Compare commits

..

190 Commits
f27 ... rawhide

Author SHA1 Message Date
Miro Hrončok d3ba8fb11a BuildRequire python3-setuptools with Python 3.12+
distutils was removed from the Python standard library,
but setuptools can be used instead.

See https://peps.python.org/pep-0632/
2023-03-31 21:06:41 +02:00
Stephen Gallagher 52b92253b5
Rebuild against libunistring 1.1
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com>
2023-01-26 10:24:04 -05:00
Fedora Release Engineering d754fc4089 Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2023-01-21 04:01:21 +00:00
Alexey Tikhonov fc2376eb12 sssd-2.8.2-2: Rebuild against Samba 4.18rc1 2023-01-20 17:30:14 +01:00
Pavel Březina a168c6ad5f sssd-2.8.2-1: Rebase to latest upstream release 2022-12-09 14:12:55 +01:00
Pavel Březina cf2cbdba82 sssd-2.8.1-1: Rebase to latest upstream release 2022-11-04 12:27:37 +01:00
Pavel Březina d24bcc9e43 sssd-2.8.0-2: fix syslog spamming
Resolves: rhbz#2133437
2022-10-24 12:36:26 +02:00
Pavel Březina ac043fc3b6 sssd-2.8.0-1: Rebase to latest upstream release 2022-10-07 13:39:37 +02:00
Pavel Březina 75b451ce66 sssd-2.7.4-1: Rebase to latest upstream release 2022-08-26 23:04:24 +02:00
Pavel Březina de3d5df87d Fix bogus date in changelog 2022-08-26 23:04:24 +02:00
Adam Williamson d6d567aead Rebuild against new libndr 2022-08-09 09:44:43 -07:00
Fedora Release Engineering beee1ce0c2 Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2022-07-23 09:23:09 +00:00
Pavel Březina 6895b4538e sssd-2.7.3-1: Rebase to latest upstream release 2022-07-04 13:32:42 +02:00
Python Maint 2e485e40e8 Rebuilt for Python 3.11 2022-06-15 18:47:48 +02:00
Pavel Březina 450f45b104 Include pac_check patch 2022-06-09 10:50:32 +02:00
Pavel Březina ec123cd550 sssd-2.7.1-2: fix regression in IPA provider
Resolves: rhbz#2094685
2022-06-09 10:38:43 +02:00
Pavel Březina 562c0b9a10 sssd-2.7.1-1: Rebase to latest upstream release 2022-06-02 13:38:30 +02:00
Pavel Březina aa08692c22 sssd-2.7.0-1: Rebase to latest upstream release 2022-04-14 20:56:18 +02:00
Iker Pedrosa 5591d45546 Reenable make check
This reverts commit 1e24a3ac9d.
2022-04-12 10:32:26 +02:00
Pavel Březina 1e24a3ac9d Temporarily disable make check 2022-03-24 12:58:54 +01:00
Pavel Březina 94f6ba0323 Add changelog for 2.6.3 rebase 2022-01-25 12:39:05 +01:00
Pavel Březina a6c8ad89b6 sssd-2.6.3-1: Rebase to latest upstream release 2022-01-25 12:37:04 +01:00
Fedora Release Engineering 2136e097a2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2022-01-22 01:38:00 +00:00
Iker Pedrosa 637b653264 Fix IPA reply socket of selinux_child
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
2022-01-04 15:13:23 +01:00
Iker Pedrosa 2739fd3aa8 sssd-2.6.2-1: Rebase to latest upstream release
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
2021-12-23 16:53:38 +01:00
Pavel Březina 2bec749253 Revert "Temporarily disable make check"
This reverts commit 31f8189d14.

This is no longer needed:
https://bugzilla.redhat.com/show_bug.cgi?id=2021214
2021-12-02 16:32:26 +01:00
Pavel Březina 31f8189d14 Temporarily disable make check
Until https://bugzilla.redhat.com/show_bug.cgi?id=2021214 is resolved.
2021-11-09 16:38:26 +01:00
Pavel Březina a4a75d5f98 sssd-2.6.1-1: Rebase to latest upstream release 2021-11-09 16:37:26 +01:00
Pavel Březina 306f2f008c sssd-2.6.0-2: pull latest upstream code 2021-11-01 19:10:28 +01:00
Pavel Březina c0c482c21d sssd-2.6.0-1: Commit new sources 2021-10-14 13:11:19 +02:00
Pavel Březina 879ffa1b7c sssd-2.6.0-1: Rebase to latest upstream release 2021-10-14 12:24:52 +02:00
Iker Pedrosa 1f7c03c1eb Solve compilation problem with autoconf
Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
2021-09-21 10:10:03 +02:00
Sahana Prasad 7f02d6d429 Rebuilt with OpenSSL 3.0.0 2021-09-14 19:15:54 +02:00
Pavel Březina 866067e628 sssd-2.5.2-5: Fix CVE-2021-3621 2021-08-16 15:08:09 +02:00
Alexey Tikhonov a7bc87a356 Support subid ranges managed by FreeIPA 2021-08-09 12:48:10 +02:00
Sumit Bose bfbe7140ec sssd.spec: disable running files provider by default
Disable the default files provider as described in
https://fedoraproject.org/wiki/Changes/FlexibleLocalUserCache
2021-08-09 11:30:58 +02:00
Fedora Release Engineering aec1c33488 - Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2021-07-23 18:15:25 +00:00
Alexander Bokovoy a41021524e Rebuild against Samba 4.15.0 RC1
Samba's libndr did bump soname

Signed-off-by: Alexander Bokovoy <abokovoy@redhat.com>
2021-07-16 17:04:00 +03:00
Pavel Březina 279a6d02b9 sssd-2.5.2-1: Rebase to latest upstream release 2021-07-13 11:28:31 +02:00
Pavel Březina d6f7b5cf84 sssd-2.5.1-2: debug_backtrace improvements 2021-06-24 12:11:56 +02:00
Pavel Březina 948a68a9af sssd-2.5.1-1: Rebase to latest upstream release 2021-06-08 13:07:57 +02:00
Python Maint 099b94da59 Rebuilt for Python 3.10 2021-06-04 21:15:45 +02:00
Pavel Březina f224e547f4 sssd-2.5.0-2: Fix KCM regression on long upgrade path
Resolves: rhbz#1962006
2021-05-19 19:42:02 +02:00
Pavel Březina 0f12c3fbb3 sssd-2.5.0-1: Rebase to latest upstream release 2021-05-10 16:02:51 +02:00
Iker Pedrosa 4243ecae87 sssd-2.4.2-5: Change configure to avoid errors with new autoconf version
(rhbz#1943130)
2021-04-08 15:46:53 +02:00
Pavel Březina b1df55fa36 sssd-2.4.2-4: Add CAP_DAC_OVERRIDE to ifp service file if required by build configuration 2021-03-31 13:11:44 +02:00
Pavel Březina ea1b261cc2 spec: update spec file with recent upstream fixes
* 815197cb1d
* 9da41eb910

