]> git.proxmox.com Git - pve-access-control.git/blame - debian/changelog
userid format: clarify that this is the full name@realm in description
[pve-access-control.git] / debian / changelog
CommitLineData
2da8c203
TL
1libpve-access-control (7.3-1) bullseye; urgency=medium
2
3 * realm: sync: allow explicit 'none' for 'remove-vanished' option
4
5 -- Proxmox Support Team <support@proxmox.com> Fri, 16 Dec 2022 13:11:04 +0100
6
b84bf623
TL
7libpve-access-control (7.2-5) bullseye; urgency=medium
8
9 * api: realm sync: avoid separate log line for "remove-vanished" opt
10
11 * auth ldap/ad: compare group member dn case-insensitively
12
13 * two factor auth: only lock tfa config for recovery keys
14
15 * privs: add Sys.Incoming for guarding cross-cluster data streams like guest
16 migrations and storage migrations
17
18 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Nov 2022 13:09:17 +0100
19
f4e68e49
TL
20libpve-access-control (7.2-4) bullseye; urgency=medium
21
22 * fix #4074: increase API OpenID code size limit to 2048
23
24 * auth key: protect against rare chance of a double rotation in clusters,
25 leaving the potential that some set of nodes have the earlier key cached,
26 that then got rotated out due to the race, resulting in a possible other
27 set of nodes having the newer key cached. This is a split view of the auth
28 key and may resulting in spurious failures if API requests are made to a
29 different node than the ticket was generated on.
30 In addition to that, the "keep validity of old tickets if signed in the
31 last two hours before rotation" logic was disabled too in such a case,
32 making such tickets invalid too early.
33 Note that both are cases where Proxmox VE was too strict, so while this
34 had no security implications it can be a nuisance, especially for
35 environments that use the API through an automated or scripted way
36
37 -- Proxmox Support Team <support@proxmox.com> Thu, 14 Jul 2022 08:36:51 +0200
38
26dde491
TL
39libpve-access-control (7.2-3) bullseye; urgency=medium
40
41 * api: token: use userid-group as API perm check to avoid being overly
42 strict through a misguided use of user id for non-root users.
43
44 * perm check: forbid undefined/empty ACL path for future proofing of against
45 above issue
46
47 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200
48
1cf4389b
TL
49libpve-access-control (7.2-2) bullseye; urgency=medium
50
51 * permissions: merge propagation flag for multiple roles on a path that
52 share privilege in a deterministic way, to avoid that it gets lost
53 depending on perl's random sort, which would result in returing less
54 privileges than an auth-id actually had.
55
56 * permissions: avoid that token and user privilege intersection is to strict
57 for user permissions that have propagation disabled.
58
59 -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200
60
e3604d48
TL
61libpve-access-control (7.2-1) bullseye; urgency=medium
62
63 * user check: fix expiration/enable order
64
65 -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200
66
79ae250f
TL
67libpve-access-control (7.1-8) bullseye; urgency=medium
68
69 * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove-
70 vanished'
71
72 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200
73
eed46286
TL
74libpve-access-control (7.1-7) bullseye; urgency=medium
75
76 * userid-group check: distinguish create and update
77
78 * api: get user: declare token schema
79
80 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100
81
cd78b295
FG
82libpve-access-control (7.1-6) bullseye; urgency=medium
83
84 * fix #3768: warn on bad u2f or webauthn settings
85
86 * tfa: when modifying others, verify the current user's password
87
88 * tfa list: account for admin permissions
89
90 * fix realm sync permissions
91
92 * fix token permission display bug
93
94 * include SDN permissions in permission tree
95
96 -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100
97
118088d8
TL
98libpve-access-control (7.1-5) bullseye; urgency=medium
99
100 * openid: fix username-claim fallback
101
102 -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100
103
ebb14277
WB
104libpve-access-control (7.1-4) bullseye; urgency=medium
105
106 * set current origin in the webauthn config if no fixed origin was
107 configured, to support webauthn via subdomains
108
109 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
110
44a55ff7
TL
111libpve-access-control (7.1-3) bullseye; urgency=medium
112
113 * openid: allow arbitrary username-claims
114
115 * openid: support configuring the prompt, scopes and ACR values
116
117 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
118
6f643e79
TL
119libpve-access-control (7.1-2) bullseye; urgency=medium
120
121 * catch incompatible tfa entries with a nice error
122
123 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
124
92bca71e
TL
125libpve-access-control (7.1-1) bullseye; urgency=medium
