[SSSD] [sssd PR#232][opened] sbus: check connection for NULL before unregister it

2017-04-11 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/232 Author: sumit-bose Title: #232: sbus: check connection for NULL before unregister it Action: opened PR body: """ There seem to be code paths where the data is a added to the hash before the connection is properly initialized, to

[SSSD] [sssd PR#234][comment] HBAC: Use memberof ASQ search instead of originalMemberOf

2017-04-12 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/234 Title: #234: HBAC: Use memberof ASQ search instead of originalMemberOf sumit-bose commented: """ I think the approach currently used in the patch is ok especially since the old code also used specific IPA knowledge to parse the DN.

[SSSD] [sssd PR#232][synchronized] sbus: check connection for NULL before unregister it

2017-04-12 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/232 Author: sumit-bose Title: #232: sbus: check connection for NULL before unregister it Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/232/head:pr232 git checkout pr232 From

[SSSD] [sssd PR#232][comment] sbus: check connection for NULL before unregister it

2017-04-12 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/232 Title: #232: sbus: check connection for NULL before unregister it sumit-bose commented: """ I fixed the typo. I'm not sure about > We should also set dbus.conn to NULL on places where we call > dbus_connection_close or dbu

[SSSD] [sssd PR#245][opened] ad: handle forest root not listed in ad_enabled_domains

2017-04-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/245 Author: sumit-bose Title: #245: ad: handle forest root not listed in ad_enabled_domains Action: opened PR body: """ Although users and groups from the forest root should be ignored SSSD will still try to get information about the fores

[SSSD] [sssd PR#251][opened] overrides: add certificates to mapped attribute

2017-04-27 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/251 Author: sumit-bose Title: #251: overrides: add certificates to mapped attribute Action: opened PR body: """ Certificates in overrides are explicitly used to map users to certificates, so we add them to SYSDB_USER_MAPPED_CERT as well.

[SSSD] [sssd PR#252][opened] PAM: check matching certificates from all domains

2017-04-27 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/252 Author: sumit-bose Title: #252: PAM: check matching certificates from all domains Action: opened PR body: """ Although the cache_req lookup found matching in multiple domains only the results from the first domain were used. With

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-03 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ Thank you, the patch improves the situation (no DBus error returned) and works reliable for the configured domain. But if I r

[SSSD] [sssd PR#257][comment] LDAP/AD: Do not fail in case rfc2307bis_nested_groups_recv() returns ENOENT

2017-05-03 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/257 Title: #257: LDAP/AD: Do not fail in case rfc2307bis_nested_groups_recv() returns ENOENT sumit-bose commented: """ ACK, ENOENT should not be treated as error here because it just indicates that there are no groups. """

[SSSD] [sssd PR#257][+Accepted] LDAP/AD: Do not fail in case rfc2307bis_nested_groups_recv() returns ENOENT

2017-05-03 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/257 Title: #257: LDAP/AD: Do not fail in case rfc2307bis_nested_groups_recv() returns ENOENT Label: +Accepted ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-04 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ Thank you, that patch is now working great for ListByName request. But it still fails for ListByCertificate. Can you change th

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-04 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ New version passes all my tests. Codewise I wonder if the 2 if-blocks in cache_req_process_input() can be combined in a singl

[SSSD] [sssd PR#252][comment] PAM: check matching certificates from all domains

2017-05-04 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/252 Title: #252: PAM: check matching certificates from all domains sumit-bose commented: """ Yes, it was confirmed that the patch solves the issue. """ See the full comment at https://github.com/SSSD/sssd/p

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-04 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ I think it should not only be called unconditionally. It should be called after startup before any request is processed to

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-04 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ As I said, if it is done at startup and for unknown domains then checking it additionally once an hour is fine. ""&

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-05 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ I would like to suggest an alternative solution for https://pagure.io/SSSD/sssd/issue/3387. Since all responders already sen

[SSSD] [sssd PR#262][comment] MAN: AD Provider GSSAPI clarification

2017-05-06 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/262 Title: #262: MAN: AD Provider GSSAPI clarification sumit-bose commented: """ ok to test """ See the full comment at https://github.com/SSSD/sssd/pull/262#issuecomment-299628708 _

