]>
Commit | Line | Data |
---|---|---|
1 | libpve-access-control (7.2-5) bullseye; urgency=medium | |
2 | ||
3 | * api: realm sync: avoid separate log line for "remove-vanished" opt | |
4 | ||
5 | * auth ldap/ad: compare group member dn case-insensitively | |
6 | ||
7 | * two factor auth: only lock tfa config for recovery keys | |
8 | ||
9 | * privs: add Sys.Incoming for guarding cross-cluster data streams like guest | |
10 | migrations and storage migrations | |
11 | ||
12 | -- Proxmox Support Team <support@proxmox.com> Thu, 17 Nov 2022 13:09:17 +0100 | |
13 | ||
14 | libpve-access-control (7.2-4) bullseye; urgency=medium | |
15 | ||
16 | * fix #4074: increase API OpenID code size limit to 2048 | |
17 | ||
18 | * auth key: protect against rare chance of a double rotation in clusters, | |
19 | leaving the potential that some set of nodes have the earlier key cached, | |
20 | that then got rotated out due to the race, resulting in a possible other | |
21 | set of nodes having the newer key cached. This is a split view of the auth | |
22 | key and may resulting in spurious failures if API requests are made to a | |
23 | different node than the ticket was generated on. | |
24 | In addition to that, the "keep validity of old tickets if signed in the | |
25 | last two hours before rotation" logic was disabled too in such a case, | |
26 | making such tickets invalid too early. | |
27 | Note that both are cases where Proxmox VE was too strict, so while this | |
28 | had no security implications it can be a nuisance, especially for | |
29 | environments that use the API through an automated or scripted way | |
30 | ||
31 | -- Proxmox Support Team <support@proxmox.com> Thu, 14 Jul 2022 08:36:51 +0200 | |
32 | ||
33 | libpve-access-control (7.2-3) bullseye; urgency=medium | |
34 | ||
35 | * api: token: use userid-group as API perm check to avoid being overly | |
36 | strict through a misguided use of user id for non-root users. | |
37 | ||
38 | * perm check: forbid undefined/empty ACL path for future proofing of against | |
39 | above issue | |
40 | ||
41 | -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200 | |
42 | ||
43 | libpve-access-control (7.2-2) bullseye; urgency=medium | |
44 | ||
45 | * permissions: merge propagation flag for multiple roles on a path that | |
46 | share privilege in a deterministic way, to avoid that it gets lost | |
47 | depending on perl's random sort, which would result in returing less | |
48 | privileges than an auth-id actually had. | |
49 | ||
50 | * permissions: avoid that token and user privilege intersection is to strict | |
51 | for user permissions that have propagation disabled. | |
52 | ||
53 | -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200 | |
54 | ||
55 | libpve-access-control (7.2-1) bullseye; urgency=medium | |
56 | ||
57 | * user check: fix expiration/enable order | |
58 | ||
59 | -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200 | |
60 | ||
61 | libpve-access-control (7.1-8) bullseye; urgency=medium | |
62 | ||
63 | * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove- | |
64 | vanished' | |
65 | ||
66 | -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200 | |
67 | ||
68 | libpve-access-control (7.1-7) bullseye; urgency=medium | |
69 | ||
70 | * userid-group check: distinguish create and update | |
71 | ||
72 | * api: get user: declare token schema | |
73 | ||
74 | -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100 | |
75 | ||
76 | libpve-access-control (7.1-6) bullseye; urgency=medium | |
77 | ||
78 | * fix #3768: warn on bad u2f or webauthn settings | |
79 | ||
80 | * tfa: when modifying others, verify the current user's password | |
81 | ||
82 | * tfa list: account for admin permissions | |
83 | ||
84 | * fix realm sync permissions | |
85 | ||
86 | * fix token permission display bug | |
87 | ||
88 | * include SDN permissions in permission tree | |
89 | ||
90 | -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100 | |
91 | ||
92 | libpve-access-control (7.1-5) bullseye; urgency=medium | |
93 | ||
94 | * openid: fix username-claim fallback | |
95 | ||