(cherry picked from commit 53a865af5d)
2021-03-31 11:52:40 +02:00
Marco Trevisan 29b29498d3 sssd.spec: BuildRequires on openssl binary
It's required by tests in order to generate the certificate files.
2021-03-27 22:52:22 +00:00
Zbigniew Jędrzejewski-Szmek f0ffcb4e3e Rebuilt for updated systemd-rpm-macros
See https://pagure.io/fesco/issue/2583.
2021-03-02 16:12:16 +01:00
Pavel Březina 0460a368c6 sssd-2.4.2-2: Remove setuid from child binaries and relax requirement on python3-sssdconfig 2021-02-19 18:24:03 +01:00
Pavel Březina ac57def994 sssd-2.4.2-1: Rebase to latest upstream release 2021-02-19 17:11:06 +01:00
Pavel Březina 9e5dd4b665 sssd-2.4.1-1: Rebase to latest upstream release 2021-02-05 19:00:09 +01:00
Fedora Release Engineering 331dfd3e60 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2021-01-27 21:01:16 +00:00
Pavel Březina 968f95e90a sssd-2.4.0-6 - improve kcm performance 2020-12-11 11:30:39 +01:00
Pavel Březina d86ed3a2a2 sssd-2.4.0.5 - improve kcm performance 2020-12-07 17:31:23 +01:00
Stephen Gallagher e67274864c
Rebuild for Fedora ELN
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com>
2020-11-30 08:09:43 -05:00
Petr Lautrbach 709264858f Rebuild with libsemanage.so.2 2020-11-03 16:56:27 +01:00
Pavel Březina 65e3d07e64 sssd-2.4.0-2: remove old patches 2020-10-12 14:14:07 +02:00
Pavel Březina bc988250a3 sssd-2.4.0-1: Rebase to latest upstream release 2020-10-12 13:43:32 +02:00
Pavel Březina 1e74bee608 sssd-2.3.1-4: include 2.3.1 source 2020-07-28 11:52:54 +02:00
Pavel Březina 51e0d0ae04 sssd-2.3.1-3: fix test compilation with check-0.15 2020-07-28 10:27:21 +02:00
Pavel Březina 442c3962bb sssd-2.3.1-2: switch to rundir 2020-07-28 10:26:30 +02:00
Pavel Březina cf3c8f20ee sssd-2.3.1-1: Rebase to latest upstream release 2020-07-24 16:47:30 +02:00
Merlin Mathesius 1424e14b42 Minor ELN conditional fix
Signed-off-by: Merlin Mathesius <mmathesi@redhat.com>
2020-07-24 16:36:14 +02:00
Tom Stellard 97eae27da7 Use make macros
https://fedoraproject.org/wiki/Changes/UseMakeBuildInstallMacro
2020-07-14 14:20:46 +00:00
Jeff Law ca22aded04 Disable LTO 2020-07-01 12:15:35 -06:00
Peter Jones 2e48ae2d63 Fix github url typo
Signed-off-by: Peter Jones <pjones@redhat.com>
2020-06-19 18:50:55 -04:00
Miro Hrončok 83988894b0 Rebuilt for Python 3.9 2020-05-26 03:51:04 +02:00
Pavel Březina 104d122fd9 sssd-2.3.0-1: Rebase to latest upstream release 2020-05-20 13:24:02 +02:00
Michal Židek 261327da76 Fix nss symbol collision Fedora Rawhide 2020-02-28 11:17:41 +01:00
Michal Židek dfcf325701 Resolves: upstream#4159 - p11_child should have an option to skip C_WaitForSlotEvent if the PKCS#11 module does not implement it properly 2020-02-27 04:34:24 +01:00
Michal Židek 3e2905a176 Resolves: upstream#4135 - util/sss_ptr_hash.c: potential double free in `sss_ptr_hash_delete_cb()` 2020-02-27 04:34:24 +01:00
Michal Židek 44805f5ff8 Resolves: upstream#4118 sssd requires timed sudoers ldap entries to be specified up to the seconds 2020-02-27 04:34:24 +01:00
Michal Židek 8b47371b41 Add sssd-dbus package as a dependency of sssd-tools 2020-02-27 04:34:24 +01:00
Michal Židek 573cac525f Resolves: upstream#4142 - sssd_be frequent crash 2020-02-27 04:34:24 +01:00
Michal Židek 8073b6af50 Resolves: upstream#4131 Force LDAPS over 636 with AD Provider 2020-02-27 04:34:24 +01:00
Michal Židek 9aa10702d4 Resolves: upstream#3630 - Randomize ldap_connection_expire_timeout either by default or w/ a configure option 2020-02-27 04:34:24 +01:00
Michal Židek d61d68d902 Resolves: upstream#4135 - util/sss_ptr_hash.c: potential double free in `sss_ptr_hash_delete_cb()` 2020-02-27 04:34:24 +01:00
Michal Židek 9781b52c91 Resolves: upstream#4088 - server/be: SIGTERM handling is incorrect 2020-02-27 04:34:24 +01:00
Michal Židek 6c1563e282 Resolves: upstream##4089 Watchdog implementation or usage is incorrect 2020-02-27 04:34:24 +01:00
Michal Židek b81369e441 Resolves: upstream#4126 pcscd rejecting sssd ldap_child as unauthorized 2020-02-27 04:34:24 +01:00
Michal Židek 069e6c9dc8 Resolves: upstream#4127 - [Doc]Provide explanation on escape character for match rules sss-certmap 2020-02-27 04:34:24 +01:00
Michal Židek ec08164de5 Resolves: upstream#4129 - sssctl config-check command does not give proper error messages with line numbers 2020-02-27 04:34:24 +01:00
Michal Židek 54f0db91d3 Update to latest released upstream version 2.2.3 2020-02-27 04:34:24 +01:00
Fedora Release Engineering 8078a58a14 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2020-01-31 00:16:21 +00:00
Stephen Gallagher 2f22753551
Fix build against samba-4.12.0rc1
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com>
2020-01-24 16:18:38 +01:00
Mohan Boddu b3516604c1 Rebuild for samba-4.12.0rc1
Signed-off-by: Mohan Boddu <mboddu@bhujji.com>
2020-01-24 07:17:14 -05:00
Adam Williamson 4e675b1715 Backport PR #900 to fix RHBZ #1755643 2019-10-22 11:27:01 -07:00
Adam Williamson 460a59ec3d Backport PR #904 to fix RHBZ #1757224 2019-10-22 10:04:39 -07:00
Michal Židek 0aaf839d04 Update to latest released upstream version 2.2.2 2019-09-17 11:23:59 +02:00
Stephen Gallagher e35ea7dfd4
Rebuilding for libldb 2.0.5
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com>
2019-08-26 17:57:25 -04:00
Miro Hrončok 3e66e97711 Rebuilt for Python 3.8 2019-08-19 11:06:22 +02:00
Fedora Release Engineering 21a512736f - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2019-07-27 00:08:51 +00:00
Jakub Hrozek 7f0d43352a Resolves: rhbz#1721636 - sssd-kcm calls sssd-genconf which triggers nscd warning 2019-07-05 16:45:50 +02:00
Jakub Hrozek d757370f98 Resolves: rhbz#1724717 - sssd-proxy crashes resolving groups with no members 2019-07-05 16:43:40 +02:00
Michal Židek e1908a5bc4 Fix Python build failures on rawhide.
Thx. to Lukas Slebodnik for fixing this issue.
2019-06-19 10:53:12 +02:00
Michal Židek 76a13b3c78 Update to latest released upstream version 2.2.0 2019-06-17 14:51:15 +02:00
Michal Židek 1d0af0b97b Resolves: upstream#3867 - [RFE] Need an option in SSSD so that it will skip GPOs that have groupPolicyContainers unreadable by SSSD.
- CVE-2018-16838
2019-03-28 00:06:39 +01:00
Michal Židek 27d612fd39 Update to latest released upstream version 2.1.0 2019-03-27 18:22:06 +01:00
Sinny Kumari 80cc892c48 Resolves: rhbz#1667444 - sssd: make python3-sssdconfig as suggest
Signed-off-by: Sinny Kumari <sinny@redhat.com>
2019-02-14 17:29:11 +05:30
Adam Williamson 786d467c78 Backport fix for RHBZ #1676946 (see upstream #3924)
This backports three commits that are identified in upstream
issue #3924 as the fixes for RHBZ #1676946 (failure of sssd to
start in current Rawhide).
2019-02-13 17:55:26 -08:00
Fedora Release Engineering 5c6f906a0e - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2019-02-03 08:34:02 +00:00
Igor Gnatenko fa80197b65 Remove obsolete Group tag
References: https://fedoraproject.org/wiki/Changes/Remove_Group_Tag
2019-01-28 20:24:50 +01:00
Igor Gnatenko a5b776ca3c
Remove obsolete ldconfig scriptlets
References: https://fedoraproject.org/wiki/Changes/RemoveObsoleteScriptlets
Signed-off-by: Igor Gnatenko <ignatenkobrain@fedoraproject.org>
2019-01-22 18:41:04 +01:00
Adam Williamson cbdd57fe9d Backport other patches from master to fix build with recent krb5 2018-12-13 00:02:15 -08:00
Adam Williamson 64cb87e84a Resolves: rhbz#1654537 - sbus: use 120 second default timeout 2018-12-12 22:41:39 -08:00
Michal Židek 9732e7fd7b Resolves: rhbz#1629737 - sssd: Remove python2 (sub)packages from Fedora 30+ 2018-11-07 15:18:49 +01:00
Michal Židek c0971b7e39 Backport a bunch of upstream fixes
- Resolves: upstream#3821 - crash related to sbus_router_destructor()
- Resolves: upstream#3810 - sbus2: fix memory leak in sbus_message_bound_ref
- Resolves: upstream#3819 - sssd only sets the SELinux login context if it
                            differs from the default
- Resolves: upstream#3807 - The sbus codegen script relies on "python" which
                            might not be available on all distributions
- Resolves: upstream#3820 - sudo: search with lower cased name for case
                            insensitive domains
- Resolves: upstream#3701 - [RFE] Allow changing default behavior of SSSD from
                            an allow-any default to a deny-any default when it
                            can't find any GPOs to apply to a user login.
- Resolves: upstream#3828 - Invalid domain provider causes SSSD to abort
                            startup
- Resolves: upstream#3500 - Make sure sssd is a replacement for pam_pkcs11
                            also for local account authentication
- Resolves: upstream#3812 - sssd 2.0.0 segfaults on startup
- Resolves: upstream#3826 - Remove references of sss_user/group/add/del
                            commands in man pages since local provider is
                            deprecated
- Resolves: upstream#3827 - SSSD should log to syslog if a domain is not
                            started due to a misconfiguration
- Resolves: upstream#3830 - Printing incorrect information about domain with
                            sssctl utility
- Resolves: upstream#3489 - p11_child should work wit openssl1.0+
- Resolves: upstream#3750 - [RFE] man 5 sssd-files should mention necessary
                            changes in nsswitch.conf
- Resovles: upstream#3650 - RFE: Require smartcard authentication
- Resolves: upstream#3334 - sssctl config-check does not check any special
                            characters in domain name of domain section
- Resolves: upstream#3849 - Files: The files provider always enumerates
                            which causes duplicate when running getent passwd
- Related: upstream#3855 - session not recording for local user when groups
                           defined
- Resolves: upstream#3802 - Reuse sysdb_error_to_errno() outside sysdb
- Related: upstream#3493 - Remove the pysss.local interface
2018-10-24 14:40:58 +02:00
Michal Židek 129efc7839 Resolves: rhbz#1622760 - Console login as FreeIPA domain user fails in current Fedora Rawhide / 29 2018-08-29 16:58:06 +02:00
Michal Židek 4e478641d1 Fix linking issues 2018-08-29 16:58:06 +02:00
Michal Židek 2ef66b266c New upstream release 2.0.0 2018-08-14 11:43:55 +02:00
Fedora Release Engineering 0a06c01711 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2018-07-14 06:42:21 +00:00
Jason Tibbitts 8a13e36b6a Remove needless use of %defattr 2018-07-10 01:27:54 -05:00
Miro Hrončok 633afe1b94 Rebuilt for Python 3.7 2018-07-02 18:24:19 +02:00
Fabiano Fidêncio 68ef824a5f Resolves: upstream#3766 - CVE-2018-10852: information leak from the sssd-sudo responder
And also ...

