RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 894066 - [RFE] support autoconfiguring SUDO with ipa provider and compat tree
Summary: [RFE] support autoconfiguring SUDO with ipa provider and compat tree
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: sssd
Version: 7.0
Hardware: Unspecified
OS: Unspecified
medium
unspecified
Target Milestone: rc
: ---
Assignee: Jakub Hrozek
QA Contact: Kaushik Banerjee
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-01-10 16:04 UTC by Jakub Hrozek
Modified: 2020-05-02 17:12 UTC (History)
5 users (show)

Fixed In Version: sssd-1.10.0-10.el7.beta2
Doc Type: Enhancement
Doc Text:
Feature: It is now possible to configure sudo integration on an IPA clients with a single-line option "sudo_provider=ipa" Reason: Previously, only "sudo_provider=ldap" was supported. The administrator was required to configure all the low-level details of the LDAP connection herself. Result (if any): The IPA client sudo integration is streamlined into setting a single option.
Clone Of:
Environment:
Last Closed: 2014-06-13 12:57:24 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github SSSD sssd issues 2775 0 None None None 2020-05-02 17:12:23 UTC

Description Jakub Hrozek 2013-01-10 16:04:41 UTC
This bug is created as a clone of upstream ticket:
https://fedorahosted.org/sssd/ticket/1733

If there will be no time for #1108, we can at least support compat tree and autoconfigure it in IPA provider.

Comment 1 Jakub Hrozek 2013-10-04 13:24:35 UTC
Temporarily moving bugs to MODIFIED to work around errata tool bug

Comment 3 Kaleem 2014-01-23 14:22:31 UTC
Are following steps enough to verify this bug?

1. Run ipa-client-install

2. Add following line in /etc/nsswitch.conf

   sudoers:  files sss

3. Add sudo in service section of sssd.conf 

   services = nss, pam, ssh, sudo

am i supposed to add any other thing in sssd.conf to fetch sudo rules from IPA master?

Comment 4 Jakub Hrozek 2014-01-23 16:21:39 UTC
That should be it. The sudo provider should already default to IPA IIRC.

Comment 5 Kaleem 2014-01-30 11:51:03 UTC
Verified.

This is automated and part of configuration setting for test cases in following ipa-sudo test plan

https://tcms.engineering.redhat.com/plan/9278/ipa-cli-sudo-70#testcases

Beaker job link - https://beaker.engineering.redhat.com/jobs/585555

Snippet from automation log:
============================
+-----------[RPMs & OS: [RedHat - x86_64]-----------------+
|       ipa-admintools-3.3.3-15.el7.x86_64
|       ipa-client-3.3.3-15.el7.x86_64
|       ipa-server-3.3.3-15.el7.x86_64
|       sssd-ipa-1.11.2-29.el7.x86_64
----------------------------------------------------------

