]> git.proxmox.com Git - pve-access-control.git/blob - debian/changelog
26b813f92f27d67ee8a5ad208c19c7593c022a99
[pve-access-control.git] / debian / changelog
1 libpve-access-control (7.2-3) bullseye; urgency=medium
2
3 * api: token: use userid-group as API perm check to avoid being overly
4 strict through a misguided use of user id for non-root users.
5
6 * perm check: forbid undefined/empty ACL path for future proofing of against
7 above issue
8
9 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200
10
11 libpve-access-control (7.2-2) bullseye; urgency=medium
12
13 * permissions: merge propagation flag for multiple roles on a path that
14 share privilege in a deterministic way, to avoid that it gets lost
15 depending on perl's random sort, which would result in returing less
16 privileges than an auth-id actually had.
17
18 * permissions: avoid that token and user privilege intersection is to strict
19 for user permissions that have propagation disabled.
20
21 -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200
22
23 libpve-access-control (7.2-1) bullseye; urgency=medium
24
25 * user check: fix expiration/enable order
26
27 -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200
28
29 libpve-access-control (7.1-8) bullseye; urgency=medium
30
31 * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove-
32 vanished'
33
34 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200
35
36 libpve-access-control (7.1-7) bullseye; urgency=medium
37
38 * userid-group check: distinguish create and update
39
40 * api: get user: declare token schema
41
42 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100
43
44 libpve-access-control (7.1-6) bullseye; urgency=medium
45
46 * fix #3768: warn on bad u2f or webauthn settings
47
48 * tfa: when modifying others, verify the current user's password
49
50 * tfa list: account for admin permissions
51
52 * fix realm sync permissions
53
54 * fix token permission display bug
55
56 * include SDN permissions in permission tree
57
58 -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100
59
60 libpve-access-control (7.1-5) bullseye; urgency=medium
61
62 * openid: fix username-claim fallback
63
64 -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100
65
66 libpve-access-control (7.1-4) bullseye; urgency=medium
67
68 * set current origin in the webauthn config if no fixed origin was
69 configured, to support webauthn via subdomains
70
71 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
72
73 libpve-access-control (7.1-3) bullseye; urgency=medium
74
75 * openid: allow arbitrary username-claims
76
77 * openid: support configuring the prompt, scopes and ACR values
78
79 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
80
81 libpve-access-control (7.1-2) bullseye; urgency=medium
82
83 * catch incompatible tfa entries with a nice error
84
85 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
86
87 libpve-access-control (7.1-1) bullseye; urgency=medium
88
89 * tfa: map HTTP 404 error in get_tfa_entry correctly
90
91 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
92
93 libpve-access-control (7.0-7) bullseye; urgency=medium
94
95 * fix #3513: pass configured proxy to OpenID
96
97 * use rust based parser for TFA config
98
99 * use PBS-like auth api call flow,
100
101 * merge old user.cfg keys to tfa config when adding entries
102
103 * implement version checks for new tfa config writer to ensure all
104 cluster nodes are ready to avoid login issues
105
106 * tickets: add tunnel ticket
107
108 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
109
110 libpve-access-control (7.0-6) bullseye; urgency=medium
111
112 * fix regression in user deletion when realm does not enforce TFA
113
114 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
115
116 libpve-access-control (7.0-5) bullseye; urgency=medium
117
118 * acl: check path: add /sdn/vnets/* path
119
120 * fix #2302: allow deletion of users when realm enforces TFA
121
122 * api: delete user: disable user first to avoid surprise on error during the
123 various cleanup action required for user deletion (e.g., TFA, ACL, group)