- Related: upstream#941 - return multiple server addresses to the Kerberos
                          locator plugin
- Related: upstream#3652 - kdcinfo doesn't get populated for other domains
- Resolves: upstream#3747 - sss_ssh_authorizedkeys exits abruptly if SSHD
                            closes its end of the pipe before reading all the
                            SSH keys
- Resolves: upstream#3607 - Handle conflicting e-mail addresses more gracefully
- Resolves: upstream#3754 - SSSD AD uses LDAP filter to detect POSIX attributes
                            stored in AD GC also for regular AD DC queries
- Related: upstream#3219 - [RFE] Regular expression used in sssd.conf not being
                           able to consume an @-sign in the user/group name.

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-06-25 09:38:16 +02:00
Fabiano Fidêncio 192e845618 Resolves: rhbz#1591804 - something keeps /lib/libnss_systemd.so.2 open on minimal appliance image, breaking composes
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-06-21 21:38:33 +02:00
Miro Hrončok d8abd616d9 Rebuilt for Python 3.7 2018-06-19 11:27:58 +02:00
Fabiano Fidêncio a36f5fea4b New upstream release 1.16.2
- https://docs.pagure.org/SSSD.sssd/users/relnotes/notes_1_16_2.html

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-06-11 13:32:07 +02:00
Fabiano Fidêncio 29d69716ad Related: upstream#3742 - Change of: User may not run sudo --> a password is required
Patch 0017-sudo-ldap-do-not-store-rules-without-sudoHost-attrib.patch
has been commented out as it caused some regressions on IPA tests.

In order to unblock IPA folks, let's revert this patch from Fedora till
we have a proper fix.

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-28 10:01:23 +02:00
Fabiano Fidêncio 4979898a6e Revert "Add: "ExcludeArch: armv7hl""
This reverts commit bc3790f5a0.
2018-05-17 17:53:56 +02:00
Fabiano Fidêncio bc3790f5a0 Add: "ExcludeArch: armv7hl"
For some reason still unclear we're *not* able to build SSSD on koji's
buildroot for armv7hl. Some tests have been done and SSSD was built
successfully using real armv7hl hardware, which indicates that we're
facing https://bugzilla.redhat.com/show_bug.cgi?id=1576593

As soon as the bug is resolved, this patch could be safely reverted.

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-16 21:54:59 +02:00
Fabiano Fidêncio 0a2c83fbd0 Related: upstream#3436 - Certificates used in unit tests have limited lifetime
Fix a non harmful warning shown by recent versions of OpenSSL.

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-16 21:53:46 +02:00
Fabiano Fidêncio c4f0508af1 Related: upstream#3436 - Add openssl, openssh and nss-tools as BuildRequires
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 11:36:56 +02:00
Fabiano Fidêncio 5f75f7e4f2 Resolves: upstream#3595 - ID override GID from Default Trust View is not properly resolved in case domain resolution order is set
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 09:59:20 +02:00
Fabiano Fidêncio 1511bcd8b2 Resolves: upstream#3731 - nss_clear_netgroup_hash_table(): only remove entries from the hash table, do not free them
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 09:58:02 +02:00
Fabiano Fidêncio 3ad9e211eb Resolves: upstream#3728 - Request by ID outside the min_id/max_id limit of a first domain does not reach the second domain
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 09:57:11 +02:00
Fabiano Fidêncio ed238e28ff Resolves: upstream#3719 - The SSSD IPA provider allocates information about external groups on a long lived memory context, causing memory growth of the sssd_be process
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 09:56:23 +02:00
Fabiano Fidêncio 97a62b83f1 Related: upstream#2653 - Group renaming issue when "id_provider = ldap" is set.
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 09:55:43 +02:00
Fabiano Fidêncio 163543f40b Resolves: upstream#3726 - SSSD with ID provider 'ad' should give a warning in case the ldap schema is manually changed to something different than 'ad'.
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 09:55:01 +02:00
Fabiano Fidêncio 510134aa02 Resolves: upstream#3725 - sssd not honoring dyndns_server if the DNS update process is terminated with a signal
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 09:54:10 +02:00
Fabiano Fidêncio 5e1db8fc3e Related: upstream#3436 - Certificates used in unit tests have limited lifetime
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-14 09:53:04 +02:00
Fabiano Fidêncio 5254cdcca5 Resolves: rhbz#1574778 - sssd fails to download known_hosts from freeipa
Patch 0018-sysdb-custom-completely-replace-old-object-instead-o.patch
caused a regression, caught by lslebodn and reported by a few users.

Let's comment out this patch for now and uncomment it when we have a fix
that do not cause a regression.

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-05-05 21:42:38 +02:00
Fabiano Fidêncio 767645dca2 Add gcc to build dependencies
gcc will be revomed from buildroot in fedora 29
http://fedoraproject.org/wiki/Changes/Remove_GCC_from_BuildRoot

Upstream patch from Lukáš Slebodnik <lslebodn@redhat.com>

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:12 +02:00
Fabiano Fidêncio 90dd145c92 Resolves: upstream#3520 - Files provider supports only BE_FILTER_ENUM
Also ...
Resolves: rhbz#1540703 - FreeIPA/SSSD implicit_file sssd_nss error: The Data
                         Provider returned an error
                         [org.freedesktop.sssd.Error.DataProvider.Fatal]

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:12 +02:00
Fabiano Fidêncio a305fc11b7 Resolves: upstream#3680 - GPO: SSSD fails to process GPOs If a rule is defined, but contains no SIDs
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:12 +02:00
Fabiano Fidêncio b6696d97c4 Document which principal does the AD provider use
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:12 +02:00
Fabiano Fidêncio 2dd8451396 Resolves: upstream#2653 - Group renaming issue when "id_provider = ldap" is set.
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:12 +02:00
Fabiano Fidêncio 209701ef7f Resolves: upstream#3715 - ipa 389-ds-base crash in krb5-libs - k5_copy_etypes list out of bound?
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio 3115154117 Improve docs/debug message about GC detection
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio f47c82bc8d Resolves: upstream#3469 - extend sss-certmap man page regarding priority processing
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio 64b69ec813 Resolves: upstream#3634 - sssctl COMMAND --help fails if sssd is not configured
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio 8d67726a47 Resolves: upstream#3679 - Make nss netgroup requests more robust
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio 8565df471c Resolves: upstream#3646 - SSSD's GPO code ignores ad_site option
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio 9709b73a3f Resolves: upstream#3402 - Support alternative sources for the files provider
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio a7d4f0b3f4 Resolves: upstream#3550 - refresh_expired_interval does not work with netgrous in 1.15
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio ab53ba849a IPA: Qualify the externalUser sudo attribute
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio ef1d48a0c2 Tone down shutdown messages for socket activated responders
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio fcff118bbf Resolves: upstream#3558 - sudo: report error when two rules share cn
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:11 +02:00
Fabiano Fidêncio f3d06df50d Resolves: upstream#3684 - A group is not updated if its member is removed with the cleanup task, but the group does not change
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-04-27 22:12:10 +02:00
Fabiano Fidêncio 32f2c81e59 A few KCM misc fixes
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-03-30 14:47:05 +02:00
Fabiano Fidêncio 99da72db23 Resolves: upstream#3666 - Fix usage of str.decode() in our test
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-03-30 14:45:42 +02:00
Fabiano Fidêncio 1c7376afc5 Resolves: upstream#3386 - KCM: Payload buffer is too small
Related to: rhbz#1494843 - KCM Does not work

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-03-30 14:43:19 +02:00
Fabiano Fidêncio 73735e9522 Resolves: usptream#3687 - KCM: Don't pass a non null terminated string to json_loads()
Related to: rhbz#1494843 - KCM Does not work

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-03-30 14:38:32 +02:00
Fabiano Fidêncio 563dd33f72 Resolves: upstream#3658 - Application domain is not interpreted correctly
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-03-30 14:35:59 +02:00
Fabiano Fidêncio 2c812f3cba Resolves: upstream#3660 - confdb_expand_app_domains() always fails
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-03-30 14:33:25 +02:00
Fabiano Fidêncio 40fe76feb8 Resolves: upstream#3573 - sssd won't show netgroups with blank domai
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-03-30 14:30:01 +02:00
Fabiano Fidêncio 62a3258629 New upstream release 1.16.1
https://docs.pagure.org/SSSD.sssd/users/relnotes/notes_1_16_1.html

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-03-09 15:42:19 +01:00
Lukas Slebodnik 5eba7a8f1f Resolves: upstream#3621 - backport bug found by static analyzers 2018-02-20 15:12:59 +01:00
Fabiano Fidêncio 4b1fe8a0ab Resolves: upstream#3621: FleetCommander integration must not require capability DAC_OVERRIDE
Together with the patches backported from upstream, we're changing
the deskprofilepath permissions from 755 to 751, reflecting the
upstream spec file changes.

Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-02-14 23:03:25 +01:00
Fabiano Fidêncio 199a72e62a Resolves: rhbz#1538643 - SSSD crashes when retrieving a Desktop Profile with no specific host/hostgroup set
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
2018-02-14 22:15:04 +01:00
Igor Gnatenko 11c6ee78b8 Remove BuildRoot definition
None of currently supported distributions need that.
It was needed last for EL5 which is EOL now

Signed-off-by: Igor Gnatenko <ignatenkobrain@fedoraproject.org>
2018-02-14 00:40:17 +01:00
Lukas Slebodnik 18ae44bc79 Resolves: upstream#3618 - selinux_child segfaults in a docker container 2018-02-07 22:04:27 +01:00
Lukas Slebodnik f55e235d75 Resolves: rhbz#1431153 - sssd: libsss_proxy.so needs to be linked with -ldl 2018-02-06 13:11:55 +01:00
Lukas Slebodnik e242e8ef93 Fix systemd executions/requirements
systemd was added to BuildRequires because it provides rpm macros
/usr/lib/rpm/macros.d/macros.systemd and it is unreliable to rely
on indirect dependency between systemd-devel and systemd

Related to: https://src.fedoraproject.org/rpms/sssd/pull-request/1
2018-02-06 13:04:26 +01:00
Lukas Slebodnik 6d370601d4 Revert "Workaround for BZ1537183"
This reverts commit 0a5a392684.

nsupdate is fixed on rawhide.i686
2018-02-06 12:57:05 +01:00
Igor Gnatenko a3b937064c Fix systemd executions/requirements
Merges: https://src.fedoraproject.org/rpms/sssd/pull-request/1

Signed-off-by: Igor Gnatenko <ignatenkobrain@fedoraproject.org>
2018-01-25 20:42:01 +01:00
Lukas Slebodnik ebdebbe467 Do not try to link with -Wl,-z,defs
https://bugzilla.redhat.com/show_bug.cgi?id=1535422
https://fedoraproject.org/wiki/Changes/BINUTILS2291
https://src.fedoraproject.org/rpms/redhat-rpm-config/blob/master/f/buildflags.md#strict-symbol-checks-in-the-link-editor-ld

sssd cannot be linked with -Wl,-z,defs atm.
2018-01-25 20:23:09 +01:00
Lukas Slebodnik 27d7dcb5bb Revert "Override linker flags done in redhat-rpm-config-84-1.fc28"
This reverts commit 7cda4fbc6f.
2018-01-25 20:18:39 +01:00
Lukas Slebodnik b4343b24b6 Fix building on rawhide. Remove -Wl,-z,defs from LDFLAGS 2018-01-25 11:39:00 +01:00
Lukas Slebodnik 0a5a392684 Workaround for BZ1537183
unit test will pass but sssd will not be able to use nsupdate with realm
on i686
2018-01-23 15:11:46 +01:00
Lukas Slebodnik 7cda4fbc6f Override linker flags done in redhat-rpm-config-84-1.fc28
https://bugzilla.redhat.com/show_bug.cgi?id=1535422
https://fedoraproject.org/wiki/Changes/BINUTILS2291

sssd cannot be linked with -Wl,-z,defs atm.
2018-01-23 14:37:32 +01:00
Lukas Slebodnik b390855a98 Fix building of sssd-nfs-idmap with libnfsidmap.so.1 2018-01-11 16:53:36 +01:00
Björn Esser f9e6094ac5
Rebuilt for libnfsidmap.so.1 2018-01-11 12:01:37 +01:00
Lukas Slebodnik 1dedfbb334 Resolves: upstream#3523 - ABRT crash - /usr/libexec/sssd/sssd_nss in setnetgrent_result_timeout
Resolves: upstream#3588 - sssd_nss consumes more memory until restarted
                          or machine swaps
Resolves: failure in glibc tests
          https://sourceware.org/bugzilla/show_bug.cgi?id=22530
Resolves: upstream#3451 - When sssd is configured with id_provider proxy and
                          auth_provider ldap, login fails if the LDAP server
                          is not allowing anonymous binds
Resolves: upstream#3285 - SSSD needs restart after incorrect clock is
                          corrected with AD
Resolves: upstream#3586 - Give a more detailed debug and system-log message
                          if krb5_init_context() failed
Resolves: rhbz#1431153 - SSSD ships a drop-in configuration snippet
                         in /etc/systemd/system
Backport few upstream features from 1.16.1
2017-12-04 21:42:37 +01:00
Lukas Slebodnik ce65f7d9ee Resolves: rhbz#1494002 - sssd_nss crashed in cache_req_search_domains_next 2017-11-21 17:57:44 +01:00
Lukas Slebodnik 87763840cd Revert "Disable nfsplugin due to bug rhbz#1509063"
This reverts commit b5c435b10b.

nfs-utils are fixed
2017-11-21 17:56:54 +01:00
Jakub Hrozek 7781c9e992 Backport extended NSS API from upstream master branch 2017-11-17 18:06:26 +01:00
Lukas Slebodnik b5c435b10b Disable nfsplugin due to bug rhbz#1509063 2017-11-03 22:58:37 +01:00
Lukas Slebodnik 7ac8b3c4b5 Resolves: upstream#3529 - sssd-kcm Fix restart during/after upgrade 2017-11-03 16:20:10 +01:00
Lukas Slebodnik 7667bd7429 Fix unit tests with libldb-1.3.0 2017-10-21 16:19:39 +02:00
Lukas Slebodnik f2e72c8931 There are not empty lang files in 1.16.0 2017-10-20 23:18:12 +02:00
Lukas Slebodnik 4f58854911 New upstream release 1.16.0
https://docs.pagure.org/SSSD.sssd/users/relnotes/notes_1_16_0.html
2017-10-20 18:02:02 +02:00
Lukas Slebodnik 1aff49b48c Fix build with krb5 1.16 2017-10-11 18:06:00 +02:00
Lukas Slebodnik 7069858231 Resolves: rhbz#1499354 - CVE-2017-12173
sssd: unsanitized input when searching in local cache database access on
the sock_file system_bus_socket
2017-10-11 17:48:41 +02:00
Lukas Slebodnik 8eda442b2e Fix few bugs/regressions
Resolves: rhbz#1488327 - SELinux is preventing selinux_child from write access
                         on the sock_file system_bus_socket
Resolves: rhbz#1490402 - SSSD does not create /var/lib/sss/deskprofile and
                         fails to download desktop profile data
Resolves: upstream#3485 - getsidbyid does not work with 1.15.3
Resolves: upstream#3488 - SUDO doesn't work for IPA users on IPA clients after
                          applying ID Views for them in IPA server
Resolves: upstream#3501 - Accessing IdM kerberos ticket fails while id mapping
                          is applied
2017-09-12 09:22:07 +02:00
Lukas Slebodnik fa4807ec45 Backport few upstream patches/fixes 2017-09-01 21:34:35 +02:00
Lukas Slebodnik 11cd64de1c Add krb5 conf snippet for default KCM
http://fedoraproject.org/wiki/Releases/27/ChangeSet#Kerberos_KCM_credential_cache_by_default
https://bugzilla.redhat.com/show_bug.cgi?id=1421604
2017-09-01 21:34:20 +02:00
Lukas Slebodnik 5ce8ae1166 Simplify spec file a little bit
The plugin for cifs-utils can be built on all supported versions of fedora.
Conditions are required only in upstream spec file for older
distributions. Definition of constant with_cifs_utils_plugin is still
in the beginning of spec file for simpler comparison of changes
between upstream and fedora.
2017-09-01 10:47:18 +02:00
Lukas Slebodnik 088151887a Remove unused if condition krb5 localauth plugin
The plugin can be built on all supported versions of fedora.
And it was removed also from upstream spec file.
2017-09-01 10:39:14 +02:00
Ville Skyttä 308a55f49d Own the %{_libdir}/%{name}/conf dir
https://bugzilla.redhat.com/show_bug.cgi?id=1483517
2017-08-21 12:42:13 +02:00
13 changed files with 676 additions and 1406 deletions

26
.gitignore vendored
View File

@ -80,4 +80,28 @@ sssd-1.2.91.tar.gz
/sssd-1.16.0.tar.gz
/sssd-1.16.1.tar.gz
/sssd-1.16.2.tar.gz
/sssd-1.16.3.tar.gz
/sssd-2.0.0.tar.gz
/sssd-2.1.0.tar.gz
/sssd-2.2.0.tar.gz
/sssd-2.2.1.tar.gz
/sssd-2.2.2.tar.gz
/sssd-2.2.3.tar.gz
/sssd-2.3.0.tar.gz
/sssd-2.3.1.tar.gz
/sssd-2.4.0.tar.gz
/sssd-2.4.1.tar.gz
/sssd-2.4.2.tar.gz
/sssd-2.5.0.tar.gz
/sssd-2.5.1.tar.gz
/sssd-2.5.2.tar.gz
/sssd-2.6.0.tar.gz
/sssd-2.6.1.tar.gz
/sssd-2.6.2.tar.gz
/sssd-2.6.3.tar.gz
/sssd-2.7.0.tar.gz
/sssd-2.7.1.tar.gz
/sssd-2.7.3.tar.gz
/sssd-2.7.4.tar.gz
/sssd-2.8.0.tar.gz
/sssd-2.8.1.tar.gz
/sssd-2.8.2.tar.gz

