faaf7f483e
2.4.13 Update Change Date
2020-10-14 09:15:46 +03:00
babcda3eca
2.4.12 Update Change Date
2020-08-24 09:42:48 +03:00
fc9c9fcd77
2.4.11 Update change date
2020-07-07 10:01:38 +03:00
098ffde13c
Remove obsolete debug assert from PamAuth
...
Would be always hit in debug mode.
2020-06-05 19:04:44 +03:00
5ebae9be90
Merge branch '2.3' into 2.4
2020-06-05 09:36:24 +03:00
aa11c960b1
2.3.20 Update change date
2020-06-05 09:31:45 +03:00
d3d7054639
Merge branch '2.3' into 2.4
2020-04-24 16:09:20 +03:00
f527a8f2e6
2.3.19 Update Change Date
2020-04-23 14:23:57 +03:00
d0ab797938
Merge branch '2.3' into 2.4
2020-03-12 10:33:57 +02:00
e0cd6adb26
Update change date for 2.3.18
2020-03-10 10:45:47 +02:00
8b763fb88b
Merge branch '2.3' into 2.4
2020-02-12 08:27:48 +02:00
cfb3f79b54
Update 2.3.17 Change Date
2020-02-10 15:28:38 +02:00
a7e0142224
Merge branch '2.3' into 2.4
2020-01-15 11:29:37 +02:00
790d90f229
Update 2.3.16 Change Date
2020-01-15 11:08:51 +02:00
a9a2b753c0
Update 2.4.5 change date
2019-12-18 13:25:03 +02:00
f6731a898d
Update change date
2019-11-13 08:37:17 +02:00
fdfbf3e133
Update 2.4.3 change date
2019-11-05 12:21:00 +02:00
861e27eb00
Merge branch '2.3' into 2.4
2019-10-29 14:04:31 +02:00
df6c56e7ca
Update 2.3.13 Change Date
2019-10-29 12:51:31 +02:00
d0e18b165a
MXS-2544 Use separate sqlite tables for user authentication data
...
The data is now split into three tables similar to the server.
2019-07-16 10:59:15 +03:00
f752f139ba
MXS-2544 Add utility class for handling SQLite
...
Preparation and cleanup for adding more data to handle user roles in PAM
authenticator.
2019-07-16 10:58:47 +03:00
3b39d42d3b
Merge branch '2.3' into 2.4
2019-06-27 18:56:25 +03:00
d8790fa3e7
Merge branch '2.2' into 2.3
2019-06-27 14:20:42 +03:00
b4289224de
Avoid using SQLITE_OPEN_URI
...
Centos6 uses a very old version of SQLite without support for URI filenames.
PAM authenticator must use a file-based database.
2019-06-27 13:59:05 +03:00
0ba779d5a2
Update 2.4.0 Change Date
2019-06-25 10:11:55 +03:00
6625c1296b
Format authenticator and protocol modules
2019-05-10 10:31:12 +03:00
afe41c38ed
Merge branch '2.3' into develop
2019-02-20 10:33:14 +02:00
48a6ab503e
MXS-2292 PAM authenticator detects anonymous users with defined hosts
...
This allows anonymous user mapping from well-defined hosts.
2019-02-19 10:40:23 +02:00
684ec3288b
Rename and cleanup authenticator.h
2019-01-14 15:07:33 +02:00
a10b6c2e89
MXS-2196: Take Listener into use
2018-12-04 11:39:52 +02:00
39f668ff3c
MXS-2196: Rename SERV_LISTENER to Listener
2018-12-04 11:39:52 +02:00
d11c78ad80
Format all sources with Uncrustify
...
Formatted all sources and manually tuned some files to make the code look
neater.
2018-09-10 13:22:49 +03:00
c447e5cf15
Uncrustify maxscale
...
See script directory for method. The script to run in the top level
MaxScale directory is called maxscale-uncrustify.sh, which uses
another script, list-src, from the same directory (so you need to set
your PATH). The uncrustify version was 0.66.
2018-09-09 22:26:19 +03:00
cc0299aee6
Update change date of 2.3
2018-06-25 10:07:52 +03:00
eba6c0c596
MXS-1842 Compile all authenticators as C++
...
Minimal changes, only what is needed to compile.
2018-05-03 10:07:43 +03:00
04666b4b31
MXS-1716 Add diagnostic functions to PAM Authenticator
...
The functions print the user information. Normal version just prints
user@host, the json-version prints the whole array.
2018-03-19 11:02:14 +02:00
3936c71e11
Add missing includes
2017-09-19 15:46:13 +03:00
7ba0533cc8
Authenticator API extract-entrypoint returns bool
...
Extraction either succeeds or fails, it does not need to return
defined integer values.
2017-08-09 17:28:58 +03:00
7488129afc
PAM code cleanup & refactor
...
Divided functionality into classes, fixed comments +
various other cleanup. BackenAuth no longer increments
sequence on sending password. SQLite busy timeout shortened
to 1 second.
2017-08-07 12:22:59 +03:00
f916b74c2e
Add first version of PAM authenticator plugin
...
This includes the client and backend authenticators. Currently,
only a simple password-based scheme with the SQL-client "dialog" plugin
is supported. In this mode, the server sends the first PAM message
with the AuthSwitchRequest packet and the client responds with the
password. No further authentication messages are supported. If the
connection is not encrypted, the password is sent in plaintext. The
client password is used as is for logging in to backends.
2017-08-07 12:22:59 +03:00