96 | -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100 | |
97 | ||
98 | libpve-access-control (7.1-4) bullseye; urgency=medium | |
99 | ||
100 | * set current origin in the webauthn config if no fixed origin was | |
101 | configured, to support webauthn via subdomains | |
102 | ||
103 | -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100 | |
104 | ||
105 | libpve-access-control (7.1-3) bullseye; urgency=medium | |
106 | ||
107 | * openid: allow arbitrary username-claims | |
108 | ||
109 | * openid: support configuring the prompt, scopes and ACR values | |
110 | ||
111 | -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100 | |
112 | ||
113 | libpve-access-control (7.1-2) bullseye; urgency=medium | |
114 | ||
115 | * catch incompatible tfa entries with a nice error | |
116 | ||
117 | -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100 | |
118 | ||
119 | libpve-access-control (7.1-1) bullseye; urgency=medium | |
120 | ||
121 | * tfa: map HTTP 404 error in get_tfa_entry correctly | |
122 | ||
123 | -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100 | |
124 | ||
125 | libpve-access-control (7.0-7) bullseye; urgency=medium | |
126 | ||
127 | * fix #3513: pass configured proxy to OpenID | |
128 | ||
129 | * use rust based parser for TFA config | |
130 | ||
131 | * use PBS-like auth api call flow, | |
132 | ||
133 | * merge old user.cfg keys to tfa config when adding entries | |
134 | ||
135 | * implement version checks for new tfa config writer to ensure all | |
136 | cluster nodes are ready to avoid login issues | |
137 | ||
138 | * tickets: add tunnel ticket | |
139 | ||
140 | -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100 | |
141 | ||
142 | libpve-access-control (7.0-6) bullseye; urgency=medium | |
143 | ||
144 | * fix regression in user deletion when realm does not enforce TFA | |
145 | ||
146 | -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200 | |
147 | ||
148 | libpve-access-control (7.0-5) bullseye; urgency=medium | |
149 | ||
150 | * acl: check path: add /sdn/vnets/* path | |
151 | ||
152 | * fix #2302: allow deletion of users when realm enforces TFA | |
153 | ||
154 | * api: delete user: disable user first to avoid surprise on error during the | |
155 | various cleanup action required for user deletion (e.g., TFA, ACL, group) | |
156 | ||
157 | -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200 | |
158 | ||
159 | libpve-access-control (7.0-4) bullseye; urgency=medium | |
160 | ||
161 | * realm: add OpenID configuration | |
162 | ||
163 | * api: implement OpenID related endpoints | |
164 | ||
165 | * implement opt-in OpenID autocreate user feature | |
166 | ||
167 | * api: user: add 'realm-type' to user list response | |
168 | ||
169 | -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200 | |
170 | ||
171 | libpve-access-control (7.0-3) bullseye; urgency=medium | |
172 | ||
173 | * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and | |
174 | `/sdn/zones/<zone>` to allowed ACL paths | |
175 | ||
176 | -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200 | |
177 | ||
178 | libpve-access-control (7.0-2) bullseye; urgency=medium | |
179 | ||
180 | * fix #3402: add Pool.Audit privilege - custom roles containing | |
181 | Pool.Allocate must be updated to include the new privilege. | |
182 | ||
183 | -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200 | |
184 | ||
185 | libpve-access-control (7.0-1) bullseye; urgency=medium | |
186 | ||
187 | * re-build for Debian 11 Bullseye based releases | |
188 | ||
189 | -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200 | |
190 | ||
191 | libpve-access-control (6.4-1) pve; urgency=medium | |
192 | ||
193 | * fix #1670: change PAM service name to project specific name | |
194 | ||
195 | * fix #1500: permission path syntax check for access control | |
196 | ||
197 | * pveum: add resource pool CLI commands | |
198 | ||
199 | -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200 | |
200 | ||
201 | libpve-access-control (6.1-3) pve; urgency=medium | |
202 | ||
203 | * partially fix #2825: authkey: rotate if it was generated in the | |
204 | future | |
205 | ||
