Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mans: fix typo in ldap_idmap_autorid_compat #6852

Closed
wants to merge 2,655 commits into from

Conversation

andreboscatto
Copy link
Contributor

Resolves: #5198
mans: fix typo in ldap_idmap_autorid_compat

@pbrezina
Copy link
Member

It looks like your branch needs to be rebased. It took some 2018 commit as its base :D

@justin-stephenson
Copy link
Contributor

@andreboscatto Please squash the commits into 1 and I'll approve 👍

@andreboscatto andreboscatto deleted the monatomically_typo branch July 25, 2023 20:20
@andreboscatto andreboscatto removed the request for review from justin-stephenson July 25, 2023 20:22
@andreboscatto andreboscatto added Rejected Conflict Conflicts with target branch and removed Waiting for review backport-to-stable Targets also latest stable branch labels Jul 25, 2023
alexey-tikhonov and others added 16 commits July 25, 2023 22:03
Comment wasn't relevant since 5dccf76

Reviewed-by: Alejandro Lopez <allopez@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Alejandro Lopez <allopez@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Since implementation of "local" provider was removed, the only
provider that doesn't need to "check provider" is "files provider".

Reviewed-by: Alejandro Lopez <allopez@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Due to CVE-2023-0286 the type of the x400Address member of the
GENERAL_NAME struct was changed from ASN1_TYPE to ASN1_STRING. The
following patch tries to make sure that the x400Address can be extracted
from the certificate in either case.

Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
When socket activated service connects for the first time, it is added to
`mt_ctx->svc_list` by `socket_activated_service_not_found()` with a proper
`socket_activated = true`.
But when it reconnects again, `get_service_in_the_list()` finds it in
`mt_ctx->svc_list` and overwrites `socket_activated = false` unconditionally.
This patch moves `socket_activated = false` to `start_service()`.

Resolves: SSSD#6324

Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Jakub Vávra <jvavra@redhat.com>
removing unused import

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
:feature: NSS IDMAP has two new methods: `getsidbyusername` and
  `getsidbygroupname`

Resolves: SSSD#6565

Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
Reviewed-by: Justin Stephenson <jstephen@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
…ETTINGS

Reviewed-by: Alejandro López <allopez@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Alejandro López <allopez@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
sumit-bose and others added 30 commits July 25, 2023 22:03
If the formatting option of the certificate digest/hash function
contained and additional specifier separated with a '_' the comparison
of the provided digest name and the available ones was incomplete, the
last character was ignored and the comparison was successful if even if
there was only a partial match.

Resolves: SSSD#6802

Reviewed-by: Alejandro López <allopez@redhat.com>
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
Reviewed-by: Alejandro López <allopez@redhat.com>
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
correct the variable name.

Signed-off-by: Madhuri Upadhye <mupadhye@redhat.com>

Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Fix test_maxage

Reviewed-by: Shridhar Gadekar <sgadekar@redhat.com>
Fix typo in error message:
"waitpid did not found" => "waitpid did not find"

Signed-off-by: François Cami <fcami@redhat.com>

Reviewed-by: Andre Boscatto <aboscatt@redhat.com>
Reviewed-by: Justin Stephenson <jstephen@redhat.com>
Conversion of test_0001_bz1362023(), test_0002_givenmail() and
test_0037_ad_parameters_extra_attrs_mail() in a system test using the
new framework.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>

Reviewed-by: Dan Lavu <dlavu@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
duplicate backtrace is behaving differently on different
versions. Moving it out of gating.

Reviewed-by: Anuj Borah <aborah@redhat.com>
…verrideuser

      Added automation for following bugs:
        https://bugzilla.redhat.com/show_bug.cgi?id=2192708
        https://bugzilla.redhat.com/show_bug.cgi?id=2196838
        https://bugzilla.redhat.com/show_bug.cgi?id=2196816
        https://bugzilla.redhat.com/show_bug.cgi?id=2196839

verify:
  SSSD#6721

Signed-off-by: Madhuri Upadhye <mupadhye@redhat.com>

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
CentOS8 buildroot repo location has changed.

https://lists.centos.org/pipermail/centos-devel/2023-March/142831.html

Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Alexey Tikhonov <atikhono@redhat.com>
Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Fix KCM::test_client_timeout

Reviewed-by: Shridhar Gadekar <sgadekar@redhat.com>
Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Update sssh module for tier 1_3, 1_4 and 2

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Shridhar Gadekar <sgadekar@redhat.com>
Add sleep time to test_bz785908

Reviewed-by: Shridhar Gadekar <sgadekar@redhat.com>
Add python3-libsss_nss_idmap package from utils.py

Signed-off-by: Madhuri Upadhye <mupadhye@redhat.com>

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
This plugin adds @pytest.mark.importance("low|medium|high|critical")
and --importance=xyz cli option.

Default importance is medium.

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
This plugin validates test metadata and generates Polarion import XMLs.

To generate the XMLs, call pytest with:

```
--polarion-config=./polarion.yaml --output-polarion-testcase=testcase.xml --output-polarion-testrun=testrun.xml
```

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
It is replaced by importance marker, which defaults to medium.

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
Number of steps did not match number of expected results.

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
This will quickly catch issues in Polarion metadata/docstring without
waiting for the test run to finish.

Reviewed-by: Jakub Vávra <jvavra@redhat.com>
Reviewed-by: Tomáš Halman <thalman@redhat.com>
If user_verification is enabled, then the PIN will always be requested.

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
(cherry picked from commit b87c5a6)

Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
This is more clear, and aligns with smartcard authentication
verbiage.

Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
local authentication methods policy - Some backends (i.e. LDAP, proxy provider)
only support a password base authentication, while others can handle PKINIT
based Smartcard authentication (AD, IPA), two-factor authentication (IPA),
or other methods against a central instance. By default in such cases
authentication is only performed with the methods supported by the backend.

To allow more convenient or secure authentication methods which are supported
by SSSD, but not by the backend in cases where a central authentication is
not strictly required the `local_auth_policy` option is added.

Ignore local auth policy when id_provider = files.

Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
We can assume in this fallback chain that an empty password
is not allowed.

Reviewed-by: Iker Pedrosa <ipedrosa@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Conflict Conflicts with target branch Rejected
Projects
None yet
Development

Successfully merging this pull request may close these issues.

monatomically should have been monotonically