]> git.proxmox.com Git - pve-access-control.git/blob - debian/changelog
bump version to 8.1.0
[pve-access-control.git] / debian / changelog
1 libpve-access-control (8.1.0) bookworm; urgency=medium
2
3 * api: user: limit the legacy user-keys option to the depreacated values
4 that could be set in the first limited TFA system, like e.g., 'x!yubico'
5 or base32 encoded secrets.
6
7 * oidc: enforce generic URI regex for the ACR value to align with OIDC
8 specifications and with Proxmox Backup Server, which was recently changed
9 to actually be less strict.
10
11 * LDAP sync: improve validation of synced attributes, closely limit the
12 mapped attributes names and their values to avoid glitches through odd
13 LDIF entries.
14
15 * api: user: limit maximum length for first & last name to 1024 characters,
16 email to 254 characters (the maximum actually useable in practice) and
17 comment properties to 2048 characters. This avoid that a few single users
18 bloat the user.cfg to much by mistake, reducing the total amount of users
19 and ACLs that can be set up. Note that only users with User.Modify and
20 realm syncs (setup by admins) can change these in the first place, so this
21 is mostly to avoid mishaps and just to be sure.
22
23 -- Proxmox Support Team <support@proxmox.com> Thu, 08 Feb 2024 17:50:59 +0100
24
25 libpve-access-control (8.0.7) bookworm; urgency=medium
26
27 * fix #1148: allow up to three levels of pool nesting
28
29 * pools: record parent/subpool information
30
31 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Nov 2023 12:24:13 +0100
32
33 libpve-access-control (8.0.6) bookworm; urgency=medium
34
35 * perms: fix wrong /pools entry in default set of ACL paths
36
37 * acl: add missing SDN ACL paths to allowed list
38
39 -- Proxmox Support Team <support@proxmox.com> Fri, 17 Nov 2023 08:27:11 +0100
40
41 libpve-access-control (8.0.5) bookworm; urgency=medium
42
43 * fix an issue where setting ldap passwords would refuse to work unless
44 at least one additional property was changed as well
45
46 * add 'check-connection' parameter to create and update endpoints for ldap
47 based realms
48
49 -- Proxmox Support Team <support@proxmox.com> Fri, 11 Aug 2023 13:35:23 +0200
50
51 libpve-access-control (8.0.4) bookworm; urgency=medium
52
53 * Lookup of second factors is no longer tied to the 'keys' field in the
54 user.cfg. This fixes an issue where certain LDAP/AD sync job settings
55 could disable user-configured 2nd factors.
56
57 * Existing-but-disabled TFA factors can no longer circumvent realm-mandated
58 TFA.
59
60 -- Proxmox Support Team <support@proxmox.com> Thu, 20 Jul 2023 10:59:21 +0200
61
62 libpve-access-control (8.0.3) bookworm; urgency=medium
63
64 * pveum: list tfa: recovery keys have no descriptions
65
66 * pveum: list tfa: sort by user ID
67
68 * drop assert_new_tfa_config_available for Proxmox VE 8, as the new format
69 is understood since pve-manager 7.0-15, and users must upgrade to Proxmox
70 VE 7.4 before upgrading to Proxmox VE 8 in addition to that.
71
72 -- Proxmox Support Team <support@proxmox.com> Wed, 21 Jun 2023 19:45:29 +0200
73
74 libpve-access-control (8.0.2) bookworm; urgency=medium
75
76 * api: users: sort groups to avoid "flapping" text
77
78 * api: tfa: don't block tokens from viewing and list TFA entries, both are
79 safe to do for anybody with enough permissions to view a user.