206 | * fix #2947: add an option to LDAP or AD realm to switch user lookup to case | |
207 | insensitive | |
208 | ||
209 | -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200 | |
210 | ||
211 | libpve-access-control (6.1-2) pve; urgency=medium | |
212 | ||
213 | * also check SDN permission path when computing coarse permissions heuristic | |
214 | for UIs | |
215 | ||
216 | * add SDN Permissions.Modify | |
217 | ||
218 | * add VM.Config.Cloudinit | |
219 | ||
220 | -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200 | |
221 | ||
222 | libpve-access-control (6.1-1) pve; urgency=medium | |
223 | ||
224 | * pveum: add tfa delete subcommand for deleting user-TFA | |
225 | ||
226 | * LDAP: don't complain about missing credentials on realm removal | |
227 | ||
228 | * LDAP: skip anonymous bind when client certificate and key is configured | |
229 | ||
230 | -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200 | |
231 | ||
232 | libpve-access-control (6.0-7) pve; urgency=medium | |
233 | ||
234 | * fix #2575: die when trying to edit built-in roles | |
235 | ||
236 | * add realm sub commands to pveum CLI tool | |
237 | ||
238 | * api: domains: add user group sync API endpoint | |
239 | ||
240 | * allow one to sync and import users and groups from LDAP/AD based realms | |
241 | ||
242 | * realm: add default-sync-options to config for more convenient sync configuration | |
243 | ||
244 | * api: token create: return also full token id for convenience | |
245 | ||
246 | -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200 | |
247 | ||
248 | libpve-access-control (6.0-6) pve; urgency=medium | |
249 | ||
250 | * API: add group members to group index | |
251 | ||
252 | * implement API token support and management | |
253 | ||
254 | * pveum: add 'pveum user token add/update/remove/list' | |
255 | ||
256 | * pveum: add permissions sub-commands | |
257 | ||
258 | * API: add 'permissions' API endpoint | |
259 | ||
260 | * user.cfg: skip inexisting roles when parsing ACLs | |
261 | ||
262 | -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100 | |
263 | ||
264 | libpve-access-control (6.0-5) pve; urgency=medium | |
265 | ||
266 | * pveum: add list command for users, groups, ACLs and roles | |
267 | ||
268 | * add initial permissions for experimental SDN integration | |
269 | ||
270 | -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100 | |
271 | ||
272 | libpve-access-control (6.0-4) pve; urgency=medium | |
273 | ||
274 | * ticket: use clinfo to get cluster name | |
275 | ||
276 | * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as | |
277 | SSL version | |
278 | ||
279 | -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100 | |
280 | ||
281 | libpve-access-control (6.0-3) pve; urgency=medium | |
282 | ||
283 | * fix #2433: increase possible TFA secret length | |
284 | ||
285 | * parse user configuration: correctly parse group names in ACLs, for users | |
286 | which begin their name with an @ | |
287 | ||
288 | * sort user.cfg entries alphabetically | |
289 | ||
290 | -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100 | |
291 | ||
292 | libpve-access-control (6.0-2) pve; urgency=medium | |
293 | ||
294 | * improve CSRF verification compatibility with newer PVE | |
295 | ||
296 | -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200 | |
297 | ||
298 | libpve-access-control (6.0-1) pve; urgency=medium | |
299 | ||
300 | * ticket: properly verify exactly 5 minute old tickets | |
301 | ||
302 | * use hmac_sha256 instead of sha1 for CSRF token generation | |
303 | ||
304 | -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200 | |
305 | ||
306 | libpve-access-control (6.0-0+1) pve; urgency=medium | |
307 | ||
308 | * bump for Debian buster | |
309 | ||
310 | * fix #2079: add periodic auth key rotation | |
311 | ||
312 | -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200 | |
313 | ||
314 | libpve-access-control (5.1-10) unstable; urgency=medium | |
315 | ||
316 | * add /access/user/{id}/tfa api call to get tfa types | |
317 | ||
318 | -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200 | |
319 | ||
320 | libpve-access-control (5.1-9) unstable; urgency=medium | |
