[SSSD] [sssd PR#5776][comment] kcm: replace existing credentials to avoid unnecessary ccache growth

2021-10-04 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5776 Title: #5776: kcm: replace existing credentials to avoid unnecessary ccache growth simo5 commented: """ Saw no issues, LGTM """ See the full comment at https://github.com/SSSD/sssd/pu

[SSSD] [sssd PR#5776][comment] kcm: replace existing credentials to avoid unnecessary ccache growth

2021-09-20 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5776 Title: #5776: kcm: replace existing credentials to avoid unnecessary ccache growth simo5 commented: """ Testing the f34 packages you have provided me, will report if anything's wrong with them. """ See the full

[SSSD] [sssd PR#5506][comment] SSSD Log: write_krb5info_file word replacement

2021-02-16 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5506 Title: #5506: SSSD Log: write_krb5info_file word replacement simo5 commented: """ FWIW, the file location depends on ./configure settings, so the whole path should be taken from a #define, and not hard coded, as it will be misleading

[SSSD] [sssd PR#5375][comment] kcm: improve performance for large ccaches

2020-10-23 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5375 Title: #5375: kcm: improve performance for large ccaches simo5 commented: """ Nice work! """ See the full comment at https://github.com/SSSD/sssd/pull/5375#issuecomment-715530897

[SSSD] [sssd PR#5370][comment] nss: Use posix_fallocate() to alloc memcache file

2020-10-16 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5370 Title: #5370: nss: Use posix_fallocate() to alloc memcache file simo5 commented: """ It would be nicer to retry, operating w/o the cache is a very degraded operation mode. """ See the full comment at https://

[SSSD] [sssd PR#5370][comment] nss: Use posix_fallocate() to alloc memcache file

2020-10-15 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5370 Title: #5370: nss: Use posix_fallocate() to alloc memcache file simo5 commented: """ > > > Another thing to consider is that posix_fallocate will fail for some file > > > systems, for example NFS. >

[SSSD] [sssd PR#5370][comment] nss: Use posix_fallocate() to alloc memcache file

2020-10-15 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5370 Title: #5370: nss: Use posix_fallocate() to alloc memcache file simo5 commented: """ > > I think you are correct that we cannot rely on the file appearing zero > > filled following a call to `posix_fallocate()`. There coul

[SSSD] [sssd PR#5356][comment] krb5_child: Harden credentials validation code

2020-10-07 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5356 Title: #5356: krb5_child: Harden credentials validation code simo5 commented: """ Sounds liek some tests failed due to infrastructure issues ... """ See the full comment at https://github.com/SSSD/sssd/pu

[SSSD] [sssd PR#5356][comment] krb5_child: Harden credentials validation code

2020-10-07 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5356 Title: #5356: krb5_child: Harden credentials validation code simo5 commented: """ > Hi, > > thanks for the patch, it looks good. I just wonder if it might be risky to > use the pretty generic macro `TRUE` which other li

[SSSD] [sssd PR#5356][opened] krb5_child: Harden credentials validation code

2020-10-07 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5356 Author: simo5 Title: #5356: krb5_child: Harden credentials validation code Action: opened PR body: """ The krb5_verify_init_creds() call is used to validate the credentials just obtained by trying to acquire a ticket from the

[SSSD] [sssd PR#5284][comment] Remove leftover ccache from SSH credentials delegation

2020-08-21 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5284 Title: #5284: Remove leftover ccache from SSH credentials delegation simo5 commented: """ @justin-stephenson first of all I'd like to thank you for this PR as it raised very interesting questions and aspects that evidently

[SSSD] [sssd PR#5284][comment] Remove leftover ccache from SSH credentials delegation

2020-08-20 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5284 Title: #5284: Remove leftover ccache from SSH credentials delegation simo5 commented: """ > > Maybe I am missing something but how do you distinguish between a ccache > > created by SSSD when user1@REALM logs into t

[SSSD] [sssd PR#5284][comment] Remove leftover ccache from SSH credentials delegation

2020-08-20 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5284 Title: #5284: Remove leftover ccache from SSH credentials delegation simo5 commented: """ A question also occurred to me, is there any concurrency issue with this process? What happens if two ssh connections are initiated simultaneou

[SSSD] [sssd PR#5284][comment] Remove leftover ccache from SSH credentials delegation