80
81 * api: tfa: add missing links for child-routes
82
83 -- Proxmox Support Team <support@proxmox.com> Wed, 21 Jun 2023 18:13:54 +0200
84
85 libpve-access-control (8.0.1) bookworm; urgency=medium
86
87 * tfa: cope with native versions in cluster version check
88
89 -- Proxmox Support Team <support@proxmox.com> Fri, 09 Jun 2023 16:12:01 +0200
90
91 libpve-access-control (8.0.0) bookworm; urgency=medium
92
93 * api: roles: forbid creating new roles starting with "PVE" namespace
94
95 -- Proxmox Support Team <support@proxmox.com> Fri, 09 Jun 2023 10:14:28 +0200
96
97 libpve-access-control (8.0.0~3) bookworm; urgency=medium
98
99 * rpcenv: api permission heuristic: query Sys.Modify for root ACL-path
100
101 * access control: add /sdn/zones/<zone>/<vnet>/<vlan> ACL object path
102
103 * add helper for checking bridge access
104
105 * add new SDN.Use privilege in PVESDNUser role, allowing one to specify
106 which user are allowed to use a bridge (or vnet, if SDN is installed)
107
108 * add privileges and paths for cluster resource mapping
109
110 -- Proxmox Support Team <support@proxmox.com> Wed, 07 Jun 2023 19:06:54 +0200
111
112 libpve-access-control (8.0.0~2) bookworm; urgency=medium
113
114 * api: user index: only include existing tfa lock flags
115
116 * add realm-sync plugin for jobs and CRUD api for realm-sync-jobs
117
118 * roles: only include Permissions.Modify in Administrator built-in role.
119 As, depending on the ACL object path, this privilege might allow one to
120 change their own permissions, which was making the distinction between
121 Admin and PVEAdmin irrelevant.
122
123 * acls: restrict less-privileged ACL modifications. Through allocate
124 permissions in pools, storages and virtual guests one can do some ACL
125 modifications without having the Permissions.Modify privilege, lock those
126 better down to ensure that one can only hand out only the subset of their
127 own privileges, never more. Note that this is mostly future proofing, as
128 the ACL object paths one could give out more permissions where already
129 limiting the scope.
130
131 -- Proxmox Support Team <support@proxmox.com> Wed, 07 Jun 2023 11:34:30 +0200
132
133 libpve-access-control (8.0.0~1) bookworm; urgency=medium
134
135 * bump pve-rs dependency to 0.8.3
136
137 * drop old verify_tfa api call (POST /access/tfa)
138
139 * drop support for old login API:
140 - 'new-format' is now considured to be 1 and ignored by the API
141
142 * pam auth: set PAM_RHOST to allow pam configs to log/restrict/... by remote
143 address
144
145 * cli: add 'pveum tfa list'
146
147 * cli: add 'pveum tfa unlock'
148
149 * enable lockout of TFA:
150 - too many TOTP attempts will lock out of TOTP
151 - using a recovery key will unlock TOTP
152 - too many TFA attempts will lock a user's TFA auth for an hour
153
154 * api: add /access/users/<userid>/unlock-tfa to unlock a user's TFA
155 authentication if it was locked by too many wrong 2nd factor login attempts
156
157 * api: /access/tfa and /access/users now include the tfa lockout status
158
159 -- Proxmox Support Team <support@proxmox.com> Mon, 05 Jun 2023 14:52:29 +0200
160
161 libpve-access-control (7.99.0) bookworm; urgency=medium
162
163 * initial re-build for Proxmox VE 8.x series
164
165 * switch to native versioning
166
167 -- Proxmox Support Team <support@proxmox.com> Sun, 21 May 2023 10:34:19 +0200
168
169 libpve-access-control (7.4-3) bullseye; urgency=medium
170
171 * use new 2nd factor verification from pve-rs
172