321 | ||
322 | * store the tfa type in user.cfg allowing to get it without proxying the call | |
323 | to a higher privileged daemon. | |
324 | ||
325 | * tfa: realm required TFA should lock out users without TFA configured, as it | |
326 | was done before Proxmox VE 5.4 | |
327 | ||
328 | -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000 | |
329 | ||
330 | libpve-access-control (5.1-8) unstable; urgency=medium | |
331 | ||
332 | * U2F: ensure we save correct public key on registration | |
333 | ||
334 | -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200 | |
335 | ||
336 | libpve-access-control (5.1-7) unstable; urgency=medium | |
337 | ||
338 | * verify_ticket: allow general non-challenge tfa to be run as two step | |
339 | call | |
340 | ||
341 | -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200 | |
342 | ||
343 | libpve-access-control (5.1-6) unstable; urgency=medium | |
344 | ||
345 | * more general 2FA configuration via priv/tfa.cfg | |
346 | ||
347 | * add u2f api endpoints | |
348 | ||
349 | * delete TFA entries when deleting a user | |
350 | ||
351 | * allow users to change their TOTP settings | |
352 | ||
353 | -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200 | |
354 | ||
355 | libpve-access-control (5.1-5) unstable; urgency=medium | |
356 | ||
357 | * fix vnc ticket verification without authkey lifetime | |
358 | ||
359 | -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100 | |
360 | ||
361 | libpve-access-control (5.1-4) unstable; urgency=medium | |
362 | ||
363 | * fix #1891: Add zsh command completion for pveum | |
364 | ||
365 | * ground work to fix #2079: add periodic auth key rotation. Not yet enabled | |
366 | to avoid issues on upgrade, will be enabled with 6.0 | |
367 | ||
368 | -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100 | |
369 | ||
370 | libpve-access-control (5.1-3) unstable; urgency=medium | |
371 | ||
372 | * api/ticket: move getting cluster name into an eval | |
373 | ||
374 | -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100 | |
375 | ||
376 | libpve-access-control (5.1-2) unstable; urgency=medium | |
377 | ||
378 | * fix #1998: correct return properties for read_role | |
379 | ||
380 | -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100 | |
381 | ||
382 | libpve-access-control (5.1-1) unstable; urgency=medium | |
383 | ||
384 | * pveum: introduce sub-commands | |
385 | ||
386 | * register userid with completion | |
387 | ||
388 | * fix #233: return cluster name on successful login | |
389 | ||
390 | -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100 | |
391 | ||
392 | libpve-access-control (5.0-8) unstable; urgency=medium | |
393 | ||
394 | * fix #1612: ldap: make 2nd server work with bind domains again | |
395 | ||
396 | * fix an error message where passing a bad pool id to an API function would | |
397 | make it complain about a wrong group name instead | |
398 | ||
399 | * fix the API-returned permission list so that the GUI knows to show the | |
400 | 'Permissions' tab for a storage to an administrator apart from root@pam | |
401 | ||
402 | -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100 | |
403 | ||
404 | libpve-access-control (5.0-7) unstable; urgency=medium | |
405 | ||
406 | * VM.Snapshot.Rollback privilege added | |
407 | ||
408 | * api: check for special roles before locking the usercfg | |
409 | ||
410 | * fix #1501: pveum: die when deleting special role | |
411 | ||
412 | * API/ticket: rework coarse grained permission computation | |
413 | ||
414 | -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200 | |
415 | ||
416 | libpve-access-control (5.0-6) unstable; urgency=medium | |
417 | ||
418 | * Close #1470: Add server ceritifcate verification for AD and LDAP via the | |
419 | 'verify' option. For compatibility reasons this defaults to off for now, | |
420 | but that might change with future updates. | |
421 | ||
422 | * AD, LDAP: Add ability to specify a CA path or file, and a client | |
423 | certificate via the 'capath', 'cert' and 'certkey' options. | |
424 | ||
425 | -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200 | |