View File

@ -1,37 +0,0 @@
From 62839f9187dde5b46e198f0cb61204a0613d826d Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fabiano=20Fid=C3=AAncio?= <fidencio@redhat.com>
Date: Sun, 12 Aug 2018 23:56:21 +0200
Subject: [PATCH 1/7] man/sss_ssh_knownhostsproxy: fix typo pubkeys -> pubkey
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
In commit 36f2fe8f63 a discrepancy between the command line option and
the manpage has been introduced.
Related:
https://pagure.io/SSSD/sssd/issue/3542
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
(cherry picked from commit 2b3b41dad27fcb03478c211ec82d9c2fd9dadcb4)
---
src/man/sss_ssh_knownhostsproxy.1.xml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/man/sss_ssh_knownhostsproxy.1.xml b/src/man/sss_ssh_knownhostsproxy.1.xml
index f84732c..58aeb04 100644
--- a/src/man/sss_ssh_knownhostsproxy.1.xml
+++ b/src/man/sss_ssh_knownhostsproxy.1.xml
@@ -86,7 +86,7 @@ GlobalKnownHostsFile /var/lib/sss/pubconf/known_hosts
</varlistentry>
<varlistentry>
<term>
- <option>-k</option>,<option>--pubkeys</option>
+ <option>-k</option>,<option>--pubkey</option>
</term>
<listitem>
<para>
--
2.9.5

View File

@ -1,29 +0,0 @@
From de33a5c07eb8c9f821e684a49c4ee993c25776b9 Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lslebodn@redhat.com>
Date: Thu, 19 Jul 2018 09:38:22 +0200
Subject: [PATCH 2/7] krb5_locator: Make debug function internal
Merges: https://pagure.io/SSSD/sssd/pull-request/3786
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
(cherry picked from commit 86de91f93f51d41d71c504b871c65fea31dd5485)
---
src/krb5_plugin/sssd_krb5_locator_plugin.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/krb5_plugin/sssd_krb5_locator_plugin.c b/src/krb5_plugin/sssd_krb5_locator_plugin.c
index 952d487..7800ab0 100644
--- a/src/krb5_plugin/sssd_krb5_locator_plugin.c
+++ b/src/krb5_plugin/sssd_krb5_locator_plugin.c
@@ -82,7 +82,7 @@ struct sssd_ctx {
bool disabled;
};
-void plugin_debug_fn(const char *format, ...)
+static void plugin_debug_fn(const char *format, ...)
{
va_list ap;
char *s = NULL;
--
2.9.5

View File

@ -1,275 +0,0 @@
From 0f44cbdfcbf35278c984a12b22a1c01f38a2c5ab Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lslebodn@redhat.com>
Date: Thu, 19 Jul 2018 09:44:33 +0200
Subject: [PATCH 3/7] krb5_locator: Simplify usage of macro PLUGIN_DEBUG
It should look like real function call
Merges: https://pagure.io/SSSD/sssd/pull-request/3786
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
(cherry picked from commit 276f2e345548947b66f7bd3b984628eaf6f4cbd4)
---
src/krb5_plugin/sssd_krb5_locator_plugin.c | 88 +++++++++++++++---------------
1 file changed, 44 insertions(+), 44 deletions(-)
diff --git a/src/krb5_plugin/sssd_krb5_locator_plugin.c b/src/krb5_plugin/sssd_krb5_locator_plugin.c
index 7800ab0..61fee6b 100644
--- a/src/krb5_plugin/sssd_krb5_locator_plugin.c
+++ b/src/krb5_plugin/sssd_krb5_locator_plugin.c
@@ -63,9 +63,9 @@
#define SSSD_KRB5_LOCATOR_DEBUG "SSSD_KRB5_LOCATOR_DEBUG"
#define SSSD_KRB5_LOCATOR_DISABLE "SSSD_KRB5_LOCATOR_DISABLE"
#define DEBUG_KEY "[sssd_krb5_locator] "
-#define PLUGIN_DEBUG(body) do { \
+#define PLUGIN_DEBUG(format, ...) do { \
if (ctx->debug) { \
- plugin_debug_fn body; \
+ plugin_debug_fn(format, ##__VA_ARGS__); \
} \
} while(0)
@@ -236,26 +236,26 @@ static int buf_to_addr_port_list(struct sssd_ctx *ctx,
port = strtol(port_str, &endptr, 10);
if (errno != 0) {
ret = errno;
- PLUGIN_DEBUG(("strtol failed on [%s]: [%d][%s], "
- "assuming default.\n", port_str, ret,
- strerror(ret)));
+ PLUGIN_DEBUG("strtol failed on [%s]: [%d][%s], "
+ "assuming default.\n",
+ port_str, ret, strerror(ret));
port = 0;
}
if (*endptr != '\0') {
- PLUGIN_DEBUG(("Found additional characters [%s] in port "
- "number [%s], assuming default.\n", endptr,
- port_str));
+ PLUGIN_DEBUG("Found additional characters [%s] in port "
+ "number [%s], assuming default.\n",
+ endptr, port_str);
port = 0;
}
if (port < 0 || port > 65535) {
- PLUGIN_DEBUG(("Illegal port number [%ld], assuming "
- "default.\n", port));
+ PLUGIN_DEBUG("Illegal port number [%ld], assuming "
+ "default.\n", port);
port = 0;
}
} else {
- PLUGIN_DEBUG(("Illegal port number [%s], assuming default.\n",
- port_str));
+ PLUGIN_DEBUG("Illegal port number [%s], assuming default.\n",
+ port_str);
port = 0;
}
}
@@ -270,7 +270,7 @@ static int buf_to_addr_port_list(struct sssd_ctx *ctx,
addr_str++;
}
- PLUGIN_DEBUG(("Found [%s][%d].\n", addr_str, port));
+ PLUGIN_DEBUG("Found [%s][%d].\n", addr_str, port);
l[c].addr = strdup(addr_str);
if (l[c].addr == NULL) {
@@ -314,7 +314,7 @@ static int get_krb5info(const char *realm, struct sssd_ctx *ctx,
name_tmpl = KPASSWDINFO_TMPL;
break;
default:
- PLUGIN_DEBUG(("Unsupported service [%d].\n", svc));
+ PLUGIN_DEBUG("Unsupported service [%d].\n", svc);
return EINVAL;
}
@@ -323,13 +323,13 @@ static int get_krb5info(const char *realm, struct sssd_ctx *ctx,
krb5info_name = calloc(1, len + 1);
if (krb5info_name == NULL) {
- PLUGIN_DEBUG(("malloc failed.\n"));
+ PLUGIN_DEBUG("malloc failed.\n");
return ENOMEM;
}
ret = snprintf(krb5info_name, len, name_tmpl, realm);
if (ret < 0) {
- PLUGIN_DEBUG(("snprintf failed.\n"));
+ PLUGIN_DEBUG("snprintf failed.\n");
ret = EINVAL;
goto done;
}
@@ -337,8 +337,8 @@ static int get_krb5info(const char *realm, struct sssd_ctx *ctx,
fd = open(krb5info_name, O_RDONLY);
if (fd == -1) {
- PLUGIN_DEBUG(("open failed [%s][%d][%s].\n",
- krb5info_name, errno, strerror(errno)));
+ PLUGIN_DEBUG("open failed [%s][%d][%s].\n",
+ krb5info_name, errno, strerror(errno));
ret = errno;
goto done;
}
@@ -349,15 +349,15 @@ static int get_krb5info(const char *realm, struct sssd_ctx *ctx,
len = sss_atomic_read_s(fd, buf, BUFSIZE);
if (len == -1) {
ret = errno;
- PLUGIN_DEBUG(("read failed [%d][%s].\n", ret, strerror(ret)));
+ PLUGIN_DEBUG("read failed [%d][%s].\n", ret, strerror(ret));
close(fd);
goto done;
}
close(fd);
if (len == BUFSIZE) {
- PLUGIN_DEBUG(("Content of krb5info file [%s] is [%d] or larger.\n",
- krb5info_name, BUFSIZE));
+ PLUGIN_DEBUG("Content of krb5info file [%s] is [%d] or larger.\n",
+ krb5info_name, BUFSIZE);
}
switch (svc) {
@@ -376,7 +376,7 @@ static int get_krb5info(const char *realm, struct sssd_ctx *ctx,
}
break;
default:
- PLUGIN_DEBUG(("Unsupported service [%d].\n", svc));
+ PLUGIN_DEBUG("Unsupported service [%d].\n", svc);
ret = EINVAL;
goto done;
}
@@ -401,7 +401,7 @@ krb5_error_code sssd_krb5_locator_init(krb5_context context,
ctx->debug = false;
} else {
ctx->debug = true;
- PLUGIN_DEBUG(("sssd_krb5_locator_init called\n"));
+ PLUGIN_DEBUG("sssd_krb5_locator_init called\n");
}
dummy = getenv(SSSD_KRB5_LOCATOR_DISABLE);
@@ -409,7 +409,7 @@ krb5_error_code sssd_krb5_locator_init(krb5_context context,
ctx->disabled = false;
} else {
ctx->disabled = true;
- PLUGIN_DEBUG(("SSSD KRB5 locator plugin is disabled.\n"));
+ PLUGIN_DEBUG("SSSD KRB5 locator plugin is disabled.\n");
}
*private_data = ctx;
@@ -424,7 +424,7 @@ void sssd_krb5_locator_close(void *private_data)
if (private_data == NULL) return;
ctx = (struct sssd_ctx *) private_data;
- PLUGIN_DEBUG(("sssd_krb5_locator_close called\n"));
+ PLUGIN_DEBUG("sssd_krb5_locator_close called\n");
free_addr_port_list(&(ctx->kdc_addr));
free_addr_port_list(&(ctx->kpasswd_addr));
@@ -460,7 +460,7 @@ krb5_error_code sssd_krb5_locator_lookup(void *private_data,
}
if (ctx->disabled) {
- PLUGIN_DEBUG(("Plugin disabled, nothing to do.\n"));
+ PLUGIN_DEBUG("Plugin disabled, nothing to do.\n");
return KRB5_PLUGIN_NO_HANDLE;
}
@@ -468,13 +468,13 @@ krb5_error_code sssd_krb5_locator_lookup(void *private_data,
free(ctx->sssd_realm);
ctx->sssd_realm = strdup(realm);
if (ctx->sssd_realm == NULL) {
- PLUGIN_DEBUG(("strdup failed.\n"));
+ PLUGIN_DEBUG("strdup failed.\n");
return KRB5_PLUGIN_NO_HANDLE;
}
ret = get_krb5info(realm, ctx, locate_service_kdc);
if (ret != EOK) {
- PLUGIN_DEBUG(("get_krb5info failed.\n"));
+ PLUGIN_DEBUG("get_krb5info failed.\n");
return KRB5_PLUGIN_NO_HANDLE;
}
@@ -482,22 +482,22 @@ krb5_error_code sssd_krb5_locator_lookup(void *private_data,
svc == locate_service_master_kdc) {
ret = get_krb5info(realm, ctx, locate_service_kpasswd);
if (ret != EOK) {
- PLUGIN_DEBUG(("reading kpasswd address failed, "
- "using kdc address.\n"));
+ PLUGIN_DEBUG("reading kpasswd address failed, "
+ "using kdc address.\n");
free_addr_port_list(&(ctx->kpasswd_addr));
ret = copy_addr_port_list(ctx->kdc_addr, true,
&(ctx->kpasswd_addr));
if (ret != EOK) {
- PLUGIN_DEBUG(("copying address list failed.\n"));
+ PLUGIN_DEBUG("copying address list failed.\n");
return KRB5_PLUGIN_NO_HANDLE;
}
}
}
}
- PLUGIN_DEBUG(("sssd_realm[%s] requested realm[%s] family[%d] socktype[%d] "
- "locate_service[%d]\n", ctx->sssd_realm, realm, family,
- socktype, svc));
+ PLUGIN_DEBUG("sssd_realm[%s] requested realm[%s] family[%d] socktype[%d] "
+ "locate_service[%d]\n",
+ ctx->sssd_realm, realm, family, socktype, svc);
switch (svc) {
case locate_service_kdc:
@@ -547,7 +547,7 @@ krb5_error_code sssd_krb5_locator_lookup(void *private_data,
memset(port_str, 0, PORT_STR_SIZE);
ret = snprintf(port_str, PORT_STR_SIZE-1, "%u", port);
if (ret < 0 || ret >= (PORT_STR_SIZE-1)) {
- PLUGIN_DEBUG(("snprintf failed.\n"));
+ PLUGIN_DEBUG("snprintf failed.\n");
return KRB5_PLUGIN_NO_HANDLE;
}
@@ -557,31 +557,31 @@ krb5_error_code sssd_krb5_locator_lookup(void *private_data,
ret = getaddrinfo(addr[c].addr, port_str, &ai_hints, &ai);
if (ret != 0) {
- PLUGIN_DEBUG(("getaddrinfo failed [%d][%s].\n", ret,
- gai_strerror(ret)));
+ PLUGIN_DEBUG("getaddrinfo failed [%d][%s].\n",
+ ret, gai_strerror(ret));
if (ret == EAI_SYSTEM) {
- PLUGIN_DEBUG(("getaddrinfo failed [%d][%s].\n",
- errno, strerror(errno)));
+ PLUGIN_DEBUG("getaddrinfo failed [%d][%s].\n",
+ errno, strerror(errno));
}
return KRB5_PLUGIN_NO_HANDLE;
}
- PLUGIN_DEBUG(("addr[%s:%s] family[%d] socktype[%d]\n", addr[c].addr,
- port_str, ai->ai_family, ai->ai_socktype));
+ PLUGIN_DEBUG("addr[%s:%s] family[%d] socktype[%d]\n",
+ addr[c].addr, port_str, ai->ai_family, ai->ai_socktype);
if ((family == AF_UNSPEC || ai->ai_family == family) &&
ai->ai_socktype == socktype) {
ret = cbfunc(cbdata, socktype, ai->ai_addr);
if (ret != 0) {
- PLUGIN_DEBUG(("cbfunc failed\n"));
+ PLUGIN_DEBUG("cbfunc failed\n");
freeaddrinfo(ai);
return ret;
} else {
- PLUGIN_DEBUG(("[%s] used\n", addr[c].addr));
+ PLUGIN_DEBUG("[%s] used\n", addr[c].addr);
}
} else {
- PLUGIN_DEBUG(("[%s] NOT used\n", addr[c].addr));
+ PLUGIN_DEBUG("[%s] NOT used\n", addr[c].addr);
}
freeaddrinfo(ai);
}
--
2.9.5

