summaryrefslogtreecommitdiff
path: root/src/external
AgeCommit message (Collapse)AuthorFilesLines
2013-09-09AUTOTOOLS: Add missing AC_MSG_RESULTLukas Slebodnik4-5/+10
AC_MSG_RESULT was not used everywhere after AC_MSG_CHECKING. Therefore two lines from configure output was mixed in some cases.
2013-09-09AUTOTOOLS: Add -LLIBDIR to PYTHON_LIBSLukas Slebodnik1-1/+2
Detect directory with python libraries and add this directory to the list of directories to be searched for linker.
2013-07-02BUILD: Use pkg-config to detect cmockaLukas Slebodnik1-19/+18
2013-05-02DNS sites support - add AD SRV pluginPavel Březina1-0/+5
https://fedorahosted.org/sssd/ticket/1032
2013-04-26DB: Switch to new libini_config APIOndrej Kos1-7/+17
https://fedorahosted.org/sssd/ticket/1786 Since we need to support the old interface as well, the configure scritp is modified and correct ini interface is chosen.
2013-04-22Allow usage of enterprise principalsSumit Bose1-0/+1
Enterprise principals are currently most useful for the AD provider and hence enabled here by default while for the other Kerberos based authentication providers they are disabled by default. If additional UPN suffixes are configured for the AD domain the user principal stored in the AD LDAP server might not contain the real Kerberos realm of the AD domain but one of the additional suffixes which might be completely randomly chooses, e.g. are not related to any existing DNS domain. This make it hard for a client to figure out the right KDC to send requests to. To get around this enterprise principals (see http://tools.ietf.org/html/rfc6806 for details) were introduced. Basically a default realm is added to the principal so that the Kerberos client libraries at least know where to send the request to. It is not in the responsibility of the KDC to either handle the request itself, return a client referral if he thinks a different KDC can handle the request or return and error. This feature is also use to allow authentication in AD environments with cross forest trusts. Fixes https://fedorahosted.org/sssd/ticket/1842
2013-03-27Provide libnl3 supportOndrej Kos1-25/+73
https://fedorahosted.org/sssd/ticket/812 Update the monitor code to be using the new libnl3 API. Changed configure option --with-libnl By default, it tries to build with libnl3, if not found, then with libnl1, if this isn't found either, build proceeds without libnl, just with warning. Specifing --with-libnl=<libnl3|libnl1|no> checks for the specific given version, if not found, configure ends with error.
2013-03-21Move signal.m4 from src/util to externalJakub Hrozek1-0/+1
2013-03-20Making the ldb check configurableLukas Slebodnik1-0/+15
It is possible to enable/disable checking in LDB memberof plugin whether it was built against the same version of LDB that is present on the system. This feature is turned off by default and enabled in Fedora/RHEL spec file. https://fedorahosted.org/sssd/ticket/1813
2013-03-08Detect the presence of libcmocka during configureJakub Hrozek1-0/+19
2013-03-08Add support for krb5 1.11's responder callback.Nathaniel McCallum1-0/+1
krb5 1.11 adds support for a new method for responding to structured data queries. This method, called the responder, provides an alternative to the prompter interface. This patch adds support for this method. It takes the password and provides it via a responder instead of the prompter. In the case of OTP authentication, it also disables the caching of credentials (since the credentials are one-time only).
2013-02-11krb5: include backwards compatible declaration of krb5_trace_infoJakub Hrozek1-1/+1
krb5-1.10 used to include "struct krb5_trace_info", now krb5-1.11 includes a "krb5_trace_info" typedefed from "struct _krb5_trace_info". Do the same in the SSSD to allow compiling with both 1.10 and 1.11.
2012-11-20BUILD: Temporary workaround for Kerberos buildStephen Gallagher1-2/+3
This patch extends the Kerberos version check to support Kerberos version 1.11 alpha and later. It is a temporary measure until we can redesign the configure checks for better granularity.
2012-11-12Only build extract_and_send_pac on platforms that support itJakub Hrozek1-0/+2
2012-10-26Add replacement for krb5_find_authdata()Sumit Bose1-0/+1
krb5_find_authdata() is only available in MIT Kerberos 1.10 or higher. To allow sssd to be compiled on platform with lower version of MIT Kerberos a replacement call is added. Please note that on those platform the replacement call will only return an error. If the krb5_find_authdata functionality is really needed on those platform it must be implemented by a different patch.
2012-10-12Only call krb5_set_trace_callback on platforms that support itJakub Hrozek1-0/+1
2012-09-24Detect LDAPDerefRes in configure scriptJakub Hrozek1-1/+9
https://fedorahosted.org/sssd/ticket/1317
2012-09-24autofs, sudo, ssh and PAC are not experimental anymoreJakub Hrozek1-9/+4
2012-09-04Check if the SELinux login directory existsJakub Hrozek1-0/+9
https://fedorahosted.org/sssd/ticket/1492
2012-07-09heimdal: fix compile error in krb5-child-testRambaldi1-0/+1
2012-06-21Try to build PAC responder only if all dependencies are availableSumit Bose1-5/+8
2012-06-21PAC responder: add basic infrastructureSumit Bose1-0/+34
This adds only the basic outline of the PAC responder, it won't support any operations, it will just start and initialize itself.