426 | ||
427 | libpve-access-control (5.0-5) unstable; urgency=medium | |
428 | ||
429 | * change from dpkg-deb to dpkg-buildpackage | |
430 | ||
431 | -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200 | |
432 | ||
433 | libpve-access-control (5.0-4) unstable; urgency=medium | |
434 | ||
435 | * PVE/CLI/pveum.pm: call setup_default_cli_env() | |
436 | ||
437 | * PVE/Auth/PVE.pm: encode uft8 password before calling crypt | |
438 | ||
439 | * check_api2_permissions: avoid warning about uninitialized value | |
440 | ||
441 | -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200 | |
442 | ||
443 | libpve-access-control (5.0-3) unstable; urgency=medium | |
444 | ||
445 | * use new PVE::OTP class from pve-common | |
446 | ||
447 | * use new PVE::Tools::encrypt_pw from pve-common | |
448 | ||
449 | -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200 | |
450 | ||
451 | libpve-access-control (5.0-2) unstable; urgency=medium | |
452 | ||
453 | * encrypt_pw: avoid '+' for crypt salt | |
454 | ||
455 | -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200 | |
456 | ||
457 | libpve-access-control (5.0-1) unstable; urgency=medium | |
458 | ||
459 | * rebuild for PVE 5.0 | |
460 | ||
461 | -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100 | |
462 | ||
463 | libpve-access-control (4.0-23) unstable; urgency=medium | |
464 | ||
465 | * use new PVE::Ticket class | |
466 | ||
467 | -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100 | |
468 | ||
469 | libpve-access-control (4.0-22) unstable; urgency=medium | |
470 | ||
471 | * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency | |
472 | (moved to PVE::Storage) | |
473 | ||
474 | * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class | |
475 | ||
476 | -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100 | |
477 | ||
478 | libpve-access-control (4.0-21) unstable; urgency=medium | |
479 | ||
480 | * setup_default_cli_env: expect $class as first parameter | |
481 | ||
482 | -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100 | |
483 | ||
484 | libpve-access-control (4.0-20) unstable; urgency=medium | |
485 | ||
486 | * PVE/RPCEnvironment.pm: new function setup_default_cli_env | |
487 | ||
488 | * PVE/API2/Domains.pm: fix property description | |
489 | ||
490 | * use new repoman for upload target | |
491 | ||
492 | -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100 | |
493 | ||
494 | libpve-access-control (4.0-19) unstable; urgency=medium | |
495 | ||
496 | * Close #833: ldap: non-anonymous bind support | |
497 | ||
498 | * don't import 'RFC' from MIME::Base32 | |
499 | ||
500 | -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200 | |
501 | ||
502 | libpve-access-control (4.0-18) unstable; urgency=medium | |
503 | ||
504 | * fix #1062: recognize base32 otp keys again | |
505 | ||
506 | -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200 | |
507 | ||
508 | libpve-access-control (4.0-17) unstable; urgency=medium | |
509 | ||
510 | * drop oathtool and libdigest-hmac-perl dependencies | |
511 | ||
512 | -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200 | |
513 | ||
514 | libpve-access-control (4.0-16) unstable; urgency=medium | |
515 | ||
516 | * use pve-doc-generator to generate man pages | |
517 | ||
518 | -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200 | |
519 | ||
520 | libpve-access-control (4.0-15) unstable; urgency=medium | |
521 | ||
522 | * Fix uninitialized warning when shadow.cfg does not exist | |
523 | ||
524 | -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200 | |
525 | ||
526 | libpve-access-control (4.0-14) unstable; urgency=medium | |
527 | ||
528 | * Add is_worker to RPCEnvironment | |
529 | ||
530 | -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100 | |
531 | ||
532 | libpve-access-control (4.0-13) unstable; urgency=medium | |
533 | ||
534 | * fix #916: allow HTTPS to access custom yubico url | |
535 | ||
536 | -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100 | |
537 | ||
538 | libpve-access-control (4.0-12) unstable; urgency=medium | |
539 | ||
540 | * Catch certificate errors instead of segfaulting | |
541 | ||