173 -- Proxmox Support Team <support@proxmox.com> Tue, 16 May 2023 13:31:28 +0200
174
175 libpve-access-control (7.4-2) bullseye; urgency=medium
176
177 * fix #4609: fix regression where a valid DN in the ldap/ad realm config
178 wasn't accepted anymore
179
180 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Mar 2023 15:44:21 +0100
181
182 libpve-access-control (7.4-1) bullseye; urgency=medium
183
184 * realm sync: refactor scope/remove-vanished into a standard option
185
186 * ldap: Allow quoted values for DN attribute values
187
188 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Mar 2023 17:16:11 +0100
189
190 libpve-access-control (7.3-2) bullseye; urgency=medium
191
192 * fix #4518: dramatically improve ACL computation performance
193
194 * userid format: clarify that this is the full name@realm in description
195
196 -- Proxmox Support Team <support@proxmox.com> Mon, 06 Mar 2023 11:40:11 +0100
197
198 libpve-access-control (7.3-1) bullseye; urgency=medium
199
200 * realm: sync: allow explicit 'none' for 'remove-vanished' option
201
202 -- Proxmox Support Team <support@proxmox.com> Fri, 16 Dec 2022 13:11:04 +0100
203
204 libpve-access-control (7.2-5) bullseye; urgency=medium
205
206 * api: realm sync: avoid separate log line for "remove-vanished" opt
207
208 * auth ldap/ad: compare group member dn case-insensitively
209
210 * two factor auth: only lock tfa config for recovery keys
211
212 * privs: add Sys.Incoming for guarding cross-cluster data streams like guest
213 migrations and storage migrations
214
215 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Nov 2022 13:09:17 +0100
216
217 libpve-access-control (7.2-4) bullseye; urgency=medium
218
219 * fix #4074: increase API OpenID code size limit to 2048
220
221 * auth key: protect against rare chance of a double rotation in clusters,
222 leaving the potential that some set of nodes have the earlier key cached,
223 that then got rotated out due to the race, resulting in a possible other
224 set of nodes having the newer key cached. This is a split view of the auth
225 key and may resulting in spurious failures if API requests are made to a
226 different node than the ticket was generated on.
227 In addition to that, the "keep validity of old tickets if signed in the
228 last two hours before rotation" logic was disabled too in such a case,
229 making such tickets invalid too early.
230 Note that both are cases where Proxmox VE was too strict, so while this
231 had no security implications it can be a nuisance, especially for
232 environments that use the API through an automated or scripted way
233
234 -- Proxmox Support Team <support@proxmox.com> Thu, 14 Jul 2022 08:36:51 +0200
235
236 libpve-access-control (7.2-3) bullseye; urgency=medium
237
238 * api: token: use userid-group as API perm check to avoid being overly
239 strict through a misguided use of user id for non-root users.
240
241 * perm check: forbid undefined/empty ACL path for future proofing of against
242 above issue
243
244 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200
245
246 libpve-access-control (7.2-2) bullseye; urgency=medium
247
248 * permissions: merge propagation flag for multiple roles on a path that
249 share privilege in a deterministic way, to avoid that it gets lost
250 depending on perl's random sort, which would result in returing less
251 privileges than an auth-id actually had.
252
253 * permissions: avoid that token and user privilege intersection is to strict
254 for user permissions that have propagation disabled.