+-------------------------------------------------------------+
:: [   PASS   ]   Setup for sudo functional tests
:: [   PASS   ]   sudorule-add-allow-command_func001: Allowed commands available from sudo client
:: [   PASS   ]   sudorule-add-allow-commandgrp_func001: Add command groups available for sudo client
:: [   PASS   ]   sudorule-remove-allow-command_func001: Remove commands available from sudo client
:: [   PASS   ]   sudorule-remove-allow-commandgrp_func001: Remove command groups available from sudo client
:: [   PASS   ]   sudorule-add-deny-command_func001: Deny commands available for sudo client
:: [   PASS   ]   sudorule-remove-deny-command_func001: Deny commands removed from sudo client
:: [   PASS   ]   sudorule-add-deny-commandgrp_func001: Deny command groups available for sudo client
:: [   PASS   ]   sudorule-remove-deny-commandgrp_func001: Remove denied command groups from sudo client
:: [   PASS   ]   sudorule-add-hostgrp_func001: Adding hostgroup and verifying from sudo client.
:: [   PASS   ]   sudorule-remove-hostgrp_func001: Removing hostgroup and verifying from sudo client.
:: [   PASS   ]   sudorule-add-option_func003: Adding sudo option !authenticate and verifying from sudo client.
:: [   PASS   ]   sudorule-remove-option_func003: Removing sudo option !authenticate and verifying from sudo client.
:: [   PASS   ]   sudorule-add-runasuser_func001: Adding RunAs user and verifying from sudo client.
:: [   PASS   ]   sudorule-remove-runasuser_func001: Removing RunAs user and verifying from sudo client.
:: [   PASS   ]   sudorule-add-runasuser_func002: Adding RunAs group and verifying from sudo client.
:: [   PASS   ]   sudorule-remove-runasuser_func002: Removing RunAs group and verifying from sudo client.
:: [   PASS   ]   sudorule-add-runasuser_func003: Adding comma-separated list of RunAs user and verifying from sudo client.
:: [   PASS   ]   sudorule-remove-runasuser_func003: Removing comma-separated list of RunAs user and verifying from sudo client.
:: [   PASS   ]   sudorule-add-runasuser_func004: Adding comma-separated list of RunAs group and verifying from sudo client.
:: [   PASS   ]   sudorule-remove-runasuser_func004: Removing comma-separated list of RunAs group and verifying from sudo client.
:: [   PASS   ]   Bug 719009: sudorule-add-runasuser does not match valid users when --users=ALL. 
:: [   PASS   ]   sudorule-add-runasgroup_func001: Adding RunAs group and verifying from sudo client.
:: [   PASS   ]   sudorule-disable_func001: Disabling sudorule and verifying from sudo client.
:: [   PASS   ]   sudorule-enable_func001: Enabling sudorule and verifying from sudo client.
:: [   PASS   ]   sudo func cleanup
:: [   PASS   ]   Bug 711786: sudorunasgroup automatically picks up incorrect value while adding a sudorunasuser.
:: [   PASS   ]   bz 710601: ipa sudorule-add accepts blank spaces as sudorule name.
:: [   PASS   ]   bz 710598: ipa sudocmdgroup-add accepts blank spaces as sudocmdgroup name.
:: [   PASS   ]   bz 710592: ipa sudocmd-add accepts blank spaces as sudo commands.
:: [   PASS   ]   bz 710245: Removed option from Sudo rule message is displayed even when the given option doesn't exist.
:: [   PASS   ]   bz 710240 - Added option to Sudo rule message is displayed even when the given option already exists.
:: [   PASS   ]   bz 912637 ipaEnabledFlag ldap attribute
:: [   PASS   ]   bz 769491: Unable to add certain sudo commands to groups.
:: [   PASS   ]   bz 741604: misleading error when adding duplicate external members to sudo rule
:: [   PASS   ]   bz 782976: SUDO: --users and --groups should detect values such as "ALL" and error appropriately
:: [   PASS   ]   bz 783286: Setting HBAC/SUDO category to Anyone doesn't remove users/groups
:: [   PASS   ]   bz 800537: Sudo commands with special characters cannot be removed from command groups
:: [   PASS   ]   bz 800544 - Sudo commands are case-insensitive
:: [   PASS   ]   Clean up for sudo functional tests
:: [   PASS   ]   /CoreOS/ipa-server/rhel70-ipa/acceptance/ipa-sudo

 +----------------------------------------------------------------------+
                    Fail / unfinished / ABORT [ Fail(0/161): 0% ]
 +----------------------------------------------------------------------+


And

 +-----------------------------------------------------------------+
 Test:[/CoreOS/ipa-server/rhel70-ipa/acceptance/ipa-sudo]: [ Pass(14/14): 100% ] 
 +------------------------------------------------------------------+
:: [   PASS   ]   ipa-sudo-cli-sanity-tests-setup
:: [   PASS   ]   just wait for master test to be finished first
:: [   PASS   ]   Setup for sudo functional tests
:: [   PASS   ]   sudorule-offline-caching-allow-command
:: [   PASS   ]   sudorule-offline-caching-deny-command
:: [   PASS   ]   sudorule-offline-caching-runasuser-command
:: [   PASS   ]   sudorule-offline-caching-runasgroup-command
:: [   PASS   ]   sudorule-offline-caching-hostgroup-command
:: [   PASS   ]   sudorule-offline-caching-group
:: [   PASS   ]   sudorule-offline-caching-option
:: [   PASS   ]   disable-sudorule-offline-caching
:: [   PASS   ]   sudo func cleanup
:: [   PASS   ]   Clean up for sudo functional tests
:: [   PASS   ]   /CoreOS/ipa-server/rhel70-ipa/acceptance/ipa-sudo

 +----------------------------------------------------------------------+
                    Fail / unfinished / ABORT [ Fail(0/14): 0% ]
 +----------------------------------------------------------------------+

Comment 6 Ludek Smid 2014-06-13 12:57:24 UTC
This request was resolved in Red Hat Enterprise Linux 7.0.

Contact your manager or support representative in case you have further questions about the request.


Note You need to log in before you can comment on or make changes to this bug.