542 | -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100 | |
543 | ||
544 | libpve-access-control (4.0-11) unstable; urgency=medium | |
545 | ||
546 | * Fix #861: use safer sprintf formatting | |
547 | ||
548 | -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100 | |
549 | ||
550 | libpve-access-control (4.0-10) unstable; urgency=medium | |
551 | ||
552 | * Auth::LDAP, Auth::AD: ipv6 support | |
553 | ||
554 | -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100 | |
555 | ||
556 | libpve-access-control (4.0-9) unstable; urgency=medium | |
557 | ||
558 | * pveum: implement bash completion | |
559 | ||
560 | -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200 | |
561 | ||
562 | libpve-access-control (4.0-8) unstable; urgency=medium | |
563 | ||
564 | * remove_storage_access: cleanup of access permissions for removed storage | |
565 | ||
566 | -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200 | |
567 | ||
568 | libpve-access-control (4.0-7) unstable; urgency=medium | |
569 | ||
570 | * new helper to remove access permissions for removed VMs | |
571 | ||
572 | -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200 | |
573 | ||
574 | libpve-access-control (4.0-6) unstable; urgency=medium | |
575 | ||
576 | * improve parse_user_config, parse_shadow_config | |
577 | ||
578 | -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200 | |
579 | ||
580 | libpve-access-control (4.0-5) unstable; urgency=medium | |
581 | ||
582 | * pveum: check for $cmd being defined | |
583 | ||
584 | -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200 | |
585 | ||
586 | libpve-access-control (4.0-4) unstable; urgency=medium | |
587 | ||
588 | * use activate-noawait triggers | |
589 | ||
590 | -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200 | |
591 | ||
592 | libpve-access-control (4.0-3) unstable; urgency=medium | |
593 | ||
594 | * IPv6 fixes | |
595 | ||
596 | * non-root buildfix | |
597 | ||
598 | -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200 | |
599 | ||
600 | libpve-access-control (4.0-2) unstable; urgency=medium | |
601 | ||
602 | * trigger pve-api-updates event | |
603 | ||
604 | -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200 | |
605 | ||
606 | libpve-access-control (4.0-1) unstable; urgency=medium | |
607 | ||
608 | * bump version for Debian Jessie | |
609 | ||
610 | -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100 | |
611 | ||
612 | libpve-access-control (3.0-16) unstable; urgency=low | |
613 | ||
614 | * root@pam can now be disabled in GUI. | |
615 | ||
616 | -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100 | |
617 | ||
618 | libpve-access-control (3.0-15) unstable; urgency=low | |
619 | ||
620 | * oath: add 'step' and 'digits' option | |
621 | ||
622 | -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200 | |
623 | ||
624 | libpve-access-control (3.0-14) unstable; urgency=low | |
625 | ||
626 | * add oath two factor auth | |
627 | ||
628 | * add oathkeygen binary to generate keys for oath | |
629 | ||
630 | * add yubico two factor auth | |
631 | ||
632 | * dedend on oathtool | |
633 | ||
634 | * depend on libmime-base32-perl | |
635 | ||
636 | * allow to write builtin auth domains config (comment/tfa/default) | |
637 | ||
638 | -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200 | |
639 | ||
640 | libpve-access-control (3.0-13) unstable; urgency=low | |
641 | ||
642 | * use correct connection string for AD auth | |
643 | ||
644 | -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200 | |
645 | ||
646 | libpve-access-control (3.0-12) unstable; urgency=low | |
647 | ||
648 | * add dummy API for GET /access/ticket (useful to generate login pages) | |
649 | ||
650 | -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200 | |
651 | ||
652 | libpve-access-control (3.0-11) unstable; urgency=low | |
653 | ||
654 | * Sets common hot keys for spice client | |
655 | ||
656 | -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100 | |
657 | ||
658 | libpve-access-control (3.0-10) unstable; urgency=low | |
659 | ||
660 | * implement helper to generate SPICE remote-viewer configuration | |
