summaryrefslogtreecommitdiff
path: root/src/providers/ipa/ipa_id.c
AgeCommit message (Collapse)AuthorFilesLines
2013-06-28IPA: Look up AD users directly if IPA server mode is onJakub Hrozek1-4/+19
https://fedorahosted.org/sssd/ticket/1962 If the ipa_server_mode is selected IPA subdomain user and group lookups are not done with the help of the extdom plugin but directly against AD using the AD ID code.
2013-06-07LDAP: Pass in a connection to ID functionsJakub Hrozek1-1/+1
Instead of using the default connection from the sdap_id_ctx, allow the caller to specify which connection shall be used for this particular request. Again, no functional change is present in this patch, just another parameter is added.
2013-06-07LDAP: sdap_id_ctx might contain several connectionsJakub Hrozek1-1/+1
With some LDAP server implementations, one server might provide different "views" of the identites on different ports. One example is the Active Directory Global catalog. The provider would contact different view depending on which operation it is performing and against which SSSD domain. At the same time, these views run on the same server, which means the same server options, enumeration, cleanup or Kerberos service should be used. So instead of using several different failover ports or several instances of sdap_id_ctx, this patch introduces a new "struct sdap_id_conn_ctx" that contains the connection cache to the particular view and an instance of "struct sdap_options" that contains the URI. No functional changes are present in this patch, currently all providers use a single connection. Multiple connections will be used later in the upcoming patches.
2013-01-21Add be_req_get_data() helper funciton.Simo Sorce1-2/+2
In preparation for making struct be_req opaque.
2013-01-21Add be_req_get_be_ctx() helper.Simo Sorce1-5/+8
In preparation for making be_req opaque
2013-01-21Remove sysdb as a be context structure memberSimo Sorce1-1/+1
The sysdb context is already available through the 'domain' structure.
2013-01-15Add domain arg to sysdb_search/delete_netgroup()Simo Sorce1-1/+1
2012-12-04Use an entry type mask macro to filter entry typesSimo Sorce1-2/+2
Avoids hardcoding magic numbers everywhere and self documents why a mask is being applied.
2012-12-04Streamline ipa_account_info handlerSimo Sorce1-74/+55
In particular note that we merge ipa_account_info_netgroups_done() and ipa_account_info_users_done() into a single fucntion called ipa_account_info_done() that handles both cases We also remove the auxiliary function ipa_account_info_complete() that unnecessarily violates the tevent_req style and instead use a new function named ipa_account_info_error_text() to generate error text.
2012-12-04Fix tevent_req style for get_netgroup in ipa_idSimo Sorce1-80/+71
Also do not intermix two tevent_req sequences
2012-12-04Fix ipa_subdomain_id names and tevent_req styleSimo Sorce1-3/+2
2012-11-12subdomains: check request type on one place onlyPavel Březina1-6/+0
The check is now held only in ipa_get_subdomain_account_info_send().
2012-05-31Add support for filtering atributesJan Zeleny1-1/+2
This patch adds support for filtering attributes when constructing attribute list from a map for LDAP query.
2012-05-10LDAP: Add attr_count return value to build_attrs_from_map()Stephen Gallagher1-1/+1
This is necessary because in several places in the code, we are appending to the attrs returned from this value, and if we relied on the map size macro, we would be appending after the NULL terminator if one or more attributes were defined as NULL.
2012-04-24Add ID operations in subdomainsJan Zeleny1-0/+30
2012-03-16IPA: Allow service lookupsStephen Gallagher1-0/+1
2012-02-04NSS: Add individual timeouts for entry typesStephen Gallagher1-2/+2
https://fedorahosted.org/sssd/ticket/1016
2011-12-19Pass sdap_id_ctx to online check from IPA providerJakub Hrozek1-0/+10
2011-11-25Fix sdap_id_ctx/ipa_id_ctx mismatch in IPA providerJakub Hrozek1-1/+1
This was causing a segfault during HBAC processing and any ID lookups except for netgroups
2011-11-23Added IPA account info handlerJan Zeleny1-0/+323
Currently it is only handling netgroups by itself, other requests are forwarded to LDAP provider.