Arthur de Jong

Open Source / Free Software developer

summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Get files ready for 0.9.4 release0.9.4Arthur de Jong2014-06-0610-14/+185
|
* Return correct port number on SolarisArthur de Jong2014-06-061-2/+2
| | | | | | This is a small fix for when using nscd (which still does not seem to work completely). The port is stored in network byte order but should be printed in host byte order.
* Add missing include for FreeBSDArthur de Jong2014-06-061-1/+1
|
* Fix password modification by rootArthur de Jong2014-06-061-1/+1
| | | | This fixes 15fc13c.
* Clear proper buffer lengthArthur de Jong2014-06-061-2/+2
| | | | This fixes 3d29861.
* Fix code indentationArthur de Jong2014-06-061-1/+1
| | | | This fixes 2274b41.
* Update files from latest automakeArthur de Jong2014-06-062-175/+40
|
* Fix commentArthur de Jong2014-06-051-1/+1
|
* Introduce lookup_groupbyuser test commandArthur de Jong2014-06-054-2/+80
| | | | | | This command can be used to perform a lookup using getgrouplist() to present a list of returned numeric group ids. This can be used to avoid the additional lookups that are done with the id and groups commands.
* Clear buffers before free-ingArthur de Jong2014-05-173-1/+21
| | | | | This clears most buffers that may hold credentials at one point before free()ing the memory.
* Clarify code contributionArthur de Jong2014-05-081-4/+4
|
* Improve error logging of user login failuresArthur de Jong2014-05-041-2/+2
|
* Also extract policy controls on BIND failureArthur de Jong2014-05-041-10/+9
| | | | | | | | | This ensures that controls returned by an LDAP server as part of a failed BIND operation are also returned. This makes it possible to distinguish between a wrong password and an expired password. This also only logs the BIND operation result on DEBUG level (the error is logged later on).
* Use FreeBSD lib directory and SONAME on DragonflyArthur de Jong2014-05-041-2/+2
|
* Small documentation improvementsArthur de Jong2014-05-042-8/+7
| | | | | This includes a number of minor changes to the documentation. This also documents the children search scope (related to 2caeef4).
* Log daemonising failuresArthur de Jong2014-05-042-0/+13
| | | | | This also clears errno in the main function to ensure that no incorrect errno value is logged on errors.
* Add a test for setting member attribute mappingArthur de Jong2014-05-043-4/+64
|
* Fix mapping group member attribute to empty stringArthur de Jong2014-05-041-1/+1
| | | | This fixes be94912.
* Make buffer size error logging consistentArthur de Jong2014-05-0417-19/+100
| | | | | This adds logging of most cases where a defined buffer is not large enough to hold provided data on error log level.
* Warn when binddn buffer is too smallArthur de Jong2014-05-044-9/+34
|
* Grow DN buffer sizeArthur de Jong2014-05-041-3/+3
| | | | | The buffer size seems to be a problem in environments with long names or environments with non-ASCII characters.
* Use larger nslcd password bufferushi2014-05-021-1/+1
| | | | | | I had some edge cases where 64 bytes were not enough. People are using password managers with long generated passwords. I increased the buffer size to 128.
* Get files ready for 0.9.3 release0.9.3Arthur de Jong2014-03-1211-22/+404
|
* Update files from recent automakeArthur de Jong2014-03-123-8/+20
|
* Run the correct executables for the testsArthur de Jong2014-03-103-7/+11
| | | | | This fixes issues with running the tests when using a separate build directory (fixes ef0eddaa).
* Fix nslcd-test.conf permissions for testArthur de Jong2014-03-101-0/+3
| | | | | | This ensures that configuration file is not world readable when the tests are run. This avoids test failure for the use of the rootpwmodpw option.
* Interpret transferred integers as signed againArthur de Jong2014-03-101-2/+2
| | | | | | | | This fixes an issue with unsigned values ending up in signed fields and missing sign extension. See: https://bugs.debian.org/739330
* Use right h_errnop for retrying with larger bufferNalin Dahyabhai2014-03-022-2/+2
| | | | | | | The libc nsswitch code expects h_errno to be set to NETDB_INTERNAL when it needs to try again with a larger buffer. Signed-off-by: Lukas Slebodnik <lslebodn@redhat.com>
* Fix crash when retrieving large networks entriesLukas Slebodnik2014-03-022-4/+0
| | | | | | | | | | | | | If NSS_STATUS_TRYAGAIN is returned from read_one_hostent or read_one_netent then fp will be closed and function tio_skipall will be called with NULL pointer. It could happend in functions: _nss_ldap_getnetbyname_r _nss_ldap_getnetbyaddr_r _nss_ldap_gethostbyname2_r _nss_ldap_gethostbyaddr_r Fixes r548 (aka afd5d9b).
* Support builtin Windows groupsDavy Defaud2014-01-311-0/+13
| | | | | | | | | | | This maps the gid (gidNumber) to an AD SID for builtin groups when searching a group by gid (RID) between 544 and 552. In that case the SID prefix is not the domain's prefix (S-1-5-21-dddddd-dddddd-dddddd) but the BUILTIN SID prefix (1-5-32). For example, if you add a user to the Administrators builtin group (S-1-5-32-544), now you should be able to get this group through nslcd, instead of receiving an error message.