126
127 * tfa: map HTTP 404 error in get_tfa_entry correctly
128
129 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
130
1c9b6501
TL
131libpve-access-control (7.0-7) bullseye; urgency=medium
132
133 * fix #3513: pass configured proxy to OpenID
134
135 * use rust based parser for TFA config
136
137 * use PBS-like auth api call flow,
138
139 * merge old user.cfg keys to tfa config when adding entries
140
141 * implement version checks for new tfa config writer to ensure all
142 cluster nodes are ready to avoid login issues
143
144 * tickets: add tunnel ticket
145
146 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
147
cd46b379
TL
148libpve-access-control (7.0-6) bullseye; urgency=medium
149
150 * fix regression in user deletion when realm does not enforce TFA
151
152 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
153
52da88a8
TL
154libpve-access-control (7.0-5) bullseye; urgency=medium
155
156 * acl: check path: add /sdn/vnets/* path
157
158 * fix #2302: allow deletion of users when realm enforces TFA
159
160 * api: delete user: disable user first to avoid surprise on error during the
161 various cleanup action required for user deletion (e.g., TFA, ACL, group)
162
163 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
164
543d646c
TL
165libpve-access-control (7.0-4) bullseye; urgency=medium
166
167 * realm: add OpenID configuration
168
169 * api: implement OpenID related endpoints
170
171 * implement opt-in OpenID autocreate user feature
172
173 * api: user: add 'realm-type' to user list response
174
175 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
176
7a4c4fd8
TL
177libpve-access-control (7.0-3) bullseye; urgency=medium
178
179 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
180 `/sdn/zones/<zone>` to allowed ACL paths
181
182 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
183
0902a936
FG
184libpve-access-control (7.0-2) bullseye; urgency=medium
185
186 * fix #3402: add Pool.Audit privilege - custom roles containing
187 Pool.Allocate must be updated to include the new privilege.
188
189 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
190
67febb69
TL
191libpve-access-control (7.0-1) bullseye; urgency=medium
192
193 * re-build for Debian 11 Bullseye based releases
194
195 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
196
2942ba41
TL
197libpve-access-control (6.4-1) pve; urgency=medium
198
199 * fix #1670: change PAM service name to project specific name
200
201 * fix #1500: permission path syntax check for access control
202
203 * pveum: add resource pool CLI commands
204
205 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
206
54d312f3
TL
207libpve-access-control (6.1-3) pve; urgency=medium
208
209 * partially fix #2825: authkey: rotate if it was generated in the
210 future
211
212 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
213 insensitive
214
215 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
216
6a9be12f
TL
217libpve-access-control (6.1-2) pve; urgency=medium
218
219 * also check SDN permission path when computing coarse permissions heuristic
220 for UIs
221
222 * add SDN Permissions.Modify
223
224 * add VM.Config.Cloudinit
225
226 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
227
e6624f50
TL
228libpve-access-control (6.1-1) pve; urgency=medium
229
230 * pveum: add tfa delete subcommand for deleting user-TFA
231
232 * LDAP: don't complain about missing credentials on realm removal
233
234 * LDAP: skip anonymous bind when client certificate and key is configured
235
236 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
237
8f4a522f
TL
238libpve-access-control (6.0-7) pve; urgency=medium
239
240 * fix #2575: die when trying to edit built-in roles
241
242 * add realm sub commands to pveum CLI tool
243
7d23b7ca 244 * api: domains: add user group sync API endpoint
8f4a522f
TL
245
246 * allow one to sync and import users and groups from LDAP/AD based realms
247
248 * realm: add default-sync-options to config for more convenient sync configuration
249
250 * api: token create: return also full token id for convenience
251
252 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
253
23059f35
TL
254libpve-access-control (6.0-6) pve; urgency=medium
255
256 * API: add group members to group index
257
258 * implement API token support and management
259
260 * pveum: add 'pveum user token add/update/remove/list'
261
262 * pveum: add permissions sub-commands
263
264 * API: add 'permissions' API endpoint
265
266 * user.cfg: skip inexisting roles when parsing ACLs
267
268 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
269
3dd692e9
TL
270libpve-access-control (6.0-5) pve; urgency=medium
271
272 * pveum: add list command for users, groups, ACLs and roles
273
274 * add initial permissions for experimental SDN integration
275
276 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
277
4ef92d0d
FG
278libpve-access-control (6.0-4) pve; urgency=medium