[SSSD] [sssd PR#264][opened] sss_nss_getlistbycert: return results from multiple domains

2017-05-10 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/264 Author: sumit-bose Title: #264: sss_nss_getlistbycert: return results from multiple domains Action: opened PR body: """ Currently only the results from one domain were returned although all domains were searched and the results were

[SSSD] [sssd PR#264][comment] sss_nss_getlistbycert: return results from multiple domains

2017-05-10 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/264 Title: #264: sss_nss_getlistbycert: return results from multiple domains sumit-bose commented: """ Hi Pavel, thank you for the review. If you think the new names would help to understand to code better I'd like to ask you to ope

[SSSD] [sssd PR#264][synchronized] sss_nss_getlistbycert: return results from multiple domains

2017-05-10 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/264 Author: sumit-bose Title: #264: sss_nss_getlistbycert: return results from multiple domains Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/264/head:pr264 git checkout pr264

[SSSD] [sssd PR#264][comment] sss_nss_getlistbycert: return results from multiple domains

2017-05-10 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/264 Title: #264: sss_nss_getlistbycert: return results from multiple domains sumit-bose commented: """ The call was renamed in a recent commit to master. The new version should fix it. """ See the full comment at https:/

[SSSD] [sssd PR#266][comment] IPA: Fix the PAM error code that auth code expects to start migration

2017-05-10 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/266 Title: #266: IPA: Fix the PAM error code that auth code expects to start migration sumit-bose commented: """ While I have no doubt that this patch makes password migration work again I wonder if it wouldn't be better to fix the

[SSSD] [sssd PR#268][opened] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-05-11 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Author: sumit-bose Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT Action: opened PR body: """ This patchset got lost when I prepared the certificate mapping patch set. Applications like gdm with enabled Smartcard s

[SSSD] [sssd PR#268][comment] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-05-11 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT sumit-bose commented: """ >Is there a technical reason sssd cannot discover what to do without >allow_missing_name option to pam_sss? I'd prefer to avoid mo

[SSSD] [sssd PR#268][comment] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-05-11 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT sumit-bose commented: """ > Still, why you cannot make that decision without an option's help? Sorry, I > don't see a difference -- why by seeing a c

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-11 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ jfyi, I think my suggested patch is not the right solution either because it will delay the startup time especially when the sy

[SSSD] [sssd PR#271][opened] pam: properly support UPN logon names

2017-05-12 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/271 Author: sumit-bose Title: #271: pam: properly support UPN logon names Action: opened PR body: """ Many logon applications like /bin/login or sshd canonicalize the user name before they call pam_start() and hence the UPN is not see

[SSSD] [sssd PR#234][comment] HBAC: Use memberof ASQ search instead of originalMemberOf

2017-05-12 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/234 Title: #234: HBAC: Use memberof ASQ search instead of originalMemberOf sumit-bose commented: """ CI: http://sssd-ci.duckdns.org/logs/job/69/65/summary.html The rawhide issue is not related to this patch """ See the full

[SSSD] [sssd PR#272][comment] cache_req: Fix warning maybe-uninitialized

2017-05-15 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/272 Title: #272: cache_req: Fix warning maybe-uninitialized sumit-bose commented: """ While this patch will certainly fix the compiler warning I wonder if it wouldn't be better to call talloc_new() after req is set in 'req =

[SSSD] [sssd PR#273][+Changes requested] CACHE_REQ_SEARCH: Avoid using of unitialized value

2017-05-15 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/273 Title: #273: CACHE_REQ_SEARCH: Avoid using of unitialized value Label: +Changes requested ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lists

[SSSD] [sssd PR#273][comment] CACHE_REQ_SEARCH: Avoid using of unitialized value

2017-05-15 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/273 Title: #273: CACHE_REQ_SEARCH: Avoid using of unitialized value sumit-bose commented: """ With the patch I do not see the compiler warning and cache requests are still work. There is only the line about coverity in the commit mess