2020-08-20 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5284 Title: #5284: Remove leftover ccache from SSH credentials delegation simo5 commented: """ Maybe I am missing something but how do you distinguish between a ccache created by SSSD when user1@REALM logs into the console, from the ccache

[SSSD] [sssd PR#5284][comment] Remove leftover ccache from SSH credentials delegation

2020-08-20 Thread simo5
URL: https://github.com/SSSD/sssd/pull/5284 Title: #5284: Remove leftover ccache from SSH credentials delegation simo5 commented: """ not all tickets are created equally, so removing other ccaches may end up removing tickets that are different on purpose. for example a process

[SSSD] [sssd PR#837][comment] p11_child: make OCSP digest configurable

2020-08-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/837 Title: #837: p11_child: make OCSP digest configurable simo5 commented: """ > > Although it is true @dpward that SHA-1 is allowed, you need to read the > > fine print as well "for applications that do not r

[SSSD] [sssd PR#837][comment] p11_child: make OCSP digest configurable

2020-08-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/837 Title: #837: p11_child: make OCSP digest configurable simo5 commented: """ > > Although it is true @dpward that SHA-1 is allowed, you need to read the > > fine print as well "for applications that do not r

[SSSD] [sssd PR#837][comment] p11_child: make OCSP digest configurable

2020-08-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/837 Title: #837: p11_child: make OCSP digest configurable simo5 commented: """ @alexey-tikhonov if there is a compatibility issue, I would certainly allow SHA-1 to be used, but perhaps with an easier way to flip it off in future. Alth

[SSSD] [sssd PR#837][comment] p11_child: make OCSP digest configurable

2020-08-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/837 Title: #837: p11_child: make OCSP digest configurable simo5 commented: """ @alexey-tikhonov if there is a compatibility issue, I would certainly allow SHA-1 to be used, but perhaps with an easier way to flip it off in future. Alsth

[SSSD] [sssd PR#837][comment] p11_child: make OCSP digest configurable

2020-08-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/837 Title: #837: p11_child: make OCSP digest configurable simo5 commented: """ @alexey-tikhonov if there is a compatibility issue, I would certainly allow sah-1 to be used, but perhaps with an easier way to flip it off in future. Alsth

[SSSD] [sssd PR#854][comment] LDAP: Do not require START_TLS for loopback connections

2019-07-30 Thread simo5
URL: https://github.com/SSSD/sssd/pull/854 Title: #854: LDAP: Do not require START_TLS for loopback connections simo5 commented: """ @scabrero @jhrozek I see no discussion ensued, just to be clear I didn't give and didn't mean my messages to be a complete NACK on the

[SSSD] [sssd PR#854][comment] LDAP: Do not require START_TLS for loopback connections

2019-07-25 Thread simo5
URL: https://github.com/SSSD/sssd/pull/854 Title: #854: LDAP: Do not require START_TLS for loopback connections simo5 commented: """ @scabrero To be honest I would prefer to write a tool that simply generates a local certificate, adds it to the local machine trust store and

[SSSD] [sssd PR#854][comment] LDAP: Do not require START_TLS for loopback connections

2019-07-24 Thread simo5
URL: https://github.com/SSSD/sssd/pull/854 Title: #854: LDAP: Do not require START_TLS for loopback connections simo5 commented: """ ``` $ host localhost Host localhost not found: 3(NXDOMAIN) ``` :-) More seriously I would like to understand why this is needed (after all we a

[SSSD] [sssd PR#826][comment] util/crypto/libcrypto: changed sss_hmac_sha1()

2019-06-12 Thread simo5
URL: https://github.com/SSSD/sssd/pull/826 Title: #826: util/crypto/libcrypto: changed sss_hmac_sha1() simo5 commented: """ LGTM """ See the full comment at https://github.com/SSSD/sssd/pull/826#issuecomment-501428262 _

[SSSD] [sssd PR#813][comment] SDAP: allow GSS-SPNEGO for LDAP SASL bind as well

2019-05-13 Thread simo5
URL: https://github.com/SSSD/sssd/pull/813 Title: #813: SDAP: allow GSS-SPNEGO for LDAP SASL bind as well simo5 commented: """ We changed GSS-SPNEGO incompatibly at some point, and 2.1.27 may actually be that point. We did change it because it didn't work as it