279
280 * ticket: use clinfo to get cluster name
281
282 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
283 SSL version
284
285 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
286
6e5bbca4
TL
287libpve-access-control (6.0-3) pve; urgency=medium
288
289 * fix #2433: increase possible TFA secret length
290
291 * parse user configuration: correctly parse group names in ACLs, for users
292 which begin their name with an @
293
294 * sort user.cfg entries alphabetically
295
296 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
297
e073493c
TL
298libpve-access-control (6.0-2) pve; urgency=medium
299
300 * improve CSRF verification compatibility with newer PVE
301
302 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
303
a237dc2e
TL
304libpve-access-control (6.0-1) pve; urgency=medium
305
306 * ticket: properly verify exactly 5 minute old tickets
307
308 * use hmac_sha256 instead of sha1 for CSRF token generation
309
310 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
311
f1531f22
TL
312libpve-access-control (6.0-0+1) pve; urgency=medium
313
314 * bump for Debian buster
315
316 * fix #2079: add periodic auth key rotation
317
318 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
319
ef761f51
TL
320libpve-access-control (5.1-10) unstable; urgency=medium
321
322 * add /access/user/{id}/tfa api call to get tfa types
323
324 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
325
860ddcba
TL
326libpve-access-control (5.1-9) unstable; urgency=medium
327
328 * store the tfa type in user.cfg allowing to get it without proxying the call
7d23b7ca 329 to a higher privileged daemon.
860ddcba
TL
330
331 * tfa: realm required TFA should lock out users without TFA configured, as it
332 was done before Proxmox VE 5.4
333
334 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
335
9fbad012
TL
336libpve-access-control (5.1-8) unstable; urgency=medium
337
338 * U2F: ensure we save correct public key on registration
339
340 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
341
4473c96c
TL
342libpve-access-control (5.1-7) unstable; urgency=medium
343
344 * verify_ticket: allow general non-challenge tfa to be run as two step
345 call
346
347 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
348
a270d4e1
TL
349libpve-access-control (5.1-6) unstable; urgency=medium
350
351 * more general 2FA configuration via priv/tfa.cfg
352
353 * add u2f api endpoints
354
355 * delete TFA entries when deleting a user
356
357 * allow users to change their TOTP settings
358
359 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
360
374647e8
TL
361libpve-access-control (5.1-5) unstable; urgency=medium
362
363 * fix vnc ticket verification without authkey lifetime
364
365 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
366
7fb70c94
TL
367libpve-access-control (5.1-4) unstable; urgency=medium
368
369 * fix #1891: Add zsh command completion for pveum
370
371 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
372 to avoid issues on upgrade, will be enabled with 6.0
373
374 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
375
6e010cde
TL
376libpve-access-control (5.1-3) unstable; urgency=medium
377
378 * api/ticket: move getting cluster name into an eval
379
380 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
381
f5a9380a
TL
382libpve-access-control (5.1-2) unstable; urgency=medium
383
384 * fix #1998: correct return properties for read_role
385
386 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
387
b54b7474
TL
388libpve-access-control (5.1-1) unstable; urgency=medium
389
390 * pveum: introduce sub-commands
391
392 * register userid with completion
393
394 * fix #233: return cluster name on successful login
395
396 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
397
52192dd4
WB
398libpve-access-control (5.0-8) unstable; urgency=medium
399
400 * fix #1612: ldap: make 2nd server work with bind domains again
401
402 * fix an error message where passing a bad pool id to an API function would
403 make it complain about a wrong group name instead
404
405 * fix the API-returned permission list so that the GUI knows to show the
406 'Permissions' tab for a storage to an administrator apart from root@pam
407
408 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
409
3dadf8cf
FG
410libpve-access-control (5.0-7) unstable; urgency=medium
411
412 * VM.Snapshot.Rollback privilege added
413
414 * api: check for special roles before locking the usercfg
415
416 * fix #1501: pveum: die when deleting special role
417
418 * API/ticket: rework coarse grained permission computation
419
420 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
421
ec4141f4
WB
422libpve-access-control (5.0-6) unstable; urgency=medium
423
424 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
425 'verify' option. For compatibility reasons this defaults to off for now,
426 but that might change with future updates.