124
125 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
126
127 libpve-access-control (7.0-4) bullseye; urgency=medium
128
129 * realm: add OpenID configuration
130
131 * api: implement OpenID related endpoints
132
133 * implement opt-in OpenID autocreate user feature
134
135 * api: user: add 'realm-type' to user list response
136
137 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
138
139 libpve-access-control (7.0-3) bullseye; urgency=medium
140
141 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
142 `/sdn/zones/<zone>` to allowed ACL paths
143
144 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
145
146 libpve-access-control (7.0-2) bullseye; urgency=medium
147
148 * fix #3402: add Pool.Audit privilege - custom roles containing
149 Pool.Allocate must be updated to include the new privilege.
150
151 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
152
153 libpve-access-control (7.0-1) bullseye; urgency=medium
154
155 * re-build for Debian 11 Bullseye based releases
156
157 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
158
159 libpve-access-control (6.4-1) pve; urgency=medium
160
161 * fix #1670: change PAM service name to project specific name
162
163 * fix #1500: permission path syntax check for access control
164
165 * pveum: add resource pool CLI commands
166
167 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
168
169 libpve-access-control (6.1-3) pve; urgency=medium
170
171 * partially fix #2825: authkey: rotate if it was generated in the
172 future
173
174 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
175 insensitive
176
177 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
178
179 libpve-access-control (6.1-2) pve; urgency=medium
180
181 * also check SDN permission path when computing coarse permissions heuristic
182 for UIs
183
184 * add SDN Permissions.Modify
185
186 * add VM.Config.Cloudinit
187
188 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
189
190 libpve-access-control (6.1-1) pve; urgency=medium
191
192 * pveum: add tfa delete subcommand for deleting user-TFA
193
194 * LDAP: don't complain about missing credentials on realm removal
195
196 * LDAP: skip anonymous bind when client certificate and key is configured
197
198 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
199
200 libpve-access-control (6.0-7) pve; urgency=medium
201
202 * fix #2575: die when trying to edit built-in roles
203
204 * add realm sub commands to pveum CLI tool
205
206 * api: domains: add user group sync API endpoint
207
208 * allow one to sync and import users and groups from LDAP/AD based realms
209
210 * realm: add default-sync-options to config for more convenient sync configuration
211
212 * api: token create: return also full token id for convenience
213
214 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
215
216 libpve-access-control (6.0-6) pve; urgency=medium
217
218 * API: add group members to group index
219
220 * implement API token support and management
221
222 * pveum: add 'pveum user token add/update/remove/list'
223
224 * pveum: add permissions sub-commands
225
226 * API: add 'permissions' API endpoint
227
228 * user.cfg: skip inexisting roles when parsing ACLs
229
230 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
231
232 libpve-access-control (6.0-5) pve; urgency=medium
233
234 * pveum: add list command for users, groups, ACLs and roles
235
236 * add initial permissions for experimental SDN integration
237
238 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
239
240 libpve-access-control (6.0-4) pve; urgency=medium
241
242 * ticket: use clinfo to get cluster name
243
244 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
245 SSL version
246
247 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
248
249 libpve-access-control (6.0-3) pve; urgency=medium
250
251 * fix #2433: increase possible TFA secret length
252
253 * parse user configuration: correctly parse group names in ACLs, for users
254 which begin their name with an @
255
256 * sort user.cfg entries alphabetically
257
258 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
259
260 libpve-access-control (6.0-2) pve; urgency=medium
261
262 * improve CSRF verification compatibility with newer PVE
263
264 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
265
266 libpve-access-control (6.0-1) pve; urgency=medium
267
268 * ticket: properly verify exactly 5 minute old tickets
269
270 * use hmac_sha256 instead of sha1 for CSRF token generation
271
272 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
273
274 libpve-access-control (6.0-0+1) pve; urgency=medium
275
276 * bump for Debian buster
277
278 * fix #2079: add periodic auth key rotation
279
280 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
281
282 libpve-access-control (5.1-10) unstable; urgency=medium
283
284 * add /access/user/{id}/tfa api call to get tfa types
285
286 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
287
288 libpve-access-control (5.1-9) unstable; urgency=medium
289
290 * store the tfa type in user.cfg allowing to get it without proxying the call
291 to a higher privileged daemon.