View File

@ -1,29 +0,0 @@
From f748abb7b773a09c7be279b42774a5692fcb1fbb Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lslebodn@redhat.com>
Date: Thu, 19 Jul 2018 09:50:12 +0200
Subject: [PATCH 4/7] krb5_locator: Fix typo in debug message
Merges: https://pagure.io/SSSD/sssd/pull-request/3786
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
(cherry picked from commit 09dc1d9dc10780d126d477c394ae2ef4c0d0cff3)
---
src/krb5_plugin/sssd_krb5_locator_plugin.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/krb5_plugin/sssd_krb5_locator_plugin.c b/src/krb5_plugin/sssd_krb5_locator_plugin.c
index 61fee6b..acb20f2 100644
--- a/src/krb5_plugin/sssd_krb5_locator_plugin.c
+++ b/src/krb5_plugin/sssd_krb5_locator_plugin.c
@@ -323,7 +323,7 @@ static int get_krb5info(const char *realm, struct sssd_ctx *ctx,
krb5info_name = calloc(1, len + 1);
if (krb5info_name == NULL) {
- PLUGIN_DEBUG("malloc failed.\n");
+ PLUGIN_DEBUG("calloc failed.\n");
return ENOMEM;
}
--
2.9.5

View File

@ -1,29 +0,0 @@
From 5c90d3a2890eb121ff6cb5e972b69bb118cbac39 Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lslebodn@redhat.com>
Date: Sat, 21 Jul 2018 23:50:11 +0200
Subject: [PATCH 5/7] krb5_locator: Fix formatting of the variable port
Merges: https://pagure.io/SSSD/sssd/pull-request/3786
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
(cherry picked from commit aefdf70351d01d1dcfe3ebb2769fbd3bb1bd0441)
---
src/krb5_plugin/sssd_krb5_locator_plugin.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/krb5_plugin/sssd_krb5_locator_plugin.c b/src/krb5_plugin/sssd_krb5_locator_plugin.c
index acb20f2..4b0b6a1 100644
--- a/src/krb5_plugin/sssd_krb5_locator_plugin.c
+++ b/src/krb5_plugin/sssd_krb5_locator_plugin.c
@@ -270,7 +270,7 @@ static int buf_to_addr_port_list(struct sssd_ctx *ctx,
addr_str++;
}
- PLUGIN_DEBUG("Found [%s][%d].\n", addr_str, port);
+ PLUGIN_DEBUG("Found [%s][%ld].\n", addr_str, port);
l[c].addr = strdup(addr_str);
if (l[c].addr == NULL) {
--
2.9.5

View File

@ -1,31 +0,0 @@
From d5f87b392f8cefbf37674f410087c8cbe4a50dcd Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lslebodn@redhat.com>
Date: Thu, 19 Jul 2018 09:53:13 +0200
Subject: [PATCH 6/7] krb5_locator: Use format string checking for debug
function
Merges: https://pagure.io/SSSD/sssd/pull-request/3786
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
(cherry picked from commit 9680ac9ce20511b3f34dc1c8635d0c4435006ce3)
---
src/krb5_plugin/sssd_krb5_locator_plugin.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/src/krb5_plugin/sssd_krb5_locator_plugin.c b/src/krb5_plugin/sssd_krb5_locator_plugin.c
index 4b0b6a1..720878e 100644
--- a/src/krb5_plugin/sssd_krb5_locator_plugin.c
+++ b/src/krb5_plugin/sssd_krb5_locator_plugin.c
@@ -82,6 +82,9 @@ struct sssd_ctx {
bool disabled;
};
+#ifdef HAVE_FUNCTION_ATTRIBUTE_FORMAT
+__attribute__((format(printf, 1, 2)))
+#endif
static void plugin_debug_fn(const char *format, ...)
{
va_list ap;
--
2.9.5