255
256 -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200
257
258 libpve-access-control (7.2-1) bullseye; urgency=medium
259
260 * user check: fix expiration/enable order
261
262 -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200
263
264 libpve-access-control (7.1-8) bullseye; urgency=medium
265
266 * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove-
267 vanished'
268
269 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200
270
271 libpve-access-control (7.1-7) bullseye; urgency=medium
272
273 * userid-group check: distinguish create and update
274
275 * api: get user: declare token schema
276
277 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100
278
279 libpve-access-control (7.1-6) bullseye; urgency=medium
280
281 * fix #3768: warn on bad u2f or webauthn settings
282
283 * tfa: when modifying others, verify the current user's password
284
285 * tfa list: account for admin permissions
286
287 * fix realm sync permissions
288
289 * fix token permission display bug
290
291 * include SDN permissions in permission tree
292
293 -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100
294
295 libpve-access-control (7.1-5) bullseye; urgency=medium
296
297 * openid: fix username-claim fallback
298
299 -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100
300
301 libpve-access-control (7.1-4) bullseye; urgency=medium
302
303 * set current origin in the webauthn config if no fixed origin was
304 configured, to support webauthn via subdomains
305
306 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
307
308 libpve-access-control (7.1-3) bullseye; urgency=medium
309
310 * openid: allow arbitrary username-claims
311
312 * openid: support configuring the prompt, scopes and ACR values
313
314 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
315
316 libpve-access-control (7.1-2) bullseye; urgency=medium
317
318 * catch incompatible tfa entries with a nice error
319
320 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
321
322 libpve-access-control (7.1-1) bullseye; urgency=medium
323
324 * tfa: map HTTP 404 error in get_tfa_entry correctly
325
326 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
327
328 libpve-access-control (7.0-7) bullseye; urgency=medium
329
330 * fix #3513: pass configured proxy to OpenID
331
332 * use rust based parser for TFA config
333
334 * use PBS-like auth api call flow,
335
336 * merge old user.cfg keys to tfa config when adding entries
337
338 * implement version checks for new tfa config writer to ensure all
339 cluster nodes are ready to avoid login issues
340
341 * tickets: add tunnel ticket
342
343 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
344
345 libpve-access-control (7.0-6) bullseye; urgency=medium
346
347 * fix regression in user deletion when realm does not enforce TFA
348
349 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
350
351 libpve-access-control (7.0-5) bullseye; urgency=medium
352
353 * acl: check path: add /sdn/vnets/* path
354
355 * fix #2302: allow deletion of users when realm enforces TFA
356
357 * api: delete user: disable user first to avoid surprise on error during the
358 various cleanup action required for user deletion (e.g., TFA, ACL, group)
359
360 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
361
362 libpve-access-control (7.0-4) bullseye; urgency=medium
363
364 * realm: add OpenID configuration
365
366 * api: implement OpenID related endpoints
367
368 * implement opt-in OpenID autocreate user feature
369
370 * api: user: add 'realm-type' to user list response
371
372 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
373
374 libpve-access-control (7.0-3) bullseye; urgency=medium
375
376 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
377 `/sdn/zones/<zone>` to allowed ACL paths
378
379 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
380
381 libpve-access-control (7.0-2) bullseye; urgency=medium
382
383 * fix #3402: add Pool.Audit privilege - custom roles containing
384 Pool.Allocate must be updated to include the new privilege.
385
386 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
387
388 libpve-access-control (7.0-1) bullseye; urgency=medium
389
390 * re-build for Debian 11 Bullseye based releases
391
392 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
393
394 libpve-access-control (6.4-1) pve; urgency=medium
395
396 * fix #1670: change PAM service name to project specific name
397
398 * fix #1500: permission path syntax check for access control
399
400 * pveum: add resource pool CLI commands
401
402 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
403
404 libpve-access-control (6.1-3) pve; urgency=medium
405
406 * partially fix #2825: authkey: rotate if it was generated in the
407 future
408
409 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
410 insensitive
411
412 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
413
414 libpve-access-control (6.1-2) pve; urgency=medium
415
416 * also check SDN permission path when computing coarse permissions heuristic
417 for UIs
418
419 * add SDN Permissions.Modify
420
421 * add VM.Config.Cloudinit
422
423 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
424
425 libpve-access-control (6.1-1) pve; urgency=medium
426
427 * pveum: add tfa delete subcommand for deleting user-TFA
428
429 * LDAP: don't complain about missing credentials on realm removal
430
431 * LDAP: skip anonymous bind when client certificate and key is configured
432
433 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
434
435 libpve-access-control (6.0-7) pve; urgency=medium
436
437 * fix #2575: die when trying to edit built-in roles
438
439 * add realm sub commands to pveum CLI tool
440
441 * api: domains: add user group sync API endpoint
442