[SSSD] [sssd PR#273][+Accepted] CACHE_REQ_SEARCH: Avoid using of unitialized value

2017-05-15 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/273 Title: #273: CACHE_REQ_SEARCH: Avoid using of unitialized value Label: +Accepted ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lists.fedoraho

[SSSD] [sssd PR#273][comment] CACHE_REQ_SEARCH: Avoid using of unitialized value

2017-05-15 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/273 Title: #273: CACHE_REQ_SEARCH: Avoid using of unitialized value sumit-bose commented: """ ACK """ See the full comment at https://github.com/SSSD/sssd/pull/273#issuecomment-301474552

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-16 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ I withdraw my suggested patch. I think @fidencio's patch is the better fix. But I would like to ask you to in

[SSSD] [sssd PR#275][comment] Implement access verification by rhost using ldap_access_order rhost option

2017-05-16 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/275 Title: #275: Implement access verification by rhost using ldap_access_order rhost option sumit-bose commented: """ ok to test """ See the full comment at https://github.com/SSSD/sssd/p

[SSSD] [sssd PR#234][comment] HBAC: Use memberof ASQ search instead of originalMemberOf

2017-05-16 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/234 Title: #234: HBAC: Use memberof ASQ search instead of originalMemberOf sumit-bose commented: """ > I agree on the first part, but the second is not clear, sorry. The > ipa_groups_basedn is the group container, but the members[i]-&

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-17 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ > but there's on functional changes in the patch apart from the one suggested > by yourself

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-17 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ ah, sorry for the noise, there must have been an older version in my browser cache. """ See the full comment at

[SSSD] [sssd PR#259][comment] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-17 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders sumit-bose commented: """ I run a couple of tests with wildcard and certificate searches and all went well. So ACK from my side. @pbrezina, do you have

[SSSD] [sssd PR#259][+Accepted] RESPONDER: Also populate cr_domains when initializing the responders

2017-05-17 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/259 Title: #259: RESPONDER: Also populate cr_domains when initializing the responders Label: +Accepted ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-l

[SSSD] [sssd PR#270][comment] Subdomains direct integration

2017-05-19 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/270 Title: #270: Subdomains direct integration sumit-bose commented: """ retest this please """ See the full comment at https://github.com/SSSD/sssd/pull/270#issuecomment-302673988 _

[SSSD] [sssd PR#270][comment] Subdomains direct integration

2017-05-19 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/270 Title: #270: Subdomains direct integration sumit-bose commented: """ The patch looks good, Alexander's comments are included and I was able to properly overwrite the search bases for subdomains, so ACK. Before pushing you mig

[SSSD] [sssd PR#270][comment] Subdomains direct integration

2017-05-19 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/270 Title: #270: Subdomains direct integration sumit-bose commented: """ Since it is a fallback to the old default behavior I think a fallback is fine here. """ See the full comment at https://github.com/SSSD/sssd/p

[SSSD] [sssd PR#271][synchronized] pam: properly support UPN logon names

2017-05-22 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/271 Author: sumit-bose Title: #271: pam: properly support UPN logon names Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/271/head:pr271 git checkout pr271 From

[SSSD] [sssd PR#271][comment] pam: properly support UPN logon names

2017-05-22 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/271 Title: #271: pam: properly support UPN logon names sumit-bose commented: """ @fidencio found an issue with the patch while testing, cache_req_send() should not be called with the domain name to allow cache_req to properly split a fully

[SSSD] [sssd PR#234][comment] HBAC: Use memberof ASQ search instead of originalMemberOf

2017-05-23 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/234 Title: #234: HBAC: Use memberof ASQ search instead of originalMemberOf sumit-bose commented: """ CI: http://sssd-ci.duckdns.org/logs/job/69/94/summary.html """ See the full comment at https://github.com/SSSD/sssd/p

[SSSD] [sssd PR#281][opened] ldap: handle certmap errors gracefully

2017-05-23 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/281 Author: sumit-bose Title: #281: ldap: handle certmap errors gracefully Action: opened PR body: """ Currently the LDAP user lookup request errors out if e.g. there is no matching rule for a certificate. This might cause the relat