292
293 * tfa: realm required TFA should lock out users without TFA configured, as it
294 was done before Proxmox VE 5.4
295
296 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
297
298 libpve-access-control (5.1-8) unstable; urgency=medium
299
300 * U2F: ensure we save correct public key on registration
301
302 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
303
304 libpve-access-control (5.1-7) unstable; urgency=medium
305
306 * verify_ticket: allow general non-challenge tfa to be run as two step
307 call
308
309 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
310
311 libpve-access-control (5.1-6) unstable; urgency=medium
312
313 * more general 2FA configuration via priv/tfa.cfg
314
315 * add u2f api endpoints
316
317 * delete TFA entries when deleting a user
318
319 * allow users to change their TOTP settings
320
321 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
322
323 libpve-access-control (5.1-5) unstable; urgency=medium
324
325 * fix vnc ticket verification without authkey lifetime
326
327 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
328
329 libpve-access-control (5.1-4) unstable; urgency=medium
330
331 * fix #1891: Add zsh command completion for pveum
332
333 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
334 to avoid issues on upgrade, will be enabled with 6.0
335
336 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
337
338 libpve-access-control (5.1-3) unstable; urgency=medium
339
340 * api/ticket: move getting cluster name into an eval
341
342 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
343
344 libpve-access-control (5.1-2) unstable; urgency=medium
345
346 * fix #1998: correct return properties for read_role
347
348 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
349
350 libpve-access-control (5.1-1) unstable; urgency=medium
351
352 * pveum: introduce sub-commands
353
354 * register userid with completion
355
356 * fix #233: return cluster name on successful login
357
358 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
359
360 libpve-access-control (5.0-8) unstable; urgency=medium
361
362 * fix #1612: ldap: make 2nd server work with bind domains again
363
364 * fix an error message where passing a bad pool id to an API function would
365 make it complain about a wrong group name instead
366
367 * fix the API-returned permission list so that the GUI knows to show the
368 'Permissions' tab for a storage to an administrator apart from root@pam
369
370 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
371
372 libpve-access-control (5.0-7) unstable; urgency=medium
373
374 * VM.Snapshot.Rollback privilege added
375
376 * api: check for special roles before locking the usercfg
377
378 * fix #1501: pveum: die when deleting special role
379
380 * API/ticket: rework coarse grained permission computation
381
382 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
383
384 libpve-access-control (5.0-6) unstable; urgency=medium
385
386 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
387 'verify' option. For compatibility reasons this defaults to off for now,
388 but that might change with future updates.
389
390 * AD, LDAP: Add ability to specify a CA path or file, and a client
391 certificate via the 'capath', 'cert' and 'certkey' options.
392
393 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
394
395 libpve-access-control (5.0-5) unstable; urgency=medium
396
397 * change from dpkg-deb to dpkg-buildpackage
398
399 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
400
401 libpve-access-control (5.0-4) unstable; urgency=medium
402
403 * PVE/CLI/pveum.pm: call setup_default_cli_env()
404
405 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
406
407 * check_api2_permissions: avoid warning about uninitialized value
408
409 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
410
411 libpve-access-control (5.0-3) unstable; urgency=medium
412
413 * use new PVE::OTP class from pve-common
414
415 * use new PVE::Tools::encrypt_pw from pve-common
416
417 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
418
419 libpve-access-control (5.0-2) unstable; urgency=medium
420
421 * encrypt_pw: avoid '+' for crypt salt
422
423 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
424
425 libpve-access-control (5.0-1) unstable; urgency=medium
426
427 * rebuild for PVE 5.0
428
429 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
430
431 libpve-access-control (4.0-23) unstable; urgency=medium
432
433 * use new PVE::Ticket class
434
435 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
436
437 libpve-access-control (4.0-22) unstable; urgency=medium
438
439 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
440 (moved to PVE::Storage)
441
442 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
443
444 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
445
446 libpve-access-control (4.0-21) unstable; urgency=medium
447
448 * setup_default_cli_env: expect $class as first parameter
449
450 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
451
452 libpve-access-control (4.0-20) unstable; urgency=medium
453
454 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
455
456 * PVE/API2/Domains.pm: fix property description
457
458 * use new repoman for upload target
459
460 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
461
462 libpve-access-control (4.0-19) unstable; urgency=medium
463
464 * Close #833: ldap: non-anonymous bind support
465