[SSSD] [sssd PR#813][comment] SDAP: allow GSS-SPNEGO for LDAP SASL bind as well

2019-05-13 Thread simo5
URL: https://github.com/SSSD/sssd/pull/813 Title: #813: SDAP: allow GSS-SPNEGO for LDAP SASL bind as well simo5 commented: """ LGTM, would it make sense to have a followup where GSS-SPNEGO is made the default for the AD backend? GSS_SPNEGO is more efficient as it requires

[SSSD] [sssd PR#703][comment] nss: sssd returns '/' for emtpy home directories

2018-12-11 Thread simo5
URL: https://github.com/SSSD/sssd/pull/703 Title: #703: nss: sssd returns '/' for emtpy home directories simo5 commented: """ Thank @jhrozek this clears it! """ See the full comment at https://github.com/S

[SSSD] [sssd PR#703][comment] nss: sssd returns '/' for emtpy home directories

2018-12-11 Thread simo5
URL: https://github.com/SSSD/sssd/pull/703 Title: #703: nss: sssd returns '/' for emtpy home directories simo5 commented: """ Wait, does this mean it changes current behavior for AD domains ? """ See the full comment at https://github.com/S

[SSSD] [sssd PR#703][comment] nss: sssd returns '/' for emtpy home directories

2018-12-11 Thread simo5
URL: https://github.com/SSSD/sssd/pull/703 Title: #703: nss: sssd returns '/' for emtpy home directories simo5 commented: """ Or would it previously return "/" unconditionally ? """ See the full comment at https://gi

[SSSD] [sssd PR#703][comment] nss: sssd returns '/' for emtpy home directories

2018-12-04 Thread simo5
URL: https://github.com/SSSD/sssd/pull/703 Title: #703: nss: sssd returns '/' for emtpy home directories simo5 commented: """ On Tue, 2018-12-04 at 05:51 -0800, Jakub Hrozek wrote: > Then why not set a default value for fallback homedir? :-) Because that would overr

[SSSD] [sssd PR#703][comment] nss: sssd returns '/' for emtpy home directories

2018-12-04 Thread simo5
URL: https://github.com/SSSD/sssd/pull/703 Title: #703: nss: sssd returns '/' for emtpy home directories simo5 commented: """ On Tue, 2018-12-04 at 04:51 -0800, Jakub Hrozek wrote: > Thanks, this passes the test. And of course the patch is correct, > but after so

[SSSD] [sssd PR#703][comment] nss: sssd returns '/' for emtpy home directories

2018-12-03 Thread simo5
URL: https://github.com/SSSD/sssd/pull/703 Title: #703: nss: sssd returns '/' for emtpy home directories simo5 commented: """ @thalman those other cases are already handled in the call right above your change. So if those are handled homdir will arelady be "not n

[SSSD] [sssd PR#703][comment] nss: sssd returns '/' for emtpy home directories

2018-12-03 Thread simo5
URL: https://github.com/SSSD/sssd/pull/703 Title: #703: nss: sssd returns '/' for emtpy home directories simo5 commented: """ This should probably not be specific to the files provider. An empty home directory is a valid value and should be returned as is if the sou

[SSSD] [sssd PR#644][comment] When multiple UIDs exist, use the username provided by the user as the first lookup

2018-10-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/644 Title: #644: When multiple UIDs exist, use the username provided by the user as the first lookup simo5 commented: """ So if you want to address case (b) you will have to change the code so that it returns multiple uids (probably

[SSSD] [sssd PR#644][comment] When multiple UIDs exist, use the username provided by the user as the first lookup

2018-10-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/644 Title: #644: When multiple UIDs exist, use the username provided by the user as the first lookup simo5 commented: """ @joefischietti we can fixate a user name at login time in the cache but: a) that may be overidden by a later login i

[SSSD] [sssd PR#644][comment] When multiple UIDs exist, use the username provided by the user as the first lookup

2018-10-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/644 Title: #644: When multiple UIDs exist, use the username provided by the user as the first lookup simo5 commented: """ I am not talking about the LDAP attribute. I am saying in posix only one name is possible, so if you have a pa

[SSSD] [sssd PR#644][comment] When multiple UIDs exist, use the username provided by the user as the first lookup

2018-10-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/644 Title: #644: When multiple UIDs exist, use the username provided by the user as the first lookup simo5 commented: """ per posix uid *must* be unique, sorry to say your LDAP setup is simply violating standards and cannot be supported

[SSSD] [sssd PR#644][comment] When multiple UIDs exist, use the username provided by the user as the first lookup

2018-10-17 Thread simo5
URL: https://github.com/SSSD/sssd/pull/644 Title: #644: When multiple UIDs exist, use the username provided by the user as the first lookup simo5 commented: """ per posix uid *must* be unique, sorry to say your LDAP setup is simply violating standards and cannot be supported

[SSSD] [sssd PR#511][comment] Do not shutdown KCM/Secrets responders when activities are happening ...