[SSSD] [sssd PR#282][opened] ipa: filter IPA users from extdom lookups by certificate

2017-05-23 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/282 Author: sumit-bose Title: #282: ipa: filter IPA users from extdom lookups by certificate Action: opened PR body: """ The extdom lookup by certificate will return the names of all matching users, both from the IPA and trusted domains

[SSSD] [sssd PR#281][comment] ldap: handle certmap errors gracefully

2017-05-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/281 Title: #281: ldap: handle certmap errors gracefully sumit-bose commented: """ Good point, I'll enhance the patch """ See the full comment at https://github.com/SSSD/s

[SSSD] [sssd PR#284][opened] krb5: accept changed principal if krb5_canonicalize=True

2017-05-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/284 Author: sumit-bose Title: #284: krb5: accept changed principal if krb5_canonicalize=True Action: opened PR body: """ Currently SSSD accepts significant changes in the principal only if krb5_use_enterprise_principal=True. But canonicali

[SSSD] [sssd PR#234][comment] HBAC: Use memberof ASQ search instead of originalMemberOf

2017-05-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/234 Title: #234: HBAC: Use memberof ASQ search instead of originalMemberOf sumit-bose commented: """ All my comments are covered, CI passed and the patch worked well in my testing, so ACK. I do not understand either why Coverity c

[SSSD] [sssd PR#234][-Changes requested] HBAC: Use memberof ASQ search instead of originalMemberOf

2017-05-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/234 Title: #234: HBAC: Use memberof ASQ search instead of originalMemberOf Label: -Changes requested ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le..

[SSSD] [sssd PR#234][+Accepted] HBAC: Use memberof ASQ search instead of originalMemberOf

2017-05-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/234 Title: #234: HBAC: Use memberof ASQ search instead of originalMemberOf Label: +Accepted ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lists.f

[SSSD] [sssd PR#281][synchronized] ldap: handle certmap errors gracefully

2017-05-26 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/281 Author: sumit-bose Title: #281: ldap: handle certmap errors gracefully Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/281/head:pr281 git checkout pr281 From

[SSSD] [sssd PR#281][-Changes requested] ldap: handle certmap errors gracefully

2017-05-26 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/281 Title: #281: ldap: handle certmap errors gracefully Label: -Changes requested ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lists.fedorahoste

[SSSD] [sssd PR#268][synchronized] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-05-26 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Author: sumit-bose Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/268/head:pr268 git checkout pr268 From

[SSSD] [sssd PR#268][-Changes requested] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-05-26 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT Label: -Changes requested ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lis

[SSSD] [sssd PR#268][comment] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-05-26 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT sumit-bose commented: """ Rebased to current master which made the last patch obsolete. """ See the full comment at https://github.com/SSSD/sssd/p

[SSSD] Re: Changes to default ccache in krb5.conf

2017-05-31 Thread Sumit Bose
On Wed, May 31, 2017 at 10:31:38AM +0200, Lukas Slebodnik wrote: > ehlo, > > I had a discussion with QEs and realized that sssd need to be restarted > if default_ccache_name is changed in krb5 configuration files. > > The reason is that we cache the value but do not refresh it. > https://pagure.i

[SSSD] [sssd PR#268][synchronized] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-05-31 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Author: sumit-bose Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/268/head:pr268 git checkout pr268 From

[SSSD] [sssd PR#268][comment] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-06-01 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT sumit-bose commented: """ Yes, I think this is unrelated. I assume you just set the password as admin but did not use it as the user. In this case the password is expi

[SSSD] [sssd PR#268][comment] pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT

2017-06-01 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/268 Title: #268: pam_sss: add support for SSS_PAM_CERT_INFO_WITH_HINT sumit-bose commented: """ jfyi, I opend https://pagure.io/SSSD/sssd/issue/3419 to track the issue with the expired password. """ See the full comment at

[SSSD] [sssd PR#297][opened] IPA: Fix the PAM error code that auth code expects to start migration