443 * allow one to sync and import users and groups from LDAP/AD based realms
444
445 * realm: add default-sync-options to config for more convenient sync configuration
446
447 * api: token create: return also full token id for convenience
448
449 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
450
451 libpve-access-control (6.0-6) pve; urgency=medium
452
453 * API: add group members to group index
454
455 * implement API token support and management
456
457 * pveum: add 'pveum user token add/update/remove/list'
458
459 * pveum: add permissions sub-commands
460
461 * API: add 'permissions' API endpoint
462
463 * user.cfg: skip inexisting roles when parsing ACLs
464
465 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
466
467 libpve-access-control (6.0-5) pve; urgency=medium
468
469 * pveum: add list command for users, groups, ACLs and roles
470
471 * add initial permissions for experimental SDN integration
472
473 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
474
475 libpve-access-control (6.0-4) pve; urgency=medium
476
477 * ticket: use clinfo to get cluster name
478
479 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
480 SSL version
481
482 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
483
484 libpve-access-control (6.0-3) pve; urgency=medium
485
486 * fix #2433: increase possible TFA secret length
487
488 * parse user configuration: correctly parse group names in ACLs, for users
489 which begin their name with an @
490
491 * sort user.cfg entries alphabetically
492
493 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
494
495 libpve-access-control (6.0-2) pve; urgency=medium
496
497 * improve CSRF verification compatibility with newer PVE
498
499 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
500
501 libpve-access-control (6.0-1) pve; urgency=medium
502
503 * ticket: properly verify exactly 5 minute old tickets
504
505 * use hmac_sha256 instead of sha1 for CSRF token generation
506
507 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
508
509 libpve-access-control (6.0-0+1) pve; urgency=medium
510
511 * bump for Debian buster
512
513 * fix #2079: add periodic auth key rotation
514
515 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
516
517 libpve-access-control (5.1-10) unstable; urgency=medium
518
519 * add /access/user/{id}/tfa api call to get tfa types
520
521 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
522
523 libpve-access-control (5.1-9) unstable; urgency=medium
524
525 * store the tfa type in user.cfg allowing to get it without proxying the call
526 to a higher privileged daemon.
527
528 * tfa: realm required TFA should lock out users without TFA configured, as it
529 was done before Proxmox VE 5.4
530
531 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
532
533 libpve-access-control (5.1-8) unstable; urgency=medium
534
535 * U2F: ensure we save correct public key on registration
536
537 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
538
539 libpve-access-control (5.1-7) unstable; urgency=medium
540
541 * verify_ticket: allow general non-challenge tfa to be run as two step
542 call
543
544 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
545
546 libpve-access-control (5.1-6) unstable; urgency=medium
547
548 * more general 2FA configuration via priv/tfa.cfg
549
550 * add u2f api endpoints
551
552 * delete TFA entries when deleting a user
553
554 * allow users to change their TOTP settings
555
556 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
557
558 libpve-access-control (5.1-5) unstable; urgency=medium
559
560 * fix vnc ticket verification without authkey lifetime
561
562 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
563
564 libpve-access-control (5.1-4) unstable; urgency=medium
565
566 * fix #1891: Add zsh command completion for pveum
567
568 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
569 to avoid issues on upgrade, will be enabled with 6.0
570
571 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
572
573 libpve-access-control (5.1-3) unstable; urgency=medium
574
575 * api/ticket: move getting cluster name into an eval
576
577 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
578
579 libpve-access-control (5.1-2) unstable; urgency=medium
580
581 * fix #1998: correct return properties for read_role
582
583 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
584
585 libpve-access-control (5.1-1) unstable; urgency=medium
586
587 * pveum: introduce sub-commands
588
589 * register userid with completion
590
591 * fix #233: return cluster name on successful login
592
593 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
594
595 libpve-access-control (5.0-8) unstable; urgency=medium
596
597 * fix #1612: ldap: make 2nd server work with bind domains again
598
599 * fix an error message where passing a bad pool id to an API function would
600 make it complain about a wrong group name instead
601
602 * fix the API-returned permission list so that the GUI knows to show the
603 'Permissions' tab for a storage to an administrator apart from root@pam
604
605 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
606
607 libpve-access-control (5.0-7) unstable; urgency=medium
608
609 * VM.Snapshot.Rollback privilege added
610
611 * api: check for special roles before locking the usercfg
612
613 * fix #1501: pveum: die when deleting special role
614
615 * API/ticket: rework coarse grained permission computation
616
617 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
618
619 libpve-access-control (5.0-6) unstable; urgency=medium
620
621 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
622 'verify' option. For compatibility reasons this defaults to off for now,
623 but that might change with future updates.