661 | ||
662 | * depend on libnet-ssleay-perl | |
663 | ||
664 | -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100 | |
665 | ||
666 | libpve-access-control (3.0-9) unstable; urgency=low | |
667 | ||
668 | * prevent user enumeration attacks | |
669 | ||
670 | * allow dots in access paths | |
671 | ||
672 | -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100 | |
673 | ||
674 | libpve-access-control (3.0-8) unstable; urgency=low | |
675 | ||
676 | * spice: use lowercase hostname in ticktet signature | |
677 | ||
678 | -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100 | |
679 | ||
680 | libpve-access-control (3.0-7) unstable; urgency=low | |
681 | ||
682 | * check_volume_access : use parse_volname instead of path, and remove | |
683 | path related code. | |
684 | ||
685 | * use warnings instead of global -w flag. | |
686 | ||
687 | -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200 | |
688 | ||
689 | libpve-access-control (3.0-6) unstable; urgency=low | |
690 | ||
691 | * use shorter spiceproxy tickets | |
692 | ||
693 | -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200 | |
694 | ||
695 | libpve-access-control (3.0-5) unstable; urgency=low | |
696 | ||
697 | * add code to generate tickets for SPICE | |
698 | ||
699 | -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200 | |
700 | ||
701 | libpve-access-control (3.0-4) unstable; urgency=low | |
702 | ||
703 | * moved add_vm_to_pool/remove_vm_from_pool from qemu-server | |
704 | ||
705 | -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200 | |
706 | ||
707 | libpve-access-control (3.0-3) unstable; urgency=low | |
708 | ||
709 | * Add new role PVETemplateUser (and VM.Clone privilege) | |
710 | ||
711 | -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200 | |
712 | ||
713 | libpve-access-control (3.0-2) unstable; urgency=low | |
714 | ||
715 | * remove CGI.pm related code (pveproxy does not need that) | |
716 | ||
717 | -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200 | |
718 | ||
719 | libpve-access-control (3.0-1) unstable; urgency=low | |
720 | ||
721 | * bump version for wheezy release | |
722 | ||
723 | -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100 | |
724 | ||
725 | libpve-access-control (1.0-26) unstable; urgency=low | |
726 | ||
727 | * check_volume_access: fix access permissions for backup files | |
728 | ||
729 | -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100 | |
730 | ||
731 | libpve-access-control (1.0-25) unstable; urgency=low | |
732 | ||
733 | * add VM.Snapshot permission | |
734 | ||
735 | -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200 | |
736 | ||
737 | libpve-access-control (1.0-24) unstable; urgency=low | |
738 | ||
739 | * untaint path (allow root to restore arbitrary paths) | |
740 | ||
741 | -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200 | |
742 | ||
743 | libpve-access-control (1.0-23) unstable; urgency=low | |
744 | ||
745 | * correctly compute GUI capabilities (consider pools) | |
746 | ||
747 | -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200 | |
748 | ||
749 | libpve-access-control (1.0-22) unstable; urgency=low | |
750 | ||
751 | * new plugin architecture for Auth modules, minor API change for Auth | |
752 | domains (new 'delete' parameter) | |
753 | ||
754 | -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200 | |
755 | ||
756 | libpve-access-control (1.0-21) unstable; urgency=low | |
757 | ||
758 | * do not allow user names including slash | |
759 | ||
760 | -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200 | |
761 | ||
762 | libpve-access-control (1.0-20) unstable; urgency=low | |
763 | ||
764 | * add ability to fork cli workers in background | |
765 | ||
766 | -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200 | |
767 | ||
768 | libpve-access-control (1.0-19) unstable; urgency=low | |
769 | ||
770 | * return set of privileges on login - can be used to adopt GUI | |
771 | ||
772 | -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200 | |
773 | ||
774 | libpve-access-control (1.0-18) unstable; urgency=low | |
775 | ||
776 | * fix bug #151: correctly parse username inside ticket | |