427
428 * AD, LDAP: Add ability to specify a CA path or file, and a client
429 certificate via the 'capath', 'cert' and 'certkey' options.
430
431 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
432
63134bd4
DM
433libpve-access-control (5.0-5) unstable; urgency=medium
434
435 * change from dpkg-deb to dpkg-buildpackage
436
437 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
438
868fb1ea
DM
439libpve-access-control (5.0-4) unstable; urgency=medium
440
441 * PVE/CLI/pveum.pm: call setup_default_cli_env()
442
443 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
444
445 * check_api2_permissions: avoid warning about uninitialized value
446
447 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
448
63358f40
DM
449libpve-access-control (5.0-3) unstable; urgency=medium
450
451 * use new PVE::OTP class from pve-common
452
453 * use new PVE::Tools::encrypt_pw from pve-common
454
455 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
456
05fd50af
DM
457libpve-access-control (5.0-2) unstable; urgency=medium
458
459 * encrypt_pw: avoid '+' for crypt salt
460
461 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
462
0835385b
FG
463libpve-access-control (5.0-1) unstable; urgency=medium
464
465 * rebuild for PVE 5.0
466
467 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
468
730f8863
DM
469libpve-access-control (4.0-23) unstable; urgency=medium
470
471 * use new PVE::Ticket class
472
473 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
474
1f1c4593
DM
475libpve-access-control (4.0-22) unstable; urgency=medium
476
477 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
478 (moved to PVE::Storage)
479
480 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
481
482 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
483
f9105063
DM
484libpve-access-control (4.0-21) unstable; urgency=medium
485
486 * setup_default_cli_env: expect $class as first parameter
487
488 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
489
9595066e
DM
490libpve-access-control (4.0-20) unstable; urgency=medium
491
492 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
493
494 * PVE/API2/Domains.pm: fix property description
495
496 * use new repoman for upload target
497
498 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
499
2af5a793
DM
500libpve-access-control (4.0-19) unstable; urgency=medium
501
502 * Close #833: ldap: non-anonymous bind support
503
504 * don't import 'RFC' from MIME::Base32
505
506 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
507
5d87bb77
WB
508libpve-access-control (4.0-18) unstable; urgency=medium
509
510 * fix #1062: recognize base32 otp keys again
511
512 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
513
28ddf48b
WB
514libpve-access-control (4.0-17) unstable; urgency=medium
515
516 * drop oathtool and libdigest-hmac-perl dependencies
517
518 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
519
15cebb28
DM
520libpve-access-control (4.0-16) unstable; urgency=medium
521
522 * use pve-doc-generator to generate man pages
523
524 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
525
678df887
DM
526libpve-access-control (4.0-15) unstable; urgency=medium
527
528 * Fix uninitialized warning when shadow.cfg does not exist
529
530 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
531
cca9761a
DM
532libpve-access-control (4.0-14) unstable; urgency=medium
533
534 * Add is_worker to RPCEnvironment
535
536 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
537
8643c99d
DM
538libpve-access-control (4.0-13) unstable; urgency=medium
539
540 * fix #916: allow HTTPS to access custom yubico url
541
542 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
543
ae2a6bf9
DM
544libpve-access-control (4.0-12) unstable; urgency=medium
545
546 * Catch certificate errors instead of segfaulting
547
548 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
549
4836db5f
DM
550libpve-access-control (4.0-11) unstable; urgency=medium
551
552 * Fix #861: use safer sprintf formatting
553
554 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
555
ccbe23dc
DM
556libpve-access-control (4.0-10) unstable; urgency=medium
557
558 * Auth::LDAP, Auth::AD: ipv6 support
559
560 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
561
90399ca4
DM
562libpve-access-control (4.0-9) unstable; urgency=medium
563
564 * pveum: implement bash completion
565
566 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
567
364ffc13
DM
568libpve-access-control (4.0-8) unstable; urgency=medium
569
570 * remove_storage_access: cleanup of access permissions for removed storage
571
572 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
573
7c26cb4a
DM
574libpve-access-control (4.0-7) unstable; urgency=medium
575
576 * new helper to remove access permissions for removed VMs
577
578 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
579
296afbd1
DM
580libpve-access-control (4.0-6) unstable; urgency=medium
581
582 * improve parse_user_config, parse_shadow_config
583
584 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
585
7d2df2ef
DM
586libpve-access-control (4.0-5) unstable; urgency=medium
587
588 * pveum: check for $cmd being defined
589
590 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
591
98a34e3f
DM
592libpve-access-control (4.0-4) unstable; urgency=medium
593
594 * use activate-noawait triggers
595
596 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
597
15462727
DM
598libpve-access-control (4.0-3) unstable; urgency=medium
599
600 * IPv6 fixes
601
602 * non-root buildfix
603
604 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
605
bbf4cc9a
DM
606libpve-access-control (4.0-2) unstable; urgency=medium
607
608 * trigger pve-api-updates event
609
610 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
611
dfbcf6d3
DM
612libpve-access-control (4.0-1) unstable; urgency=medium
613
614 * bump version for Debian Jessie
615
616 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
617
94971b3a
DM
618libpve-access-control (3.0-16) unstable; urgency=low
619
620 * root@pam can now be disabled in GUI.