2017-06-02 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/297 Author: sumit-bose Title: #297: IPA: Fix the PAM error code that auth code expects to start migration Action: opened PR body: """ Recent patches which adds support for PKINIT in krb5_child changed a return code which is used to indi

[SSSD] [sssd PR#302][opened] krb5: disable enterprise principals during password changes

2017-06-08 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/302 Author: sumit-bose Title: #302: krb5: disable enterprise principals during password changes Action: opened PR body: """ Currently using enterprise principals during password changes does not work reliable. First there is a spec

[SSSD] [sssd PR#299][comment] pam_sss: Fix leaking of memory in case of failures

2017-06-08 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/299 Title: #299: pam_sss: Fix leaking of memory in case of failures sumit-bose commented: """ Patch looks good and is needed. ACK from my side, @fidencio are your concerns taken care of? """ See the full comment at https:/

[SSSD] [sssd PR#315][opened] tests: update expired certificate

2017-06-26 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/315 Author: sumit-bose Title: #315: tests: update expired certificate Action: opened PR body: """ This is a short term fix to un-break the unit tests. The proper fix would be to create the certificates at runtime during the tests. R

[SSSD] [sssd PR#265][comment] Test for issue #3391 (sss_override doesn't work with files provider)

2017-07-06 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/265 Title: #265: Test for issue #3391 (sss_override doesn't work with files provider) sumit-bose commented: """ The test looks good and passes with my patches after the change mentioned above. I wonder if for completeness you'

[SSSD] [sssd PR#317][opened] Make sure overrides work with files provider

2017-07-06 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/317 Author: sumit-bose Title: #317: Make sure overrides work with files provider Action: opened PR body: """ There are two issues with overrides and the files provider. First since there is not backend to call the domain object is not r

[SSSD] [sssd PR#265][comment] Test for issue #3391 (sss_override doesn't work with files provider)

2017-07-06 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/265 Title: #265: Test for issue #3391 (sss_override doesn't work with files provider) sumit-bose commented: """ Patches for the issue itself can be found at https://github.com/SSSD/sssd/pull/317. """ See the full

[SSSD] [sssd PR#318][opened] libwbclient-sssd: update interface to version 0.14

2017-07-07 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/318 Author: sumit-bose Title: #318: libwbclient-sssd: update interface to version 0.14 Action: opened PR body: """ The main change is a new member of the wbcAuthErrorInfo struct. """ To pull the PR as Git branch: git remote

[SSSD] [sssd PR#317][synchronized] Make sure overrides work with files provider

2017-07-10 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/317 Author: sumit-bose Title: #317: Make sure overrides work with files provider Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/317/head:pr317 git checkout pr317 From

[SSSD] [sssd PR#317][-Changes requested] Make sure overrides work with files provider

2017-07-10 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/317 Title: #317: Make sure overrides work with files provider Label: -Changes requested ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lists.fedor

[SSSD] [sssd PR#317][comment] Make sure overrides work with files provider

2017-07-10 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/317 Title: #317: Make sure overrides work with files provider sumit-bose commented: """ Patches are updated and should cover all your comments. """ See the full comment at https://github.com/SSSD/sssd/p

[SSSD] [sssd PR#265][comment] Test for issue #3391 (sss_override doesn't work with files provider)

2017-07-11 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/265 Title: #265: Test for issue #3391 (sss_override doesn't work with files provider) sumit-bose commented: """ If I apply the patch on top of #317 the tests pass: test_files_provider.py::test_user_overriden PASSED te

[SSSD] [sssd PR#265][+Accepted] Test for issue #3391 (sss_override doesn't work with files provider)

2017-07-12 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/265 Title: #265: Test for issue #3391 (sss_override doesn't work with files provider) Label: +Accepted ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-l

[SSSD] [sssd PR#321][opened] certmap: add OpenSSL implementation

2017-07-12 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/321 Author: sumit-bose Title: #321: certmap: add OpenSSL implementation Action: opened PR body: """ The OpenSSL 1.1 API is used but there is a short macro block which should added the needed compatibility if and older OpenSSL version is us

[SSSD] [sssd PR#324][comment] MAN: Improve description of 'trusted domain section' in sssd.conf's man page

2017-07-17 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/324 Title: #324: MAN: Improve description of 'trusted domain section' in sssd.conf's man page sumit-bose commented: """ ok to test """ See the full comment at https://github.

