Commit graph

298 commits

Author SHA1 Message Date
Quanah Gibson-Mount
f6ad222e41 Happy New Year! 2020-01-09 16:50:21 +00:00
Ondřej Kuzník
1273a38eda ITS#8427 Set up TLS settings on each reconnection 2019-06-12 16:40:04 +02:00
Ondřej Kuzník
76df74dbea ITS#8731 Apply doc/devel/variadic_debug/07-shortcut.cocci 2019-02-15 16:51:53 +00:00
Ondřej Kuzník
97a310b312 ITS#8731 Apply doc/devel/variadic_debug/04-variadic.cocci 2019-02-15 16:51:53 +00:00
Howard Chu
765dfaf0e4 ITS#8963 use BIND timeout for start_tls
Since we only support it in conjunction with Bind anyway, not
as a standalone op
2019-01-31 23:37:03 +00:00
Quanah Gibson-Mount
b45a6a7dc7 Happy New Year! 2019-01-14 18:46:16 +00:00
Quanah Gibson-Mount
59e9ff6243 Happy New Year 2018-03-22 15:35:24 +00:00
Quanah Gibson-Mount
a9ff0e97fc ITS#6817 - back-meta work for SLAP_AUTH_DN was never finished according
to the ITS notes.  In addition, this would need man page updates for the
feature
2017-09-26 11:27:15 -07:00
Howard Chu
bb62d9cb73 ITS#8270 use the configured exop timeout for StartTLS
Also, there's no need for a retry loop here. Just wait for
the specified timeout or give up.
2017-08-31 16:53:45 +01:00
Howard Chu
451a9623f3 ITS#8576 Revert "LDAP_TAILQ fix"
This reverts commit 8ee8248328.
2017-02-01 11:58:54 +00:00
Quanah Gibson-Mount
1df85d3427 Happy New Year! 2017-01-03 12:36:47 -08:00
Quanah Gibson-Mount
6c4d6c880b Happy New Year! 2016-01-29 13:32:05 -06:00
Howard Chu
e5c778fa43 ITS#8173 fix SEGV after failed retry 2015-07-16 03:29:06 +01:00
Howard Chu
66ab6bafa8 ITS#8142 cleanup prev commit
Only drop connection if user originally bound to this backend,
and rebind-as-user was set. Sessions from other backends would
use idassert-bind so loss of creds doesn't affect them.
2015-05-21 01:20:16 +01:00
Howard Chu
117edd79ce ITS#8142 drop client connection on remote failure
also cleanup of return-code handling
2015-05-19 15:37:24 +01:00
Quanah Gibson-Mount
1705fa7e55 Happy New Year 2015-02-11 15:36:57 -06:00
Howard Chu
bc3dbcbde9 Minor cleanup (coverity) 2015-01-14 13:27:45 +00:00
Kurt Zeilenga
5c878c1bf2 Happy new year (belated) 2014-01-25 05:21:25 -08:00
Quanah Gibson-Mount
1a712bf18e Enable features that were hidden behind LDAP_DEVEL 2013-09-19 09:50:52 -07:00
Quanah Gibson-Mount
dd7b1c39b1 Clean up whitespace in previous commit 2013-01-24 11:31:41 -08:00
Ted C. Cheng
d836def019 added tcp keepalive support to back-ldap 2013-01-24 10:53:56 -08:00
Kurt Zeilenga
0fd1bf30b8 Happy New Year 2013-01-02 10:22:57 -08:00
Howard Chu
c1800082cc ITS#7403, #6296 fix AUTHZ_BACKEND handling
c_authz_cookie should only be set on explicit Bind requests.
2012-10-03 09:12:14 -07:00
Howard Chu
d7c964fedb ITS#7403 fix idassert non-override mode 2012-09-26 09:29:57 -07:00
Ondrej Kuznik
7c40b6e904 ITS#7182 Keep connection IDs for monitoring purposes. 2012-03-29 07:00:56 -07:00
Ondrej Kuznik
be9585d0ed ITS#7182 Maintain the operation counts.
