01-14Copy-edit, mainly fixing typos and EnglishDavid O'Brien2-71/+68
Some reformatting to stay within 79 char line length. Better definition of server vs. machine usage in failover section.
2010-01-14Make sure callbacks never retry when ares channel is destroyedMartin Nagy1-4/+12
When the resolv context destructor is invoked, the callbacks for pending queries could have been called with ARES_EDESTRUCTION and try to re-send the query.
2010-01-14Don't recursively call ares_process_fd() from fd_event()Martin Nagy1-17/+0
Since ares_process_fd() might also cause fd_event() to be called again, calling ares_process_fd() is unwise. The bug will cause a crash if c-ares is using tcp connections. Fixes: #384
2010-01-14Make periodic checks for DNS timeoutsMartin Nagy1-1/+82
Since we only call c-ares to process input on FD when there is an activity on them, c-ares never gets a chance to react to a timed-out request. This caused SSSD to hang. Fixes: #381
2010-01-14Explicitly set async DNS timeoutStephen Gallagher5-6/+15
We will allow 5s per DNS server, no retries.
2010-01-12Fix #382, a segfault bug in the memberof plugin.Simo Sorce1-1/+1
2010-01-12Re-create c-ares channels if /etc/resolv.conf is modifiedMartin Nagy3-14/+95
Fixes: #378
2010-01-12Remove local and kerberos providers from the access_provider listStephen Gallagher3-6/+2
Update tests to reflect these removals.
2010-01-12Update SV translationPiotr Drąg1-3/+2
2010-01-11Fix return value when offline and TGT is validSumit Bose1-1/+1
Fixes CVE-2010-0014
2010-01-05Update SV translationGöran Uddeborg1-3/+3
2010-01-05Update translations for masterStephen Gallagher9-411/+402
2010-01-05Don't free timer events within the handler.Simo Sorce1-16/+12
Tevent frees timer handlers once done, so freeing the timer within the event is going to cause double frees. Just attach the timer event to the request it depends on and make sure to steal it on NULL if we are going to free the request from within the handler.
2010-01-05Return an error for an unknown PAM requestSumit Bose4-12/+41
2009-12-21Allow debug_timestamps setting on a per-domain basisStephen Gallagher2-0/+3
This was missing from the SSSDConfig API, though it was supported by the daemon.
2009-12-18Fix broken password changes for local usersStephen Gallagher1-1/+6
2009-12-18Do not blindly accept zero-length passwordsStephen Gallagher2-8/+17
2009-12-18Fix ldap child memory hierarchy and other issuesSimo Sorce8-306/+482
The timeout handler was not a child of the request so it could fire even though the request was already freed. The code wouldn't use async writes to the children so it could incur in a short write with no way to detect or recover from it. Also fixed style of some helper functions to pass explicit paramters instead of a general structure. Add common code to do async writes to pipes. Fixed async write issue for the krb5_child as well. Fix also sdap_kinit_done(), a return statement was missing and we were mixing SDAP_AUTH and errno return codes in state->result Remove usless helper function that just replicates talloc_strndup()
2009-12-18Fix for #344Sumit Bose1-13/+11
Do not handle a missing ccache file as inactive by default, check if there are still active processes of the user.
2009-12-18Do not overwrite valid TGTs when offlineSumit Bose5-43/+185
2009-12-18Handle chauthtok with PAM_PRELIM_CHECK separatelySumit Bose6-21/+75
If pam_sm_chauthtok is called with the flag PAM_PRELIM_CHECK set we generate a separate call to the sssd to validate the old password before asking for a new password and sending the change password request.
2009-12-17disable password migration codeSumit Bose1-2/+2