624
625 * AD, LDAP: Add ability to specify a CA path or file, and a client
626 certificate via the 'capath', 'cert' and 'certkey' options.
627
628 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
629
630 libpve-access-control (5.0-5) unstable; urgency=medium
631
632 * change from dpkg-deb to dpkg-buildpackage
633
634 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
635
636 libpve-access-control (5.0-4) unstable; urgency=medium
637
638 * PVE/CLI/pveum.pm: call setup_default_cli_env()
639
640 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
641
642 * check_api2_permissions: avoid warning about uninitialized value
643
644 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
645
646 libpve-access-control (5.0-3) unstable; urgency=medium
647
648 * use new PVE::OTP class from pve-common
649
650 * use new PVE::Tools::encrypt_pw from pve-common
651
652 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
653
654 libpve-access-control (5.0-2) unstable; urgency=medium
655
656 * encrypt_pw: avoid '+' for crypt salt
657
658 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
659
660 libpve-access-control (5.0-1) unstable; urgency=medium
661
662 * rebuild for PVE 5.0
663
664 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
665
666 libpve-access-control (4.0-23) unstable; urgency=medium
667
668 * use new PVE::Ticket class
669
670 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
671
672 libpve-access-control (4.0-22) unstable; urgency=medium
673
674 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
675 (moved to PVE::Storage)
676
677 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
678
679 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
680
681 libpve-access-control (4.0-21) unstable; urgency=medium
682
683 * setup_default_cli_env: expect $class as first parameter
684
685 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
686
687 libpve-access-control (4.0-20) unstable; urgency=medium
688
689 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
690
691 * PVE/API2/Domains.pm: fix property description
692
693 * use new repoman for upload target
694
695 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
696
697 libpve-access-control (4.0-19) unstable; urgency=medium
698
699 * Close #833: ldap: non-anonymous bind support
700
701 * don't import 'RFC' from MIME::Base32
702
703 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
704
705 libpve-access-control (4.0-18) unstable; urgency=medium
706
707 * fix #1062: recognize base32 otp keys again
708
709 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
710
711 libpve-access-control (4.0-17) unstable; urgency=medium
712
713 * drop oathtool and libdigest-hmac-perl dependencies
714
715 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
716
717 libpve-access-control (4.0-16) unstable; urgency=medium
718
719 * use pve-doc-generator to generate man pages
720
721 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
722
723 libpve-access-control (4.0-15) unstable; urgency=medium
724
725 * Fix uninitialized warning when shadow.cfg does not exist
726
727 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
728
729 libpve-access-control (4.0-14) unstable; urgency=medium
730
731 * Add is_worker to RPCEnvironment
732
733 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
734
735 libpve-access-control (4.0-13) unstable; urgency=medium
736
737 * fix #916: allow HTTPS to access custom yubico url
738
739 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
740
741 libpve-access-control (4.0-12) unstable; urgency=medium
742
743 * Catch certificate errors instead of segfaulting
744
745 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
746
747 libpve-access-control (4.0-11) unstable; urgency=medium
748
749 * Fix #861: use safer sprintf formatting
750
751 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
752