[SSSD] [sssd PR#330][opened] ad_account_can_shortcut: shortcut if ID is unknown

2017-07-20 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/330 Author: sumit-bose Title: #330: ad_account_can_shortcut: shortcut if ID is unknown Action: opened PR body: """ If sss_idmap_unix_to_sid() returns an error we can assume that the given POSIX ID is not from the current domain and can b

[SSSD] [sssd PR#330][comment] ad_account_can_shortcut: shortcut if ID is unknown

2017-07-21 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/330 Title: #330: ad_account_can_shortcut: shortcut if ID is unknown sumit-bose commented: """ The idmap part of not needed in 1.15.3. If we decide we want the shortcut patch in 1.15.3 I can drop the idmap part from this PR and create anothe

[SSSD] [sssd PR#332][opened] sydb: index improvements

2017-07-21 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/332 Author: sumit-bose Title: #332: sydb: index improvements Action: opened PR body: """ This patch first adds some missing attributes to the index. The most important one here is 'ghost' which is used in the backed during gro

[SSSD] [sssd PR#330][comment] ad_account_can_shortcut: shortcut if ID is unknown

2017-07-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/330 Title: #330: ad_account_can_shortcut: shortcut if ID is unknown sumit-bose commented: """ Maybe, but I guess it is more a side effect so that the issue is already seen in ad_account_can_shortcut(). My feeling is that it is more

[SSSD] [sssd PR#330][synchronized] ad_account_can_shortcut: shortcut if ID is unknown

2017-07-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/330 Author: sumit-bose Title: #330: ad_account_can_shortcut: shortcut if ID is unknown Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/330/head:pr330 git checkout pr330 From

[SSSD] [sssd PR#330][comment] ad_account_can_shortcut: shortcut if ID is unknown

2017-07-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/330 Title: #330: ad_account_can_shortcut: shortcut if ID is unknown sumit-bose commented: """ I pushed a new version without the idmap patch. Since Lukas is right that have to increase the revision of the idmap library I'd prefer

[SSSD] [sssd PR#336][opened] idmap_error_string: add missing descriptions

2017-07-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/336 Author: sumit-bose Title: #336: idmap_error_string: add missing descriptions Action: opened PR body: """ Related to https://fedorahosted.org/sssd/ticket/1960 Related to https://fedorahosted.org/sssd/ticket/1938 Related to https://f

[SSSD] [sssd PR#330][comment] ad_account_can_shortcut: shortcut if ID is unknown

2017-07-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/330 Title: #330: ad_account_can_shortcut: shortcut if ID is unknown sumit-bose commented: """ The idmap patch can now be found in https://github.com/SSSD/sssd/pull/336 . """ See the full comment at https://github.com/S

[SSSD] Re: debugging adcli info - short name not returned

2017-08-22 Thread Sumit Bose
On Wed, Aug 02, 2017 at 09:44:41AM +0200, Jakub Hrozek wrote: > On Tue, Aug 01, 2017 at 06:52:41PM -, smfre...@gmail.com wrote: > > In one of our test domains, we noticed that the short name of the domain > > was not being returned by "adcli info" (it is visible in the output of "net > > rpc

[SSSD] [sssd PR#353][comment] libwbclient: Change return code for wbcAuthenticateUserEx

2017-08-22 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/353 Title: #353: libwbclient: Change return code for wbcAuthenticateUserEx sumit-bose commented: """ @lslebodn, thank you for taking case of this. For this PR is it a plain ACK from me. Imo #351 is fine as well but I would prefer the hear i

[SSSD] [sssd PR#353][+Accepted] libwbclient: Change return code for wbcAuthenticateUserEx

2017-08-22 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/353 Title: #353: libwbclient: Change return code for wbcAuthenticateUserEx Label: +Accepted ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lists.f