* Add test for krb5 thread safetyArthur de Jong2014-01-251-1/+36
| | | | | | | | | This adds a test that checks the return value of krb5_is_thread_safe() to see if krb5 is thread safe (during build) and issues a warning if it is not. nslcd does not directly link to krb5 but the library may be loaded (by GSSAPI) if Kerberos is used to authenticate nslcd to the LDAP server.
* Also detect DragonFly as BSDFrancois Tigeot2014-01-251-1/+1
| | | | | This fixes the detection of DragonFly as requiring the freebsd NSS interface flavour.
* Update shadow.c to resolve pwdLastSet issuejoshuashire2014-01-251-1/+1
| | | | | | | We read the date into the buffer to the specified length to get it to the Unix time (i.e. seconds) from its AD value of nanoseconds, then convert it to days for shadow. If we use date rather than buffer we end up trying to convert the original nanosecond value.
* Implement deref control handlingArthur de Jong2014-01-058-83/+415
|\ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This uses the LDAP_CONTROL_X_DEREF control as described in draft-masarati-ldap-deref-00 to request the LDAP server to dereference group member attribute values to uid attribute values. This should reduce the number of searches that are required for expanding group members that use the member attribute. This mechanism could also be used to extract information on nested groups but the gains are less clear there. Not all LDAP servers support this control. In OpenLDAP, load the (currently undocumented) deref overlay and enable it for the database to take advantage of this improvement. There is a functional difference when using this control. Any returned deferred uid value returned by the LDAP server is accepted as a member. No checks are performed to see if the user matches the search base and search filters set for passwd entries.
| * Update documentationArthur de Jong2014-01-051-10/+17
| | | | | | | | This documents the way the deref controls are used.
| * Use myldap_get_deref_values() to get member uidsArthur de Jong2014-01-051-0/+21
| | | | | | | | | | | | | | This uses information from the deref control (if available) to get the username for each of the members of the group. Any missing deref member attribute values will be seen as nested groups and will be traversed if nested group support is enabled.
| * Provide a myldap_get_deref_values() functionArthur de Jong2014-01-053-2/+158
| | | | | | | | | | | | | | This function looks for deref response controls (LDAP_CONTROL_X_DEREF) in the entry and returns the information from the dereferenced attribute in two lists: dereferenced values and attribute values that could not be dereferenced.
| * Skip member attributes in bymember searchArthur de Jong2014-01-051-2/+17
| | | | | | | | | | | | | | This changes the group by member searches to not request the member attributes. This will speed up result parsing by a fraction because less data is transferred but will also cause the deref control not to be added to these searches.
| * Provide replacement ldap_create_deref_control()Arthur de Jong2014-01-054-3/+123
| | | | | | | | | | | | This adds a test for a bug in OpenLDAP that allocated a LDAP_CONTROL_PAGEDRESULTS control instead of a LDAP_CONTROL_X_DEREF control.
| * Request attribute deref via search controlArthur de Jong2014-01-052-1/+35
| | | | | | | | | | | | | | | | | | | | This uses the LDAP_CONTROL_X_DEREF control as descibed in draft-masarati-ldap-deref-00 to request the LDAP server to dereference member attribute values to uid attribute values in order to avoid doing extra searches. This control is currently only added for group search by looking for the member attribute in the search.
| * Rename entry property to indicate storage typeArthur de Jong2014-01-051-20/+20
| | | | | | | | | | | | This changes entrye->rangedattributevalues to entry->buffers because the propery is not only used for ranged attribute values but for anything that can be freed with free().
| * Ignore missing page controlsArthur de Jong2014-01-051-1/+2
| | | | | | | | | | Since we could get arbitrray controls and are only interested in page controls we ignore failures to find page controls.
| * Use do_try_search() also for paged searchesArthur de Jong2014-01-051-46/+24
|/ | | | | This also changes do_try_search() to support building continued paged controls and lays the groundwork for adding more search controls.
* Support blanking the member attributeArthur de Jong2014-01-053-16/+27
| | | | | | This allows remapping the member attribute to an empty string which removes support for that attribute. This can reduce the number of search operations if the attribute is not used.
* Fix typoArthur de Jong2014-01-051-1/+1
|
* Fix memory leaks related to set_pop()Arthur de Jong2014-01-053-8/+18
| | | | | | | | | | | | | Some pieces of code did not properly free() the value returned by set_pop(). The leak in group code was related to the introduction of nested group functionality in 41ba574 (merged in 3daa68d) so should only be present in releases 0.9.0 forward. The leak in the netgroup code only ended up in the Solaris version of the NSS module and was introduced in 4ea9ad1 (merged in 5c8779d). This leak is present in all releases from 0.8.0 forward.
* Fix compiler warnings in the myldap testArthur de Jong2014-01-041-6/+5
|
* Only exit nslcd when daemon is readyArthur de Jong2014-01-028-133/+310
|\ | | | | | | | | This removes a race condition between the exit of the initial nslcd process (as started by the init script) and nslcd services being ready.
| * Remove daemon() replacement functionArthur de Jong2014-01-024-114/+1
| |
| * Close daemon pipe file descriptor on fork or execArthur de Jong2014-01-022-3/+21
| | | | | | | | | | This tries to avoid child processes ending up with a copy of the pipe file descriptor that is used to signal readiness of the daemon.