753 libpve-access-control (4.0-10) unstable; urgency=medium
754
755 * Auth::LDAP, Auth::AD: ipv6 support
756
757 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
758
759 libpve-access-control (4.0-9) unstable; urgency=medium
760
761 * pveum: implement bash completion
762
763 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
764
765 libpve-access-control (4.0-8) unstable; urgency=medium
766
767 * remove_storage_access: cleanup of access permissions for removed storage
768
769 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
770
771 libpve-access-control (4.0-7) unstable; urgency=medium
772
773 * new helper to remove access permissions for removed VMs
774
775 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
776
777 libpve-access-control (4.0-6) unstable; urgency=medium
778
779 * improve parse_user_config, parse_shadow_config
780
781 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
782
783 libpve-access-control (4.0-5) unstable; urgency=medium
784
785 * pveum: check for $cmd being defined
786
787 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
788
789 libpve-access-control (4.0-4) unstable; urgency=medium
790
791 * use activate-noawait triggers
792
793 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
794
795 libpve-access-control (4.0-3) unstable; urgency=medium
796
797 * IPv6 fixes
798
799 * non-root buildfix
800
801 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
802
803 libpve-access-control (4.0-2) unstable; urgency=medium
804
805 * trigger pve-api-updates event
806
807 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
808
809 libpve-access-control (4.0-1) unstable; urgency=medium
810
811 * bump version for Debian Jessie
812
813 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
814
815 libpve-access-control (3.0-16) unstable; urgency=low
816
817 * root@pam can now be disabled in GUI.
818
819 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
820
821 libpve-access-control (3.0-15) unstable; urgency=low
822
823 * oath: add 'step' and 'digits' option
824
825 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
826
827 libpve-access-control (3.0-14) unstable; urgency=low
828
829 * add oath two factor auth
830
831 * add oathkeygen binary to generate keys for oath
832
833 * add yubico two factor auth
834
835 * dedend on oathtool
836
837 * depend on libmime-base32-perl
838
839 * allow to write builtin auth domains config (comment/tfa/default)
840
841 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
842
843 libpve-access-control (3.0-13) unstable; urgency=low
844
845 * use correct connection string for AD auth
846
847 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
848
849 libpve-access-control (3.0-12) unstable; urgency=low
850
851 * add dummy API for GET /access/ticket (useful to generate login pages)
852
853 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
854
855 libpve-access-control (3.0-11) unstable; urgency=low
856
857 * Sets common hot keys for spice client
858
859 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
860
861 libpve-access-control (3.0-10) unstable; urgency=low
862
863 * implement helper to generate SPICE remote-viewer configuration
864
865 * depend on libnet-ssleay-perl
866
867 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
868
869 libpve-access-control (3.0-9) unstable; urgency=low
870
871 * prevent user enumeration attacks
872
873 * allow dots in access paths
874
875 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
876
877 libpve-access-control (3.0-8) unstable; urgency=low
878
879 * spice: use lowercase hostname in ticktet signature
880
881 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
882
883 libpve-access-control (3.0-7) unstable; urgency=low
884
885 * check_volume_access : use parse_volname instead of path, and remove
886 path related code.
887
888 * use warnings instead of global -w flag.