2012-06-15KRB5: Auto-detect DIR cache support in configureStephen Gallagher1-1/+3
We can't support the DIR cache features in systems with kerberos libraries older than 1.10. Make sure we don't build it on those systems.
2012-05-07Kerberos locator: Include the correct krb5.h header fileJakub Hrozek1-2/+13
https://fedorahosted.org/sssd/ticket/1325
2012-02-27Eliminate build-time requirement for nscdStephen Gallagher1-4/+4
We will now use the autodetected location if available, or else fall back to a value provided by --with-nscd in configure and finally resort to a hard-coded default of /usr/sbin/nscd.
2012-02-01Use profiling Docbook XSLT only if available, fall back to normalJakub Hrozek1-8/+5
2012-01-17IPA: Detect nsupdate support for the realm directiveStephen Gallagher1-1/+10
For older platforms, do not add the 'realm' line in the update message
2011-12-22Add compatibility layer for Heimdal Kerberos implementationStephen Gallagher1-1/+9
2011-12-05Allow using Glib for UTF8 supportStephen Gallagher1-0/+11
2011-11-18RESPONDER: Ensure that all input strings are valid UTF-8Stephen Gallagher1-0/+5
2011-11-02Add wrapper for krb5_get_init_creds_opt_set_canonicalizeJan Zeleny1-0/+1
2011-07-29libipa_hbac: Support case-insensitive comparisons with UTF8Stephen Gallagher1-0/+9
2011-07-13Fix python HBAC bindings for python <= 2.4Jakub Hrozek1-0/+20
Several parts of the HBAC python bindings did not work with old Python versions, such as the one shipped in RHEL5. The changes include: * a compatibility wrapper around python set object * PyModule_AddIntMacro compat macro * Py_ssize_t compat definition * Do not use PyUnicode_FromFormat * several function prototypes and structures used to have "char arguments where they have "const char *" in recent versions. This caused compilation warnings this patch mitigates by using the discard_const hack on python 2.4
2011-06-30Use ldap_init_fd() instead of ldap_initialize() if availableSumit Bose1-1/+1
2011-06-16Provide TTL structure names for c-ares < 1.7Jakub Hrozek1-0/+3
https://fedorahosted.org/sssd/ticket/898 In c-ares 1.7, the upstream renamed the addrttl/addr6ttl structures to ares_addrttl/ares_addr6ttl so they are in the ares_ namespace. Because they are committed to stable ABI, the contents are the same, just the name changed -- so it is safe to just #define the new name for older c-ares version in case the new one is not detected in configure time.
2011-05-23Set _GNU_SOURCE globallySumit Bose1-2/+1
2011-05-06Add support for openldap24 package on RHEL 5.7Sumit Bose1-0/+21
2011-05-05Added some kerberos functions for building on RHEL5Jan Zeleny1-1/+2
2011-04-27Require openssl-devel is libcrypto backend is selectedJakub Hrozek1-12/+8
2011-04-12Provide a configuration option to use systemd unit fileJakub Hrozek1-0/+8
https://fedorahosted.org/sssd/ticket/837
2011-01-17Remove support for pre-1.1 netlinkStephen Gallagher1-25/+24
Netlink 1.0 and older is buggy and unreliable, occasionally causing tight-loops. We're no longer going to try to support it. https://fedorahosted.org/sssd/ticket/755
2010-12-07Add support for FAST in krb5 providerSumit Bose1-1/+3
2010-10-13Raise the required version of libdhashSumit Bose1-1/+1
libdhash version 0.4.2 is required because older versions cannot update hash entries.
2010-09-23Use new MIT krb5 API for better password expiration warningsSumit Bose1-1/+2
2010-09-02Add gentoo distrubutionsMaxim1-1/+5
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com>
2010-08-23Fix configure check for ldbMaxim1-1/+1
2010-08-19Rewrite toplevel MakefileStephen Gallagher3-30/+24
There is no longer a need to have nested Makefiles and configure scripts. This patch combines the src/ Makefile and configure.ac into the root.
2010-08-03Require -ltalloc for tevent configure checkStephen Gallagher1-2/+8
2010-07-09Use netlink to detect going onlineJakub Hrozek1-0/+36
Integrates libnl to detect adding routes. When a route is added, the offline status of all back ends is reset. This patch adds no heuristics to detect whether back end went offline. Fixes: #456
2010-05-26Add support for delayed kinit if offlineSumit Bose1-0/+11
If the configuration option krb5_store_password_if_offline is set to true and the backend is offline the plain text user password is stored and used to request a TGT if the backend becomes online. If available the Linux kernel key retention service is used.