View File

@ -1,363 +0,0 @@
From 9f5fbbdac3658f5f1695fbf3cf89544b4b578b92 Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lslebodn@redhat.com>
Date: Wed, 20 Jan 2016 13:15:11 +0100
Subject: [PATCH 7/7] PAM: Allow to configure pam services for Smartcards
Resolves:
https://pagure.io/SSSD/sssd/issue/2926
Merges: https://pagure.io/SSSD/sssd/pull-request/3799
Reviewed-by: Sumit Bose <sbose@redhat.com>
(cherry picked from commit 93caaf294cfd85b4e0d7faa2fc5c2298d6b13020)
---
src/confdb/confdb.h | 1 +
src/config/SSSDConfig/__init__.py.in | 1 +
src/config/cfg_rules.ini | 1 +
src/config/etc/sssd.api.conf | 1 +
src/man/sssd.conf.5.xml | 76 +++++++++++++++-
src/responder/pam/pamsrv.h | 1 +
src/responder/pam/pamsrv_p11.c | 164 +++++++++++++++++++++++++++++++++--
7 files changed, 237 insertions(+), 8 deletions(-)
diff --git a/src/confdb/confdb.h b/src/confdb/confdb.h
index 8af625f..700ab76 100644
--- a/src/confdb/confdb.h
+++ b/src/confdb/confdb.h
@@ -131,6 +131,7 @@
#define CONFDB_PAM_CERT_DB_PATH "pam_cert_db_path"
#define CONFDB_PAM_P11_CHILD_TIMEOUT "p11_child_timeout"
#define CONFDB_PAM_APP_SERVICES "pam_app_services"
+#define CONFDB_PAM_P11_ALLOWED_SERVICES "pam_p11_allowed_services"
/* SUDO */
#define CONFDB_SUDO_CONF_ENTRY "config/sudo"
diff --git a/src/config/SSSDConfig/__init__.py.in b/src/config/SSSDConfig/__init__.py.in
index 32b74e4..2846ea2 100644
--- a/src/config/SSSDConfig/__init__.py.in
+++ b/src/config/SSSDConfig/__init__.py.in
@@ -103,6 +103,7 @@ option_strings = {
'pam_cert_db_path' : _('Path to certificate database with PKCS#11 modules.'),
'p11_child_timeout' : _('How many seconds will pam_sss wait for p11_child to finish'),
'pam_app_services' : _('Which PAM services are permitted to contact application domains'),
+ 'pam_p11_allowed_services' : _('Allowed services for using smartcards'),
# [sudo]
'sudo_timed' : _('Whether to evaluate the time-based attributes in sudo rules'),
diff --git a/src/config/cfg_rules.ini b/src/config/cfg_rules.ini
index 5513227..c18fcbd 100644
--- a/src/config/cfg_rules.ini
+++ b/src/config/cfg_rules.ini
@@ -126,6 +126,7 @@ option = pam_cert_auth
option = pam_cert_db_path
option = p11_child_timeout
option = pam_app_services
+option = pam_p11_allowed_services
[rule/allowed_sudo_options]
validator = ini_allowed_options
diff --git a/src/config/etc/sssd.api.conf b/src/config/etc/sssd.api.conf
index 2be2e3e..7156142 100644
--- a/src/config/etc/sssd.api.conf
+++ b/src/config/etc/sssd.api.conf
@@ -75,6 +75,7 @@ pam_cert_auth = bool, None, false
pam_cert_db_path = str, None, false
p11_child_timeout = int, None, false
pam_app_services = str, None, false
+pam_p11_allowed_services = str, None, false
[sudo]
# sudo service
diff --git a/src/man/sssd.conf.5.xml b/src/man/sssd.conf.5.xml
index ed3c100..881ffc6 100644
--- a/src/man/sssd.conf.5.xml
+++ b/src/man/sssd.conf.5.xml
@@ -1389,7 +1389,81 @@ pam_account_locked_message = Account locked, please contact help desk.
</para>
</listitem>
</varlistentry>
-
+ <varlistentry>
+ <term>pam_p11_allowed_services (integer)</term>
+ <listitem>
+ <para>
+ A comma-separated list of PAM service names for
+ which it will be allowed to use Smartcards.
+ </para>
+ <para>
+ It is possible to add another PAM service name to
+ the default set by using
+ <quote>+service_name</quote> or to explicitly
+ remove a PAM service name from the default set by
+ using <quote>-service_name</quote>. For example,
+ in order to replace a default PAM service name for
+ authentication with Smartcards
+ (e.g. <quote>login</quote>) with a custom PAM
+ service name (e.g. <quote>my_pam_service</quote>),
+ you would use the following configuration:
+ <programlisting>
+pam_p11_allowed_services = +my_pam_service, -login
+ </programlisting>
+ </para>
+ <para>
+ Default: the default set of PAM service names
+ includes:
+ <itemizedlist>
+ <listitem>
+ <para>
+ login
+ </para>
+ </listitem>
+ <listitem>
+ <para>
+ su
+ </para>
+ </listitem>
+ <listitem>
+ <para>
+ su-l
+ </para>
+ </listitem>
+ <listitem>
+ <para>
+ gdm-smartcard
+ </para>
+ </listitem>
+ <listitem>
+ <para>
+ gdm-password
+ </para>
+ </listitem>
+ <listitem>
+ <para>
+ kdm
+ </para>
+ </listitem>
+ <listitem>
+ <para>
+ sudo
+ </para>
+ </listitem>
+ <listitem>
+ <para>
+ sudo-i
+ </para>
+ </listitem>
+ <listitem>
+ <para>
+ gnome-screensaver
+ </para>
+ </listitem>
+ </itemizedlist>
+ </para>
+ </listitem>
+ </varlistentry>
</variablelist>
</refsect2>
diff --git a/src/responder/pam/pamsrv.h b/src/responder/pam/pamsrv.h
index dfd9821..3325d9b 100644
--- a/src/responder/pam/pamsrv.h
+++ b/src/responder/pam/pamsrv.h
@@ -51,6 +51,7 @@ struct pam_ctx {
int p11_child_debug_fd;
char *nss_db;
struct sss_certmap_ctx *sss_certmap_ctx;
+ char **smartcard_services;
};
struct pam_auth_dp_req {
diff --git a/src/responder/pam/pamsrv_p11.c b/src/responder/pam/pamsrv_p11.c
index 0b6a162..ddb2def 100644
--- a/src/responder/pam/pamsrv_p11.c
+++ b/src/responder/pam/pamsrv_p11.c
@@ -224,12 +224,148 @@ errno_t p11_child_init(struct pam_ctx *pctx)
return child_debug_init(P11_CHILD_LOG_FILE, &pctx->p11_child_debug_fd);
}
+static inline bool
+service_in_list(char **list, size_t nlist, const char *str)
+{
+ size_t i;
+
+ for (i = 0; i < nlist; i++) {
+ if (strcasecmp(list[i], str) == 0) {
+ break;
+ }
+ }
+
+ return (i < nlist) ? true : false;
+}
+
+static errno_t get_sc_services(TALLOC_CTX *mem_ctx, struct pam_ctx *pctx,
+ char ***_sc_list)
+{
+ TALLOC_CTX *tmp_ctx;
+ errno_t ret;
+ char *conf_str;
+ char **conf_list;
+ int conf_list_size;
+ char **add_list;
+ char **remove_list;
+ int ai = 0;
+ int ri = 0;
+ int j = 0;
+ char **sc_list;
+ int expected_sc_list_size;
+
+ const char *default_sc_services[] = {
+ "login", "su", "su-l", "gdm-smartcard", "gdm-password", "kdm", "sudo",
+ "sudo-i", "gnome-screensaver", NULL,
+ };
+ const int default_sc_services_size =
+ sizeof(default_sc_services) / sizeof(default_sc_services[0]);
+
+ tmp_ctx = talloc_new(mem_ctx);
+ if (tmp_ctx == NULL) {
+ return ENOMEM;
+ }
+
+ ret = confdb_get_string(pctx->rctx->cdb, tmp_ctx, CONFDB_PAM_CONF_ENTRY,
+ CONFDB_PAM_P11_ALLOWED_SERVICES, NULL,
+ &conf_str);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_CRIT_FAILURE,
+ "confdb_get_string failed %d [%s]\n", ret, sss_strerror(ret));
+ goto done;
+ }
+
+ if (conf_str != NULL) {
+ ret = split_on_separator(tmp_ctx, conf_str, ',', true, true,
+ &conf_list, &conf_list_size);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_CRIT_FAILURE,
+ "Cannot parse list of service names '%s': %d [%s]\n",
+ conf_str, ret, sss_strerror(ret));
+ goto done;
+ }
+ } else {
+ conf_list = talloc_zero_array(tmp_ctx, char *, 1);
+ conf_list_size = 0;
+ }
+
+ add_list = talloc_zero_array(tmp_ctx, char *, conf_list_size + 1);
+ remove_list = talloc_zero_array(tmp_ctx, char *, conf_list_size + 1);
+
+ if (add_list == NULL || remove_list == NULL) {
+ ret = ENOMEM;
+ goto done;
+ }
+
+ for (int i = 0; conf_list[i] != NULL; ++i) {
+ switch (conf_list[i][0]) {
+ case '+':
+ add_list[ai] = conf_list[i] + 1;
+ ++ai;
+ break;
+ case '-':
+ remove_list[ri] = conf_list[i] + 1;
+ ++ri;
+ break;
+ default:
+ DEBUG(SSSDBG_OP_FAILURE,
+ "The option "CONFDB_PAM_P11_ALLOWED_SERVICES" must start"
+ "with either '+' (for adding service) or '-' (for "
+ "removing service) got '%s'\n", conf_list[i]);
+ ret = EINVAL;
+ goto done;
+ }
+ }
+
+ expected_sc_list_size = default_sc_services_size + ai + 1;
+
+ sc_list = talloc_zero_array(tmp_ctx, char *, expected_sc_list_size);
+ if (sc_list == NULL) {
+ ret = ENOMEM;
+ goto done;
+ }
+
+ for (int i = 0; add_list[i] != NULL; ++i) {
+ if (service_in_list(remove_list, ri, add_list[i])) {
+ continue;
+ }
+
+ sc_list[j] = talloc_strdup(sc_list, add_list[i]);
+ if (sc_list[j] == NULL) {
+ ret = ENOMEM;
+ goto done;
+ }
+ ++j;
+ }
+
+ for (int i = 0; default_sc_services[i] != NULL; ++i) {
+ if (service_in_list(remove_list, ri, default_sc_services[i])) {
+ continue;
+ }
+
+ sc_list[j] = talloc_strdup(sc_list, default_sc_services[i]);
+ if (sc_list[j] == NULL) {
+ ret = ENOMEM;
+ goto done;
+ }
+ ++j;
+ }
+
+ if (_sc_list != NULL) {
+ *_sc_list = talloc_steal(mem_ctx, sc_list);
+ }
+
+done:
+ talloc_zfree(tmp_ctx);
+
+ return ret;
+}
+
bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd)
{
size_t c;
- const char *sc_services[] = { "login", "su", "su-l", "gdm-smartcard",
- "gdm-password", "kdm", "sudo", "sudo-i",
- "gnome-screensaver", NULL };
+ errno_t ret;
+
if (!pctx->cert_auth) {
return false;
}
@@ -244,16 +380,30 @@ bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd)
return false;
}
- /* TODO: make services configurable */
if (pd->service == NULL || *pd->service == '\0') {
return false;
}
- for (c = 0; sc_services[c] != NULL; c++) {
- if (strcmp(pd->service, sc_services[c]) == 0) {
+
+ /* Initialize smartcard allowed services just once */
+ if (pctx->smartcard_services == NULL) {
+ ret = get_sc_services(pctx, pctx, &pctx->smartcard_services);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_CRIT_FAILURE,
+ "Failed to get p11 allowed services %d[%s]",
+ ret, sss_strerror(ret));
+ sss_log(SSS_LOG_ERR,
+ "Failed to evaluate pam_p11_allowed_services option, "
+ "please check for typos in the SSSD configuration");
+ return false;
+ }
+ }
+
+ for (c = 0; pctx->smartcard_services[c] != NULL; c++) {
+ if (strcmp(pd->service, pctx->smartcard_services[c]) == 0) {
break;
}
}
- if (sc_services[c] == NULL) {
+ if (pctx->smartcard_services[c] == NULL) {
DEBUG(SSSDBG_CRIT_FAILURE,
"Smartcard authentication for service [%s] not supported.\n",
pd->service);
--
2.9.5