2018-03-29 Thread simo5
URL: https://github.com/SSSD/sssd/pull/511 Title: #511: Do not shutdown KCM/Secrets responders when activities are happening ... simo5 commented: """ Ok moving to a different PR, definitely. As for keeping a list, the best thing would be to not have explicit book keeping (as

[SSSD] [sssd PR#511][comment] Do not shutdown KCM/Secrets responders when activities are happening ...

2018-03-29 Thread simo5
URL: https://github.com/SSSD/sssd/pull/511 Title: #511: Do not shutdown KCM/Secrets responders when activities are happening ... simo5 commented: """ Sorry for late comment, but should't you simply have a list of "inflight" calls and take that in consideratio

[SSSD] [sssd PR#530][comment] GPO: Add "thinlinc" to ad_gpo_map_remote_interactive

2018-03-12 Thread simo5
URL: https://github.com/SSSD/sssd/pull/530 Title: #530: GPO: Add "thinlinc" to ad_gpo_map_remote_interactive simo5 commented: """ No strong opinion beside bikeshedding on the name: ```domain/_defaults_``` :-) """ See the full comment at https://gi

[SSSD] [sssd PR#530][comment] GPO: Add "thinlinc" to ad_gpo_map_remote_interactive

2018-03-12 Thread simo5
URL: https://github.com/SSSD/sssd/pull/530 Title: #530: GPO: Add "thinlinc" to ad_gpo_map_remote_interactive simo5 commented: """ No strong opinion beside bikeshedding on the name: domain/_defaults_ :-) """ See the full comment at https://github.com/S

[SSSD] [sssd PR#530][comment] GPO: Add "thinlinc" to ad_gpo_map_remote_interactive

2018-03-09 Thread simo5
URL: https://github.com/SSSD/sssd/pull/530 Title: #530: GPO: Add "thinlinc" to ad_gpo_map_remote_interactive simo5 commented: """ The default should be a global option, not per domain. """ See the full comment at https://github.com/S

[SSSD] [sssd PR#530][comment] GPO: Add "thinlinc" to ad_gpo_map_remote_interactive

2018-03-09 Thread simo5
URL: https://github.com/SSSD/sssd/pull/530 Title: #530: GPO: Add "thinlinc" to ad_gpo_map_remote_interactive simo5 commented: """ We may think of a mechanism to add a comment or a file somewhere we can read, so that software can distribute their GPO mappings in their

[SSSD] [sssd PR#498][comment] DESKPROFILE: Do not require CAP_DAC_OVERRIDE

2018-02-15 Thread simo5
URL: https://github.com/SSSD/sssd/pull/498 Title: #498: DESKPROFILE: Do not require CAP_DAC_OVERRIDE simo5 commented: """ @fidencio fidencio I do not care for unprivileged mode when it makes things way harder then they ought to be. sssd can always make up a root account and esca

[SSSD] [sssd PR#498][comment] DESKPROFILE: Do not require CAP_DAC_OVERRIDE

2018-02-13 Thread simo5
URL: https://github.com/SSSD/sssd/pull/498 Title: #498: DESKPROFILE: Do not require CAP_DAC_OVERRIDE simo5 commented: """ I cannot set labels, but ACK """ See the full comment at https://github.com/SSSD/sssd/pull/498#issuecomment-365428458 __

[SSSD] [sssd PR#457][comment] ipa: Removal of umask(0) in selinux_child

2017-11-27 Thread simo5
URL: https://github.com/SSSD/sssd/pull/457 Title: #457: ipa: Removal of umask(0) in selinux_child simo5 commented: """ You need to detect we have the correct libsemanage and ifdef those out. In a few years (when RHEL6 goes away) we can remove the code entirely. Also add m

[SSSD] [sssd PR#457][comment] ipa: Removal of umask(0) in selinux_child

2017-11-22 Thread simo5
URL: https://github.com/SSSD/sssd/pull/457 Title: #457: ipa: Removal of umask(0) in selinux_child simo5 commented: """ Also if it works only with a specific version of a dependency we need a depndency check/enforcement. """ See the full comment at https:/