621
622 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
623
7b17c7cb
DM
624libpve-access-control (3.0-15) unstable; urgency=low
625
626 * oath: add 'step' and 'digits' option
627
628 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
629
1abc2c0a
DM
630libpve-access-control (3.0-14) unstable; urgency=low
631
632 * add oath two factor auth
633
634 * add oathkeygen binary to generate keys for oath
635
636 * add yubico two factor auth
637
638 * dedend on oathtool
639
640 * depend on libmime-base32-perl
30be0de9
DM
641
642 * allow to write builtin auth domains config (comment/tfa/default)
1abc2c0a
DM
643
644 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
645
298450ab
DM
646libpve-access-control (3.0-13) unstable; urgency=low
647
648 * use correct connection string for AD auth
649
650 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
651
396034e4
DM
652libpve-access-control (3.0-12) unstable; urgency=low
653
654 * add dummy API for GET /access/ticket (useful to generate login pages)
655
656 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
657
26361123
DM
658libpve-access-control (3.0-11) unstable; urgency=low
659
660 * Sets common hot keys for spice client
661
662 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
663
3643383d
DM
664libpve-access-control (3.0-10) unstable; urgency=low
665
666 * implement helper to generate SPICE remote-viewer configuration
667
668 * depend on libnet-ssleay-perl
669
670 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
671
0baedcf7
DM
672libpve-access-control (3.0-9) unstable; urgency=low
673
674 * prevent user enumeration attacks
e4f8fc2e
DM
675
676 * allow dots in access paths
0baedcf7
DM
677
678 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
679
d4b63eae
DM
680libpve-access-control (3.0-8) unstable; urgency=low
681
682 * spice: use lowercase hostname in ticktet signature
683
684 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
685
49594944
DM
686libpve-access-control (3.0-7) unstable; urgency=low
687
688 * check_volume_access : use parse_volname instead of path, and remove
689 path related code.
7c410d63
DM
690
691 * use warnings instead of global -w flag.
49594944
DM
692
693 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
694
fe7de5d0
DM
695libpve-access-control (3.0-6) unstable; urgency=low
696
697 * use shorter spiceproxy tickets
698
699 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
700
4cdd9507
DM
701libpve-access-control (3.0-5) unstable; urgency=low
702
703 * add code to generate tickets for SPICE
704
705 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
706
677f9ab0
DM
707libpve-access-control (3.0-4) unstable; urgency=low
708
709 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
710
711 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
712
139a8ecf
DM
713libpve-access-control (3.0-3) unstable; urgency=low
714
7d23b7ca 715 * Add new role PVETemplateUser (and VM.Clone privilege)
139a8ecf
DM
716
717 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
718
b78ce7c2
DM
719libpve-access-control (3.0-2) unstable; urgency=low
720
721 * remove CGI.pm related code (pveproxy does not need that)
722
723 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
724
786820f9
DM
725libpve-access-control (3.0-1) unstable; urgency=low
726
727 * bump version for wheezy release
728
729 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
730
e5ae5487
DM
731libpve-access-control (1.0-26) unstable; urgency=low
732
733 * check_volume_access: fix access permissions for backup files
734
735 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
736
e3e6510c
DM
737libpve-access-control (1.0-25) unstable; urgency=low
738
739 * add VM.Snapshot permission
740
741 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
742
1e15ebe7
DM
743libpve-access-control (1.0-24) unstable; urgency=low
744
745 * untaint path (allow root to restore arbitrary paths)
746
747 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
748
437be042
DM
749libpve-access-control (1.0-23) unstable; urgency=low
750
751 * correctly compute GUI capabilities (consider pools)
752
753 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
754
5bb4e06a
DM
755libpve-access-control (1.0-22) unstable; urgency=low
756
757 * new plugin architecture for Auth modules, minor API change for Auth
758 domains (new 'delete' parameter)
759
760 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
