| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| | |
|
|/ |
|
|\
| |
| |
| |
| | |
This fixes most of the existing caching functionality. Cache expiry,
negative hits and entries going away remain to be implemented.
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This removes custom retrieve() functions and Query classes from the
database modules and uses retrieve_sql retrieve_by, group_by and
group_columns to make a custom retrieval query.
In the cache module this completely replaces how the query grouping is
done. The Query class is now only used inside the cache and the
CnAliasedQuery, RowGrouper and related classed have been removed.
|
| | |
|
| |
| |
| |
| | |
This also defined the tables for netgroup storage.
|
| |
| |
| |
| |
| |
| |
| | |
This introduces the tables property in the Cache object that is used to
define the used tables.
This also fixes the storing of mulit-valued attributes in the cache.
|
|/
|
|
|
|
| |
This also moves the creation of a SQLite database connection to a
_get_connection() function to ensure the cache is only created when the
caches are instantiated.
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
This allows the PAM module to request the pam_password_prohibit_message
option for denying password change.
|
|
|
|
|
| |
Just like in nslcd this doesn't actually do anything with the session
ids except generating them.
|
| |
|
|
|
|
|
| |
Since the utils are automatically built if Python is available --disable
is more appropriate a default then --enable.
|
|
|
|
|
|
|
|
| |
We need to avoid writing pyc files because during make distcheck, the
source directory is read-only.
This also ensures that the test is skipped if the Python interpreter is
not found.
|
|
|
|
|
|
| |
This fixes a typo, clarifies the section on the LDAP schema values that
are supported and updates the differences between nss-pam-ldapd and
nss_ldap and pam_ldap.
|
| |
|
|\
| |
| |
| | |
The branch accidentally got merged before it was fully tested.
|
| |
| |
| |
| |
| | |
This fixes a few typos and an omission in the configuration file parsing
code.
|
|\|
| |
| |
| |
| | |
This changes the nscd_invalidate option into a more generic
reconnect_invalidate and also allows clearing the nfsidmap cache.
|
| |
| |
| |
| |
| | |
This also renames the internal nscd module to invalidator for both nslcd
and pynslcd. The new invalidator module is now no longer nscd-specific.
|
|/
|
|
| |
This introduces an nfsidmap value for nscd_invalidate which will cause
the nfsidmap -c command to be run.
|
|
|
|
|
| |
The pynslcd implementation would always clear the passwd nscd cache
regardless of the provided map.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
This tries to conform more closely to PEP8. Imports have been checked and,
if used only once, moved closer to the use to avoid potential import
loops. This also includes a few other minor changes, like using __main__
for utility scripts and variable renames to avoid name clashes.
|
|
|
|
| |
modification
|
| |
|
| |
|
| |
|
|
|
|
|
| |
The :u flag apparently isn't portable across versions of make and automake
rules complain if a manual page is added twice to a target.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|\
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This adds user information modification functionality to nslcd and pynslcd and
implements a chsh.ldap utility that can be used to change the login shell of a
user (similar to the normal chsh command).
The user modification functionality should allow for generic modifications of
user information. More utility commands to perform modifications remain to be
implemented.
|
| | |
|
| |
| |
| |
| |
| | |
Similar to the nslcd implementation, this currently only covers modifying the
homeDirectory and loginShell attributes.
|
| |
| |
| |
| |
| |
| |
| | |
This is currently limited to supporting modification of the homeDirectory and
loginShell attributes.
Modifications as root currently use the rootpwmoddn and rootpwmodpw options.
|
|/
|
|
|
|
|
|
|
| |
The modification can either be requested by root or by the user itself.
Modifications by the user should be done by connecting to the LDAP server with
the user-supplied credentials. It is expected that access controls in the LDAP
server prevent unwanted modifications. The nslcd process is expected to check
whether supplied values are sensible.
|
| |
|