466 * don't import 'RFC' from MIME::Base32
467
468 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
469
470 libpve-access-control (4.0-18) unstable; urgency=medium
471
472 * fix #1062: recognize base32 otp keys again
473
474 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
475
476 libpve-access-control (4.0-17) unstable; urgency=medium
477
478 * drop oathtool and libdigest-hmac-perl dependencies
479
480 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
481
482 libpve-access-control (4.0-16) unstable; urgency=medium
483
484 * use pve-doc-generator to generate man pages
485
486 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
487
488 libpve-access-control (4.0-15) unstable; urgency=medium
489
490 * Fix uninitialized warning when shadow.cfg does not exist
491
492 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
493
494 libpve-access-control (4.0-14) unstable; urgency=medium
495
496 * Add is_worker to RPCEnvironment
497
498 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
499
500 libpve-access-control (4.0-13) unstable; urgency=medium
501
502 * fix #916: allow HTTPS to access custom yubico url
503
504 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
505
506 libpve-access-control (4.0-12) unstable; urgency=medium
507
508 * Catch certificate errors instead of segfaulting
509
510 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
511
512 libpve-access-control (4.0-11) unstable; urgency=medium
513
514 * Fix #861: use safer sprintf formatting
515
516 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
517
518 libpve-access-control (4.0-10) unstable; urgency=medium
519
520 * Auth::LDAP, Auth::AD: ipv6 support
521
522 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
523
524 libpve-access-control (4.0-9) unstable; urgency=medium
525
526 * pveum: implement bash completion
527
528 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
529
530 libpve-access-control (4.0-8) unstable; urgency=medium
531
532 * remove_storage_access: cleanup of access permissions for removed storage
533
534 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
535
536 libpve-access-control (4.0-7) unstable; urgency=medium
537
538 * new helper to remove access permissions for removed VMs
539
540 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
541
542 libpve-access-control (4.0-6) unstable; urgency=medium
543
544 * improve parse_user_config, parse_shadow_config
545
546 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
547
548 libpve-access-control (4.0-5) unstable; urgency=medium
549
550 * pveum: check for $cmd being defined
551
552 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
553
554 libpve-access-control (4.0-4) unstable; urgency=medium
555
556 * use activate-noawait triggers
557
558 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
559
560 libpve-access-control (4.0-3) unstable; urgency=medium
561
562 * IPv6 fixes
563
564 * non-root buildfix
565
566 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
567
568 libpve-access-control (4.0-2) unstable; urgency=medium
569
570 * trigger pve-api-updates event
571
572 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
573
574 libpve-access-control (4.0-1) unstable; urgency=medium
575
576 * bump version for Debian Jessie
577
578 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
579
580 libpve-access-control (3.0-16) unstable; urgency=low
581
582 * root@pam can now be disabled in GUI.
583
584 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
585
586 libpve-access-control (3.0-15) unstable; urgency=low
587
588 * oath: add 'step' and 'digits' option
589
590 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
591
592 libpve-access-control (3.0-14) unstable; urgency=low
593
594 * add oath two factor auth
595
596 * add oathkeygen binary to generate keys for oath
597
598 * add yubico two factor auth
599
600 * dedend on oathtool
601
602 * depend on libmime-base32-perl
603
604 * allow to write builtin auth domains config (comment/tfa/default)
605
606 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
607
608 libpve-access-control (3.0-13) unstable; urgency=low
609
610 * use correct connection string for AD auth
611
612 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
613
614 libpve-access-control (3.0-12) unstable; urgency=low
615
616 * add dummy API for GET /access/ticket (useful to generate login pages)
617
618 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
619
620 libpve-access-control (3.0-11) unstable; urgency=low
621
622 * Sets common hot keys for spice client
623
624 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
625
626 libpve-access-control (3.0-10) unstable; urgency=low
627
628 * implement helper to generate SPICE remote-viewer configuration
629
630 * depend on libnet-ssleay-perl
631
632 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
633
634 libpve-access-control (3.0-9) unstable; urgency=low
635
636 * prevent user enumeration attacks
637
638 * allow dots in access paths
639
640 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
641
642 libpve-access-control (3.0-8) unstable; urgency=low
643
644 * spice: use lowercase hostname in ticktet signature
645
646 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
647
648 libpve-access-control (3.0-7) unstable; urgency=low
649
650 * check_volume_access : use parse_volname instead of path, and remove
651 path related code.
652
653 * use warnings instead of global -w flag.