[SSSD] [sssd PR#457][comment] ipa: Removal of umask(0) in selinux_child

2017-11-22 Thread simo5
URL: https://github.com/SSSD/sssd/pull/457 Title: #457: ipa: Removal of umask(0) in selinux_child simo5 commented: """ I see nothing in the commit message that explains why this is needed. for a thing that changes a core security control I would really like a long and detai

[SSSD] [sssd PR#390][comment] NSS: Add option to disable memcache

2017-09-29 Thread simo5
URL: https://github.com/SSSD/sssd/pull/390 Title: #390: NSS: Add option to disable memcache simo5 commented: """ @mzidek-rh yes I think in some cases we may want a much larger group memcache than user memcache """ See the full comment at https://github.com/S

[SSSD] [sssd PR#390][comment] NSS: Add option to disable memcache

2017-09-29 Thread simo5
URL: https://github.com/SSSD/sssd/pull/390 Title: #390: NSS: Add option to disable memcache simo5 commented: """ @mzidek-rh yes I think in some cases we may want a much larger group memcache than user memcache """ See the full comment at https://github.com/S

[SSSD] [sssd PR#269][comment] Add support for ActiveDirectory's logonHours restrictions

2017-09-08 Thread simo5
URL: https://github.com/SSSD/sssd/pull/269 Title: #269: Add support for ActiveDirectory's logonHours restrictions simo5 commented: """ Nobody in their right mind should implement the legacy thing there is in AD, so it wouldn't be a bad thing to keep it in the AD provid

[SSSD] [sssd PR#225][comment] SECRETS: Apply separate quotas for cn=secrets and cn=kcm

2017-06-07 Thread simo5
URL: https://github.com/SSSD/sssd/pull/225 Title: #225: SECRETS: Apply separate quotas for cn=secrets and cn=kcm simo5 commented: """ Patches look good to me. I have to say I think we could make the quoate system *really* generic by using dynamic configuration handles to pair

[SSSD] [sssd PR#225][comment] SECRETS: Apply separate quotas for cn=secrets and cn=kcm

2017-06-01 Thread simo5
URL: https://github.com/SSSD/sssd/pull/225 Title: #225: SECRETS: Apply separate quotas for cn=secrets and cn=kcm simo5 commented: """ 1) I do not think we need to add explicitly a quota subsection, but if I do not want to set a quota, what values should I use ? 0 ? Why the def

[SSSD] [sssd PR#225][comment] SECRETS: Apply separate quotas for cn=secrets and cn=kcm

2017-05-30 Thread simo5
URL: https://github.com/SSSD/sssd/pull/225 Title: #225: SECRETS: Apply separate quotas for cn=secrets and cn=kcm simo5 commented: """ Yes we need to increase the size per secret, but this is why I am not sure having a maximum nu,be of secrets will scale well. If you set the new

[SSSD] [sssd PR#225][comment] SECRETS: Apply separate quotas for cn=secrets and cn=kcm

2017-05-29 Thread simo5
URL: https://github.com/SSSD/sssd/pull/225 Title: #225: SECRETS: Apply separate quotas for cn=secrets and cn=kcm simo5 commented: """ Interesting, why maximum number of secrets instead of maximum size ? """ See the full comment at https://github.com/SSSD/sssd/p

[SSSD] [sssd PR#193][comment] UTIL: Use max 15 characters for AD host UPN

2017-04-13 Thread simo5
URL: https://github.com/SSSD/sssd/pull/193 Title: #193: UTIL: Use max 15 characters for AD host UPN simo5 commented: """ For AD name$ should be the first you try, if there are more then one try them in series one after the other, but it is highly unlikely you have more than on

[SSSD] [sssd PR#193][comment] UTIL: Use max 15 characters for AD host UPN

2017-04-12 Thread simo5
URL: https://github.com/SSSD/sssd/pull/193 Title: #193: UTIL: Use max 15 characters for AD host UPN simo5 commented: """ Sorry to be Johhny come late, but I do not think you can simply truncate the hostname here. This function is used to search a principal from the keytab that

[SSSD] [sssd PR#231][comment] changing all talloc_get_type() with talloc_get_type_abort()

2017-04-10 Thread simo5
URL: https://github.com/SSSD/sssd/pull/231 Title: #231: changing all talloc_get_type() with talloc_get_type_abort() simo5 commented: """ So I can't really comment inline because there are too many lines in the patch but I grepped throught the code: I see: + void sss_tal