777 | ||
778 | * fix bug #152: allow user to change his own password | |
779 | ||
780 | -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200 | |
781 | ||
782 | libpve-access-control (1.0-17) unstable; urgency=low | |
783 | ||
784 | * set propagate flag by default | |
785 | ||
786 | -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100 | |
787 | ||
788 | libpve-access-control (1.0-16) unstable; urgency=low | |
789 | ||
790 | * add 'pveum passwd' method | |
791 | ||
792 | -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100 | |
793 | ||
794 | libpve-access-control (1.0-15) unstable; urgency=low | |
795 | ||
796 | * Add VM.Config.CDROM privilege to PVEVMUser rule | |
797 | ||
798 | -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100 | |
799 | ||
800 | libpve-access-control (1.0-14) unstable; urgency=low | |
801 | ||
802 | * fix buf in userid-param permission check | |
803 | ||
804 | -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100 | |
805 | ||
806 | libpve-access-control (1.0-13) unstable; urgency=low | |
807 | ||
808 | * allow more characters in ldap base_dn attribute | |
809 | ||
810 | -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100 | |
811 | ||
812 | libpve-access-control (1.0-12) unstable; urgency=low | |
813 | ||
814 | * allow more characters with realm IDs | |
815 | ||
816 | -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100 | |
817 | ||
818 | libpve-access-control (1.0-11) unstable; urgency=low | |
819 | ||
820 | * fix bug in exec_api2_perm_check | |
821 | ||
822 | -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100 | |
823 | ||
824 | libpve-access-control (1.0-10) unstable; urgency=low | |
825 | ||
826 | * fix ACL group name parser | |
827 | ||
828 | * changed 'pveum aclmod' command line arguments | |
829 | ||
830 | -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100 | |
831 | ||
832 | libpve-access-control (1.0-9) unstable; urgency=low | |
833 | ||
834 | * fix bug in check_volume_access (fixes vzrestore) | |
835 | ||
836 | -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100 | |
837 | ||
838 | libpve-access-control (1.0-8) unstable; urgency=low | |
839 | ||
840 | * fix return value for empty ACL list. | |
841 | ||
842 | -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100 | |
843 | ||
844 | libpve-access-control (1.0-7) unstable; urgency=low | |
845 | ||
846 | * fix bug #85: allow root@pam to generate tickets for other users | |
847 | ||
848 | -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100 | |
849 | ||
850 | libpve-access-control (1.0-6) unstable; urgency=low | |
851 | ||
852 | * API change: allow to filter enabled/disabled users. | |
853 | ||
854 | -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100 | |
855 | ||
856 | libpve-access-control (1.0-5) unstable; urgency=low | |
857 | ||
858 | * add a way to return file changes (diffs): set_result_changes() | |
859 | ||
860 | -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100 | |
861 | ||
862 | libpve-access-control (1.0-4) unstable; urgency=low | |
863 | ||
864 | * new environment type for ha agents | |
865 | ||
866 | -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100 | |
867 | ||
868 | libpve-access-control (1.0-3) unstable; urgency=low | |
869 | ||
870 | * add support for delayed parameter parsing - We need that to disable | |
871 | file upload for normal API request (avoid DOS attacks) | |
872 | ||
873 | -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100 | |
874 | ||
875 | libpve-access-control (1.0-2) unstable; urgency=low | |
876 | ||
877 | * fix bug in fork_worker | |
878 | ||
879 | -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200 | |
880 | ||
881 | libpve-access-control (1.0-1) unstable; urgency=low | |
882 | ||
883 | * allow '-' in permission paths | |
884 | ||
885 | * bump version to 1.0 | |
886 | ||
887 | -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200 | |
888 | ||
889 | libpve-access-control (0.1) unstable; urgency=low | |
890 | ||
891 | * first dummy package - no functionality | |
892 | ||
893 | -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200 | |
894 |