Currently ldap_back_default_rebind cannot access the ldapinfo structure.
Being a configurable callback, not letting it monitor when a change
might be disruptive feels safer.
2012-03-27 04:28:37 -07:00
Kurt Zeilenga
2bbf9804b9 Happy New Year! 2012-01-01 07:10:53 -08:00
Howard Chu
111ecbdbed ITS#6851 replace assert with error msg 2011-11-17 17:35:10 -08:00
Howard Chu
ceefe132a8 ITS#6817 fix RE24 build breakage
Should SLAP_AUTH_DN be #defined in release now?
2011-06-21 17:05:53 -07:00
Pierangelo Masarati
821d2616b5 fix commit 1.268, related to ITS#6817 2011-03-05 10:30:21 +00:00
Pierangelo Masarati
5d9baf3e85 use (noncritical) whoami extop during SASL bind (ITS#6817) 2011-02-03 23:35:56 +00:00
Pierangelo Masarati
ddbcb565d4 use (noncritical) authzid control during SASL bind (ITS#6817) 2011-02-03 23:20:15 +00:00
Howard Chu
e72c093a55 ITS#6711 minimal tweaks for aclbind/idassertbind for privileged connection
in dobind_int().
2011-02-02 20:56:58 +00:00
Howard Chu
d626977848 Cleanup priv/idassert choice: check for configured bind method, not authcDN 2011-02-02 20:32:48 +00:00
Howard Chu
aec5adac17 ITS#6711 use idassert TLS conf for priv connection if aclbind not set 2011-02-02 20:06:28 +00:00
Howard Chu
d3b09ef2a9 ITS#5421 drop ldap-int.h 2011-01-19 21:27:16 +00:00
Kurt Zeilenga
966cef8c9a Happy New Year 2011-01-05 00:42:37 +00:00
Pierangelo Masarati
aa63f21e4f cleanup previous commit 2010-09-09 00:57:04 +00:00
Pierangelo Masarati
65b042b4fb if required by the bindconf configuration, force TLS (partially addresses ITS#6642) 2010-09-09 00:12:01 +00:00
Pierangelo Masarati
1242443553 don't risk leaving around client library error codes 2010-06-22 23:10:48 +00:00
Pierangelo Masarati
3a28608f0d allow successful binds to return control responses (ITS#6530) 2010-04-22 18:18:15 +00:00
Pierangelo Masarati
bbe7272c7f allow strict adherence to RFC4370 wrt/ control criticality (ITS#6523) 2010-04-14 21:37:03 +00:00
Kurt Zeilenga
3dadeb3efe happy belated New Year 2010-04-13 22:17:29 +00:00
Pierangelo Masarati
f75825881a honor X-ORDERED in olcDbIdAssertAuthzFrom; add olcDbIdAssertPassthru (ITS#6456); note: breaks binary compatibility with module back-meta.la 2010-04-09 22:47:55 +00:00
Pierangelo Masarati
1815ad4cb6 register authz cookie (ITS#6296) 2009-09-17 21:16:04 +00:00
Howard Chu
fffb1fab4e Include "lutil.h" - fixes warnings in RE24 2009-09-01 00:35:22 +00:00
Hallvard Furuseth
c0e0a64799 Silence warning (missing braces ininitializer) 2009-08-19 18:58:28 +00:00
Pierangelo Masarati
69878f43c8 refactor connection handling 2009-08-19 16:45:15 +00:00
Pierangelo Masarati
bdec7702d7 better logging of privileged connections (more to come; might be unstable for a bit) 2009-08-19 15:00:59 +00:00
Pierangelo Masarati
c39815ee28 don't deadlock when a TLS uri is not responding (ITS#6167) 2009-06-11 06:51:01 +00:00