761
3030a176
DM
762libpve-access-control (1.0-21) unstable; urgency=low
763
764 * do not allow user names including slash
765
766 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
767
768libpve-access-control (1.0-20) unstable; urgency=low
769
770 * add ability to fork cli workers in background
771
772 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
773
dd2cfee0
DM
774libpve-access-control (1.0-19) unstable; urgency=low
775
776 * return set of privileges on login - can be used to adopt GUI
777
778 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
779
1cf154b7
DM
780libpve-access-control (1.0-18) unstable; urgency=low
781
7d23b7ca 782 * fix bug #151: correctly parse username inside ticket
533219a1
DM
783
784 * fix bug #152: allow user to change his own password
1cf154b7
DM
785
786 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
787
2de14407
DM
788libpve-access-control (1.0-17) unstable; urgency=low
789
790 * set propagate flag by default
791
792 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
793
bdc61d7a
DM
794libpve-access-control (1.0-16) unstable; urgency=low
795
796 * add 'pveum passwd' method
797
798 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
799
cc7bdf33
DM
800libpve-access-control (1.0-15) unstable; urgency=low
801
802 * Add VM.Config.CDROM privilege to PVEVMUser rule
803
804 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
805
a69bbe2e
DM
806libpve-access-control (1.0-14) unstable; urgency=low
807
808 * fix buf in userid-param permission check
809
810 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
811
d9483d94
DM
812libpve-access-control (1.0-13) unstable; urgency=low
813
814 * allow more characters in ldap base_dn attribute
815
816 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
817
84619607
DM
818libpve-access-control (1.0-12) unstable; urgency=low
819
820 * allow more characters with realm IDs
821
822 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
823
09d27058
DM
824libpve-access-control (1.0-11) unstable; urgency=low
825
826 * fix bug in exec_api2_perm_check
827
828 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
829
7a4c849e
DM
830libpve-access-control (1.0-10) unstable; urgency=low
831
832 * fix ACL group name parser
833
834 * changed 'pveum aclmod' command line arguments
835
836 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
837
3eac4e35
DM
838libpve-access-control (1.0-9) unstable; urgency=low
839
840 * fix bug in check_volume_access (fixes vzrestore)
841
842 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
843
4384e19e
DM
844libpve-access-control (1.0-8) unstable; urgency=low
845
846 * fix return value for empty ACL list.
847
848 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
849
d8a56966
DM
850libpve-access-control (1.0-7) unstable; urgency=low
851
852 * fix bug #85: allow root@pam to generate tickets for other users
853
854 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
855
cb6f2f93
DM
856libpve-access-control (1.0-6) unstable; urgency=low
857
858 * API change: allow to filter enabled/disabled users.
859
860 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
861
272fe9ff
DM
862libpve-access-control (1.0-5) unstable; urgency=low
863
864 * add a way to return file changes (diffs): set_result_changes()
865
866 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
867
e42eedbc
DM
868libpve-access-control (1.0-4) unstable; urgency=low
869
870 * new environment type for ha agents
871
872 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
873
1fba27e0
DM
874libpve-access-control (1.0-3) unstable; urgency=low
875
876 * add support for delayed parameter parsing - We need that to disable
7d23b7ca 877 file upload for normal API request (avoid DOS attacks)
1fba27e0
DM
878
879 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
880
5bf71a96
DM
881libpve-access-control (1.0-2) unstable; urgency=low
882
883 * fix bug in fork_worker
884
885 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
886
2c3a6c0a
DM
887libpve-access-control (1.0-1) unstable; urgency=low
888
889 * allow '-' in permission paths
890
891 * bump version to 1.0
892
893 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
894
895libpve-access-control (0.1) unstable; urgency=low
896
897 * first dummy package - no functionality
898
899 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200
900