URL: https://github.com/SSSD/sssd/pull/841
Author: thalman
Title: #841: DEBUG: Add debug to display ldapsearch requests
Action: opened
PR body:
"""
The existing debug output from SSSD is quite helpful in this respect,
but it would be better if a small enhancement were made so that for a
specific debug level SSSD would print out all the details of the
LDAP search it is doing, ie the LDAP server, the base dn,
the scope, filter and attributes requested.
Server address is already in the log nowadays so this change
writes missing search scope. Also received attributes are logged
with SSSDBG_TRACE_LIBS debug level.
Resolves:
https://bugzilla.redhat.com/show_bug.cgi?id=1542137
"""
To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd pull/841/head:pr841
git checkout pr841
URL: https://github.com/SSSD/sssd/pull/558
Author: jhrozek
Title: #558: WIP: Add a test for sss_nss_getgrouplist_timeout and fix invalidating the initgroups cache
Action: opened
PR body:
"""
This is a WIP on adding tests for the sss_nss_ex interface. I covered only the sss_nss_getgrouplist_timeout function so far.
I'm submitting the PR already in this state to get some feedback if this
coverage is enough and the other functions can be covered similarly or
if there is some issue with this approach.
Also, I found a bug in invalidating the initgroups memory cache, that's
the first of the two patches. Here I'm really not sure if the fix is even
how the issue should be fixed, so I just hacked something up, even without
allocation checks etc.
"""
To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd pull/558/head:pr558
git checkout pr558
URL: https://github.com/SSSD/sssd/pull/854
Author: scabrero
Title: #854: LDAP: Do not require START_TLS for loopback connections
Action: opened
PR body:
"""
If the ldap uri is resolved to a loopback address then do not require
START_TLS.
Signed-off-by: Samuel Cabrero <scabrero(a)suse.de>
"""
To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd pull/854/head:pr854
git checkout pr854
URL: https://github.com/SSSD/sssd/pull/390
Author: mzidek-rh
Title: #390: NSS: Add option to disable memcache
Action: opened
PR body:
"""
Added option use_memcache to centrally disable memcache
for all clients without the need to specify SSS_NSS_USE_MEMCACHE=NO
environment variable.
Resolves:
https://pagure.io/SSSD/sssd/issue/3496
"""
To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd pull/390/head:pr390
git checkout pr390
URL: https://github.com/SSSD/sssd/pull/851
Author: alexal
Title: #851: Update __init__.py.in
Action: opened
PR body:
"""
COMPONENT: SSSDConfig
The default value for sudo_provider, auth_provider, and autofs_provider will be the value of id_provider, if those options weren't set in the configuration file
Resolves:
https://pagure.io/SSSD/sssd/issue/3995
"""
To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd pull/851/head:pr851
git checkout pr851
URL: https://github.com/SSSD/sssd/pull/858
Author: pbrezina
Title: #858: ldap: do not store empty attribute with ldap_rfc2307_fallback_to_local_users = true
Action: opened
PR body:
"""
This caused an error when saving local user as a fallback:
```
[sdap_save_user] (0x0400): Storing info for user testuser(a)ldap.vm
[sysdb_ldb_msg_difference] (0x2000): Added attr [gecos] to entry [name=testuser(a)ldap.vm,cn=users,cn=ldap.vm,cn=sysdb]
[sysdb_set_cache_entry_attr] (0x0080): ldb_modify failed: [Invalid attribute syntax](21)[Element gecos has empty attribute in ldb message (name=testuser(a)ldap.vm,cn=users,cn=ldap.vm,cn=sysdb)
[sysdb_set_cache_entry_attr] (0x0040): Error: 22 (Invalid argument)
[sysdb_set_entry_attr] (0x0080): Cannot set attrs for name=testuser(a)ldap.vm,cn=users,cn=ldap.vm,cn=sysdb, 22 [Invalid argument]
[sysdb_store_user] (0x0040): Cache update failed: 22
[sysdb_store_user] (0x0400): Error: 22 (Invalid argument)
[sdap_save_user] (0x0020): Failed to save user [testuser(a)ldap.vm]
```
Steps to reproduce:
1. create local user `testuser`
2. add it to LDAP group memberUid
3. set `passwd: sss files`, `group: sss files` (sss must be before files)
4. set enable_files_domain = false and ldap_rfc2307_fallback_to_local_users = true
5. run sssd
6. id testuser
-> it does not contain the LDAP group without the patch
Resolves:
https://pagure.io/SSSD/sssd/issue/4013
Note: this fix only the case when the nsswitch order is `sss files` but no files domain is available.
"""
To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd pull/858/head:pr858
git checkout pr858
URL: https://github.com/SSSD/sssd/pull/864
Author: scabrero
Title: #864: Monitor resolv.conf symlink
Action: opened
PR body:
"""
If resolv.conf is a symlink and sssd starts before getting an address from dhcp the data provider will remain forever offline, as the watched parent directory is the directory containing the symlink.
"""
To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd pull/864/head:pr864
git checkout pr864