-
Notifications
You must be signed in to change notification settings - Fork 256
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Initial support for IDM IDM Trust #7679
base: master
Are you sure you want to change the base?
Initial support for IDM IDM Trust #7679
Conversation
85a4fb8
to
1807596
Compare
1807596
to
4cae067
Compare
4cae067
to
9b4566d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. Nitpicking - You have broken indentation in many places. Maybe some of them are intentional. Please check it.
Thank you Tomas. Would you mind commenting in-line on a couple indentation areas that need to be fixed? I didn't go through every line but I scanned the PR again and couldn't find indentation issues. |
Sure, will do... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe that in some cases you broke the indentation on purpose for better readability. Feel free to resolve those conversations.
9b4566d
to
883ea98
Compare
Thank you for pointing out the indentation issues, I had missed several. They should be fixed now, I resolved each conversation for simplicity but feel free to check back to see if I missed anything. |
Hi @thalman @danlavu @sumit-bose Gentle reminder ping about reviewing this PR. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, please fix that one indentation.
883ea98
to
d0f3ec5
Compare
Thank you. The only reason to have different ranges is when both deployments have overlapping ID ranges themselves. I haven't fully defined this use case yet. Perhaps, we need to do an analysis of the exported ID ranges and force admins to make a chose if needed, but this will be part of the new trust-add logic. One-way trust can be established already. Perhaps you were thinking about a shared secret to establish trust? This can be done regardless of the direction of the trust. |
@justin-stephenson, wouldn't it make sense to update man pages? And also please add a detailed release note. |
Hi, without bye, |
Ah, I'll cross check this. It should not affect SSSD code, though. |
Yes, that's why I ACKed the current version. |
219146b
to
b495920
Compare
Done, added a new 'man' commit and release note to the |
b495920
to
f84faff
Compare
Similar to AD server/service discovery initialization, Allows callers to provide a service, and not just use "IPA"
IPA subdomain functions often include ad in the name, these functions will now handle IPA and AD subdomains, not only AD.
:feature:SSSD IPA provider now supports IPA subdomains, not only Active Directory. This IPA subdomain support will enable SSSD support of IPA-IPA Trust feature, the full usable feature coming in a later FreeIPA release. Trusted domain configuration options are specified in the 'sssd-ipa' man page.
After b3d7a4f we no longer use the 'upn' variable. During certain codepaths to ipa_s2n_save_objects() SYSDB_UPN is expected to be missing, so no need to check for it.
This gets executed when a one-way or two-way trust ipa is added. Rename this to avoid confusion.
SSSD goes offline in IPA trusted user look due to the IPA user private group: [ipa_get_ad_acct_ad_part_done] (0x0020): [RID#7] Cannot find a SID. In IPA-IPA trust, user private groups do not contain a SID. Lookup the equivalent user object of the same name in IPA and use this SID instead.
Don't fail when processing the IPA user private group retrieved from the IPA server in a trusted user lookup. It is expected this object will have no SID.
f84faff
to
48c14d3
Compare
Coverity says:
snapshot = 88491 But as far as I can tell, that's because this PR wasn't rebased on top of c36c320 |
This PR adds support for IDM subdomains, enabling IDM IDM Trust functionality in SSSD. These are building blocks in SSSD to incorporate the IDM IDM Trust feature. Note however that on the freeIPA side development is still ongoing, this means the entire IDM IDM Trust feature (freeIPA + SSSD) is not yet available, and full integration cannot be tested yet. Current testing is being done using COPR packages.