[SSSD] [sssd PR#354][comment] libwbclient: Fix warning statement with no effect

2017-08-22 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/354 Title: #354: libwbclient: Fix warning statement with no effect sumit-bose commented: """ oops, I'm sorry for not catching this, so I put a postit to my monitor reminding me to really run a build with even the simplest looking chang

[SSSD] [sssd PR#354][comment] libwbclient: Fix warning statement with no effect

2017-08-22 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/354 Title: #354: libwbclient: Fix warning statement with no effect sumit-bose commented: """ ACK """ See the full comment at https://github.com/SSSD/sssd/pull/354#issuecomment-324065118

[SSSD] [sssd PR#354][+Accepted] libwbclient: Fix warning statement with no effect

2017-08-22 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/354 Title: #354: libwbclient: Fix warning statement with no effect Label: +Accepted ___ sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org To unsubscribe send an email to sssd-devel-le...@lists.fedorahos

[SSSD] [sssd PR#355][opened] localauth plugin: change return code of sss_an2ln

2017-08-23 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/355 Author: sumit-bose Title: #355: localauth plugin: change return code of sss_an2ln Action: opened PR body: """ It is expected that the an2ln plugin function returns KRB5_LNAME_NOTRANS to indicate that no mapping can be determined

[SSSD] [sssd PR#321][comment] certmap: add OpenSSL implementation

2017-08-24 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/321 Title: #321: certmap: add OpenSSL implementation sumit-bose commented: """ @fidencio, building with libcrypto and running make check @lslebodn, no, I think there is none, would you mind to open one and assign it to me? ""&

[SSSD] [sssd PR#321][synchronized] certmap: add OpenSSL implementation

2017-08-28 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/321 Author: sumit-bose Title: #321: certmap: add OpenSSL implementation Action: synchronized To pull the PR as Git branch: git remote add ghsssd https://github.com/SSSD/sssd git fetch ghsssd pull/321/head:pr321 git checkout pr321 From

[SSSD] [sssd PR#321][comment] certmap: add OpenSSL implementation

2017-08-28 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/321 Title: #321: certmap: add OpenSSL implementation sumit-bose commented: """ Thank you for the review, I addressed all your comments. About the tickets, the validation is currently done in two places, the ssh responder and p11_child. S

[SSSD] [sssd PR#362][opened] IPA: format fixes

2017-08-29 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/362 Author: sumit-bose Title: #362: IPA: format fixes Action: opened PR body: """ There are format warnings when compiling on 32bit. One is about time_t where I added SPRItime and the other is about size_t where %zu should be used. R

[SSSD] [sssd PR#362][comment] IPA: format fixes

2017-08-29 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/362 Title: #362: IPA: format fixes sumit-bose commented: """ @lslebodn, for clarification, do you prefer to define SPRItime to 'ld' or use '%ld' directly in the format template? """ See the full

[SSSD] Re: stuck with ticket #3465

2017-08-30 Thread Sumit Bose
On Wed, Aug 30, 2017 at 05:30:02PM +0200, Jakub Hrozek wrote: > Hi, > > I'm afraid I got a little stuck looking into upstream ticket > https://pagure.io/SSSD/sssd/issue/3465 > > The reporter is seeing sssd memory usage increasing on RHEL-6 and > RHEL-7. There is a valgrind log from RHEL-6 attache

[SSSD] [sssd PR#664][comment] pep8: Ignore W504 and W605 to silence warnings on Debian

2018-10-02 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/664 Title: #664: pep8: Ignore W504 and W605 to silence warnings on Debian sumit-bose commented: """ About W504, if I understand it correctly there is no final agreement about the line break and binary operators in pep8, so there is W504 fo

[SSSD] [sssd PR#665][opened] p11: handle multiple certs during auth with OpenSSL

2018-10-02 Thread sumit-bose
URL: https://github.com/SSSD/sssd/pull/665 Author: sumit-bose Title: #665: p11: handle multiple certs during auth with OpenSSL Action: opened PR body: """ This patch adds missing code already available in the NSS version to select a certificate for authentication if multiple c

<    5   6   7   8   9   10   11   12   13   14   >