889
890 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
891
892 libpve-access-control (3.0-6) unstable; urgency=low
893
894 * use shorter spiceproxy tickets
895
896 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
897
898 libpve-access-control (3.0-5) unstable; urgency=low
899
900 * add code to generate tickets for SPICE
901
902 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
903
904 libpve-access-control (3.0-4) unstable; urgency=low
905
906 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
907
908 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
909
910 libpve-access-control (3.0-3) unstable; urgency=low
911
912 * Add new role PVETemplateUser (and VM.Clone privilege)
913
914 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
915
916 libpve-access-control (3.0-2) unstable; urgency=low
917
918 * remove CGI.pm related code (pveproxy does not need that)
919
920 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
921
922 libpve-access-control (3.0-1) unstable; urgency=low
923
924 * bump version for wheezy release
925
926 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
927
928 libpve-access-control (1.0-26) unstable; urgency=low
929
930 * check_volume_access: fix access permissions for backup files
931
932 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
933
934 libpve-access-control (1.0-25) unstable; urgency=low
935
936 * add VM.Snapshot permission
937
938 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
939
940 libpve-access-control (1.0-24) unstable; urgency=low
941
942 * untaint path (allow root to restore arbitrary paths)
943
944 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
945
946 libpve-access-control (1.0-23) unstable; urgency=low
947
948 * correctly compute GUI capabilities (consider pools)
949
950 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
951
952 libpve-access-control (1.0-22) unstable; urgency=low
953
954 * new plugin architecture for Auth modules, minor API change for Auth
955 domains (new 'delete' parameter)
956
957 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
958
959 libpve-access-control (1.0-21) unstable; urgency=low
960
961 * do not allow user names including slash
962
963 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
964
965 libpve-access-control (1.0-20) unstable; urgency=low
966
967 * add ability to fork cli workers in background
968
969 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
970
971 libpve-access-control (1.0-19) unstable; urgency=low
972
973 * return set of privileges on login - can be used to adopt GUI
974
975 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
976
977 libpve-access-control (1.0-18) unstable; urgency=low
978
979 * fix bug #151: correctly parse username inside ticket
980
981 * fix bug #152: allow user to change his own password
982
983 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
984
985 libpve-access-control (1.0-17) unstable; urgency=low
986
987 * set propagate flag by default
988
989 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
990
991 libpve-access-control (1.0-16) unstable; urgency=low
992
993 * add 'pveum passwd' method
994
995 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
996
997 libpve-access-control (1.0-15) unstable; urgency=low
998
999 * Add VM.Config.CDROM privilege to PVEVMUser rule
1000
1001 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
1002
1003 libpve-access-control (1.0-14) unstable; urgency=low
1004
1005 * fix buf in userid-param permission check
1006
1007 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
1008
1009 libpve-access-control (1.0-13) unstable; urgency=low
1010
1011 * allow more characters in ldap base_dn attribute
1012
1013 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
1014
1015 libpve-access-control (1.0-12) unstable; urgency=low
1016
1017 * allow more characters with realm IDs
1018
1019 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
1020
1021 libpve-access-control (1.0-11) unstable; urgency=low
1022
1023 * fix bug in exec_api2_perm_check
1024
1025 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
1026
1027 libpve-access-control (1.0-10) unstable; urgency=low
1028
1029 * fix ACL group name parser
1030
1031 * changed 'pveum aclmod' command line arguments
1032
1033 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
1034
1035 libpve-access-control (1.0-9) unstable; urgency=low
1036
1037 * fix bug in check_volume_access (fixes vzrestore)
1038
1039 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
1040
1041 libpve-access-control (1.0-8) unstable; urgency=low
1042
1043 * fix return value for empty ACL list.
1044
1045 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
1046
1047 libpve-access-control (1.0-7) unstable; urgency=low
1048
1049 * fix bug #85: allow root@pam to generate tickets for other users
1050
1051 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
1052
1053 libpve-access-control (1.0-6) unstable; urgency=low
1054
1055 * API change: allow to filter enabled/disabled users.
1056
1057 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
1058
1059 libpve-access-control (1.0-5) unstable; urgency=low
1060
1061 * add a way to return file changes (diffs): set_result_changes()
1062
1063 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
1064
1065 libpve-access-control (1.0-4) unstable; urgency=low
1066
1067 * new environment type for ha agents
1068
1069 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
1070
1071 libpve-access-control (1.0-3) unstable; urgency=low
1072
1073 * add support for delayed parameter parsing - We need that to disable
1074 file upload for normal API request (avoid DOS attacks)
1075
1076 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
1077
1078 libpve-access-control (1.0-2) unstable; urgency=low
1079
1080 * fix bug in fork_worker
1081
1082 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
1083
1084 libpve-access-control (1.0-1) unstable; urgency=low
1085
1086 * allow '-' in permission paths
1087
1088 * bump version to 1.0
1089
1090 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
1091
1092 libpve-access-control (0.1) unstable; urgency=low
1093
1094 * first dummy package - no functionality
1095
1096 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200
1097