654
655 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
656
657 libpve-access-control (3.0-6) unstable; urgency=low
658
659 * use shorter spiceproxy tickets
660
661 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
662
663 libpve-access-control (3.0-5) unstable; urgency=low
664
665 * add code to generate tickets for SPICE
666
667 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
668
669 libpve-access-control (3.0-4) unstable; urgency=low
670
671 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
672
673 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
674
675 libpve-access-control (3.0-3) unstable; urgency=low
676
677 * Add new role PVETemplateUser (and VM.Clone privilege)
678
679 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
680
681 libpve-access-control (3.0-2) unstable; urgency=low
682
683 * remove CGI.pm related code (pveproxy does not need that)
684
685 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
686
687 libpve-access-control (3.0-1) unstable; urgency=low
688
689 * bump version for wheezy release
690
691 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
692
693 libpve-access-control (1.0-26) unstable; urgency=low
694
695 * check_volume_access: fix access permissions for backup files
696
697 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
698
699 libpve-access-control (1.0-25) unstable; urgency=low
700
701 * add VM.Snapshot permission
702
703 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
704
705 libpve-access-control (1.0-24) unstable; urgency=low
706
707 * untaint path (allow root to restore arbitrary paths)
708
709 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
710
711 libpve-access-control (1.0-23) unstable; urgency=low
712
713 * correctly compute GUI capabilities (consider pools)
714
715 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
716
717 libpve-access-control (1.0-22) unstable; urgency=low
718
719 * new plugin architecture for Auth modules, minor API change for Auth
720 domains (new 'delete' parameter)
721
722 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
723
724 libpve-access-control (1.0-21) unstable; urgency=low
725
726 * do not allow user names including slash
727
728 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
729
730 libpve-access-control (1.0-20) unstable; urgency=low
731
732 * add ability to fork cli workers in background
733
734 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
735
736 libpve-access-control (1.0-19) unstable; urgency=low
737
738 * return set of privileges on login - can be used to adopt GUI
739
740 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
741
742 libpve-access-control (1.0-18) unstable; urgency=low
743
744 * fix bug #151: correctly parse username inside ticket
745
746 * fix bug #152: allow user to change his own password
747
748 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
749
750 libpve-access-control (1.0-17) unstable; urgency=low
751
752 * set propagate flag by default
753
754 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
755
756 libpve-access-control (1.0-16) unstable; urgency=low
757
758 * add 'pveum passwd' method
759
760 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
761
762 libpve-access-control (1.0-15) unstable; urgency=low
763
764 * Add VM.Config.CDROM privilege to PVEVMUser rule
765
766 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
767
768 libpve-access-control (1.0-14) unstable; urgency=low
769
770 * fix buf in userid-param permission check
771
772 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
773
774 libpve-access-control (1.0-13) unstable; urgency=low
775
776 * allow more characters in ldap base_dn attribute
777
778 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
779
780 libpve-access-control (1.0-12) unstable; urgency=low
781
782 * allow more characters with realm IDs
783
784 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
785
786 libpve-access-control (1.0-11) unstable; urgency=low
787
788 * fix bug in exec_api2_perm_check
789
790 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
791
792 libpve-access-control (1.0-10) unstable; urgency=low
793
794 * fix ACL group name parser
795
796 * changed 'pveum aclmod' command line arguments
797
798 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
799
800 libpve-access-control (1.0-9) unstable; urgency=low
801
802 * fix bug in check_volume_access (fixes vzrestore)
803
804 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
805
806 libpve-access-control (1.0-8) unstable; urgency=low
807
808 * fix return value for empty ACL list.
809
810 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
811
812 libpve-access-control (1.0-7) unstable; urgency=low
813
814 * fix bug #85: allow root@pam to generate tickets for other users
815
816 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
817
818 libpve-access-control (1.0-6) unstable; urgency=low
819
820 * API change: allow to filter enabled/disabled users.
821
822 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
823
824 libpve-access-control (1.0-5) unstable; urgency=low
825
826 * add a way to return file changes (diffs): set_result_changes()
827
828 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
829
830 libpve-access-control (1.0-4) unstable; urgency=low
831
832 * new environment type for ha agents
833
834 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
835
836 libpve-access-control (1.0-3) unstable; urgency=low
837
838 * add support for delayed parameter parsing - We need that to disable
839 file upload for normal API request (avoid DOS attacks)
840
841 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
842
843 libpve-access-control (1.0-2) unstable; urgency=low
844
845 * fix bug in fork_worker
846
847 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
848
849 libpve-access-control (1.0-1) unstable; urgency=low
850
851 * allow '-' in permission paths
852
853 * bump version to 1.0
854
855 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
856
857 libpve-access-control (0.1) unstable; urgency=low
858
859 * first dummy package - no functionality
860
861 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200
862