View File

@ -1,25 +0,0 @@
From 565ef3ffcaaef69a768b6a341777c339217bbbab Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lslebodn@fedoraproject.org>
Date: Mon, 12 Dec 2016 21:56:16 +0100
Subject: [PATCH] SYSTEMD: Use capabilities
copied from selinux policy
---
src/sysv/systemd/sssd.service.in | 1 +
1 file changed, 1 insertion(+)
diff --git a/src/sysv/systemd/sssd.service.in b/src/sysv/systemd/sssd.service.in
index 0c515d34caaa3ea397c4c7e95eef0188df170840..252889dbb2b7b1e651966258e7b76eab38357e76 100644
--- a/src/sysv/systemd/sssd.service.in
+++ b/src/sysv/systemd/sssd.service.in
@@ -11,6 +11,7 @@ ExecStart=@sbindir@/sssd -i ${DEBUG_LOGGER}
Type=notify
NotifyAccess=main
PIDFile=@localstatedir@/run/sssd.pid
+CapabilityBoundingSet=CAP_IPC_LOCK CAP_CHOWN CAP_DAC_READ_SEARCH CAP_KILL CAP_NET_ADMIN CAP_SYS_NICE CAP_FOWNER CAP_SETGID CAP_SETUID CAP_SYS_ADMIN CAP_SYS_RESOURCE CAP_BLOCK_SUSPEND
[Install]
WantedBy=multi-user.target
--
2.15.1

View File

@ -1,39 +0,0 @@
From 232305dd10b81955a3ee9dfc6d56c2d76ad5706f Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lslebodn@fedoraproject.org>
Date: Fri, 3 Nov 2017 16:18:14 +0100
Subject: [PATCH] Disable stopping idle socket activated responders
---
src/confdb/confdb.h | 2 +-
src/man/sssd.conf.5.xml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/confdb/confdb.h b/src/confdb/confdb.h
index 1471949623e9dd7a8536e3ac3048a10227a5d857..e30e77bf50b7312b3f660241c92a1b3c03e88259 100644
--- a/src/confdb/confdb.h
+++ b/src/confdb/confdb.h
@@ -85,7 +85,7 @@
/* Responders */
#define CONFDB_RESPONDER_GET_DOMAINS_TIMEOUT "get_domains_timeout"
#define CONFDB_RESPONDER_CLI_IDLE_TIMEOUT "client_idle_timeout"
-#define CONFDB_RESPONDER_CLI_IDLE_DEFAULT_TIMEOUT 60
+#define CONFDB_RESPONDER_CLI_IDLE_DEFAULT_TIMEOUT 0
#define CONFDB_RESPONDER_LOCAL_NEG_TIMEOUT "local_negative_timeout"
#define CONFDB_RESPONDER_IDLE_TIMEOUT "responder_idle_timeout"
#define CONFDB_RESPONDER_IDLE_DEFAULT_TIMEOUT 300
diff --git a/src/man/sssd.conf.5.xml b/src/man/sssd.conf.5.xml
index 6be3cd47463ec054276a0b6b2be7ec03eef1f0be..d362ba71cfbeb6271fc87abd9743ca7a77f9f3ec 100644
--- a/src/man/sssd.conf.5.xml
+++ b/src/man/sssd.conf.5.xml
@@ -706,7 +706,7 @@
or dbus activated.
</para>
<para>
- Default: 300
+ Default: 0
</para>
</listitem>
</varlistentry>
--
2.14.3

View File

@ -1,44 +0,0 @@
From ae98cc4985bd3a19bbcadb5c4b77c5e01819e8ac Mon Sep 17 00:00:00 2001
From: Jakub Hrozek <jhrozek@redhat.com>
Date: Tue, 21 Aug 2018 13:59:33 +0200
Subject: [PATCH] SYSDB: Prepend cached hash with the salt identifier if it's
not there
This is a downstream-only patch for
https://bugzilla.redhat.com/show_bug.cgi?id=1561105#c13
Reviewed-by: Michal Židek <mzidek@redhat.com>
---
src/db/sysdb_ops.c | 9 +++++++++
1 file changed, 9 insertions(+)
diff --git a/src/db/sysdb_ops.c b/src/db/sysdb_ops.c
index df0fb83c5546809a2d643e2e585153ad61a6a334..3a7e8fed507e9d96301f97112f9230e031cb5896 100644
--- a/src/db/sysdb_ops.c
+++ b/src/db/sysdb_ops.c
@@ -4516,6 +4516,7 @@ int sysdb_cache_auth(struct sss_domain_info *domain,
time_t expire_date = -1;
time_t delayed_until = -1;
int ret;
+ const char *salt_prefix = "$6$";
if (name == NULL || *name == '\0') {
DEBUG(SSSDBG_CRIT_FAILURE, "Missing user name.\n");
@@ -4601,6 +4602,14 @@ int sysdb_cache_auth(struct sss_domain_info *domain,
goto done;
}
+ if (strncmp(userhash, salt_prefix, strlen(salt_prefix)) != 0) {
+ userhash = talloc_asprintf(tmp_ctx, "%s%s", salt_prefix, userhash);
+ if (userhash == NULL) {
+ ret = ENOMEM;
+ goto done;
+ }
+ }
+
ret = s3crypt_sha512(tmp_ctx, password, userhash, &comphash);
if (ret) {
DEBUG(SSSDBG_CONF_SETTINGS, "Failed to create password hash.\n");
--
2.14.4

View File

@ -1 +1 @@
SHA512 (sssd-1.16.3.tar.gz) = 6165923f652f624bbe3ddc625ae682c4867eb7a20652d0cf74bbb8dda2307c917d3189ede26fd21a4fb5fd5926149271a65fa09f3affe928029ed99e6422b728
SHA512 (sssd-2.8.2.tar.gz) = 10b7a641823aefb43e30bff9e5f309a1f48446ffff421a06f86496db24ba1fbd384733b5690864507ef9b2f04c91e563fe9820536031f83f1bd6e93edfedee55

1153
sssd.spec

File diff suppressed because it is too large Load Diff