[SSSD] [sssd PR#231][comment] changing all talloc_get_type() with talloc_get_type_abort()

2017-04-10 Thread simo5
URL: https://github.com/SSSD/sssd/pull/231 Title: #231: changing all talloc_get_type() with talloc_get_type_abort() simo5 commented: """ Please also do not commit as root, but use a proper user/email setting, and if you can add the signed-off-by header. """

[SSSD] [sssd PR#225][comment] SECRETS: Apply separate quotas for cn=secrets and cn=kcm

2017-04-04 Thread simo5
URL: https://github.com/SSSD/sssd/pull/225 Title: #225: SECRETS: Apply separate quotas for cn=secrets and cn=kcm simo5 commented: """ We should probbaly have quotas per UID, or one user can DoS all others including root and services """ See the full comment at

[SSSD] [sssd PR#197][comment] KCM responder

2017-03-24 Thread simo5
URL: https://github.com/SSSD/sssd/pull/197 Title: #197: KCM responder simo5 commented: """ All looks good to go. """ See the full comment at https://github.com/SSSD/sssd/pull/197#issuecomment-289009240 ___ sssd-de

[SSSD] [sssd PR#144][comment] SSSD does not start if using only the local provider and services line is empty

2017-02-09 Thread simo5
URL: https://github.com/SSSD/sssd/pull/144 Title: #144: SSSD does not start if using only the local provider and services line is empty simo5 commented: """ FWIW, I do not see any risk in pushing this patch as it is, and adjusting the code in the files PR if it changes anythin

[SSSD] [sssd PR#107][comment] WATCHDOG: Avoid non async-signal-safe from the signal_handler

2016-12-13 Thread simo5
URL: https://github.com/SSSD/sssd/pull/107 Title: #107: WATCHDOG: Avoid non async-signal-safe from the signal_handler simo5 commented: """ On Tue, 2016-12-13 at 08:02 -0800, Jakub Hrozek wrote: > On Tue, Dec 13, 2016 at 07:06:58AM -0800, Simo Sorce wrote: > > On Tue, 2

[SSSD] [sssd PR#107][comment] WATCHDOG: Avoid non async-signal-safe from the signal_handler

2016-12-13 Thread simo5
URL: https://github.com/SSSD/sssd/pull/107 Title: #107: WATCHDOG: Avoid non async-signal-safe from the signal_handler simo5 commented: """ On Tue, 2016-12-13 at 05:59 -0800, Jakub Hrozek wrote: > On Tue, Dec 13, 2016 at 02:44:44AM -0800, Simo Sorce wrote: > > On Tue, 2

[SSSD] [sssd PR#107][comment] WATCHDOG: Avoid non async-signal-safe from the signal_handler

2016-12-13 Thread simo5
URL: https://github.com/SSSD/sssd/pull/107 Title: #107: WATCHDOG: Avoid non async-signal-safe from the signal_handler simo5 commented: """ On Tue, 2016-12-13 at 02:25 -0800, fidencio wrote: > Pavel, > > On Tue, Dec 13, 2016 at 11:20 AM, Pavel Březina > wrote: >

[SSSD] [sssd PR#107][comment] WATCHDOG: Avoid non async-signal-safe from the signal_handler

2016-12-12 Thread simo5
URL: https://github.com/SSSD/sssd/pull/107 Title: #107: WATCHDOG: Avoid non async-signal-safe from the signal_handler simo5 commented: """ well you could have a globalk variable for the watchdog and change it from a custom signal handler, but the point of the watchdog is to

[SSSD] [sssd PR#107][comment] WATCHDOG: Avoid non async-signal-safe from the signal_handler

2016-12-12 Thread simo5
URL: https://github.com/SSSD/sssd/pull/107 Title: #107: WATCHDOG: Avoid non async-signal-safe from the signal_handler simo5 commented: """ Yes we should ask, I think we really need to try to use monotonic clocks for most tasks. """ See the full comment at htt

[SSSD] [sssd PR#32][comment] Requesting a pull to SSSD:master from fidencio:wip/#3138

2016-09-28 Thread simo5
URL: https://github.com/SSSD/sssd/pull/32 Title: #32: Requesting a pull to SSSD:master from fidencio:wip/#3138 simo5 commented: """ The problem of using genconf is race conditions and the fact it won't be possible to call it again after the service is started. I am for addi