]> git.proxmox.com Git - pve-access-control.git/blame - debian/changelog
fix #5335: sort ACL entries in user.cfg
[pve-access-control.git] / debian / changelog
CommitLineData
787e4c06
TL
1libpve-access-control (8.1.3) bookworm; urgency=medium
2
3 * user: password change: require confirmation-password parameter so that
4 anybody gaining local or physical access to a device where a user is
5 logged in on a Proxmox VE web-interface cannot give them more permanent
6 access or deny the actual user accessing their account by changing the
7 password. Note that such an attack scenario means that the attacker
8 already has high privileges and can already control the resource
9 completely through another attack.
10 Such initial attacks (like stealing an unlocked device) are almost always
11 are outside of the control of our projects. Still, hardening the API a bit
12 by requiring a confirmation of the original password is to cheap to
13 implement to not do so.
14
15 * jobs: realm sync: fix scheduled LDAP syncs not applying all attributes,
16 like comments, correctly
17
18 -- Proxmox Support Team <support@proxmox.com> Fri, 22 Mar 2024 14:14:36 +0100
19
85f61297
TL
20libpve-access-control (8.1.2) bookworm; urgency=medium
21
22 * add Sys.AccessNetwork privilege
23
24 -- Proxmox Support Team <support@proxmox.com> Wed, 28 Feb 2024 15:42:12 +0100
25
588927f1
TL
26libpve-access-control (8.1.1) bookworm; urgency=medium
27
28 * LDAP sync: fix-up assembling valid attribute set
29
30 -- Proxmox Support Team <support@proxmox.com> Thu, 08 Feb 2024 19:03:26 +0100
31
6324cbb3
TL
32libpve-access-control (8.1.0) bookworm; urgency=medium
33
34 * api: user: limit the legacy user-keys option to the depreacated values
35 that could be set in the first limited TFA system, like e.g., 'x!yubico'
36 or base32 encoded secrets.
37
38 * oidc: enforce generic URI regex for the ACR value to align with OIDC
39 specifications and with Proxmox Backup Server, which was recently changed
40 to actually be less strict.
41
42 * LDAP sync: improve validation of synced attributes, closely limit the
43 mapped attributes names and their values to avoid glitches through odd
44 LDIF entries.
45
46 * api: user: limit maximum length for first & last name to 1024 characters,
47 email to 254 characters (the maximum actually useable in practice) and
48 comment properties to 2048 characters. This avoid that a few single users
49 bloat the user.cfg to much by mistake, reducing the total amount of users
50 and ACLs that can be set up. Note that only users with User.Modify and
51 realm syncs (setup by admins) can change these in the first place, so this
52 is mostly to avoid mishaps and just to be sure.
53
54 -- Proxmox Support Team <support@proxmox.com> Thu, 08 Feb 2024 17:50:59 +0100
55
ffc4e503
WB
56libpve-access-control (8.0.7) bookworm; urgency=medium
57
58 * fix #1148: allow up to three levels of pool nesting
59
60 * pools: record parent/subpool information
61
62 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Nov 2023 12:24:13 +0100
63
401e3205
TL
64libpve-access-control (8.0.6) bookworm; urgency=medium
65
66 * perms: fix wrong /pools entry in default set of ACL paths
67
68 * acl: add missing SDN ACL paths to allowed list
69
70 -- Proxmox Support Team <support@proxmox.com> Fri, 17 Nov 2023 08:27:11 +0100
71
b8a52eac
WB
72libpve-access-control (8.0.5) bookworm; urgency=medium
73
74 * fix an issue where setting ldap passwords would refuse to work unless
75 at least one additional property was changed as well
76
77 * add 'check-connection' parameter to create and update endpoints for ldap
78 based realms
79
80 -- Proxmox Support Team <support@proxmox.com> Fri, 11 Aug 2023 13:35:23 +0200
81
33e4480a
WB
82libpve-access-control (8.0.4) bookworm; urgency=medium
83
84 * Lookup of second factors is no longer tied to the 'keys' field in the
85 user.cfg. This fixes an issue where certain LDAP/AD sync job settings
86 could disable user-configured 2nd factors.
87
88 * Existing-but-disabled TFA factors can no longer circumvent realm-mandated
89 TFA.
90
91 -- Proxmox Support Team <support@proxmox.com> Thu, 20 Jul 2023 10:59:21 +0200
92
8a856968
TL
93libpve-access-control (8.0.3) bookworm; urgency=medium
94
95 * pveum: list tfa: recovery keys have no descriptions
96
97 * pveum: list tfa: sort by user ID
98
99 * drop assert_new_tfa_config_available for Proxmox VE 8, as the new format
100 is understood since pve-manager 7.0-15, and users must upgrade to Proxmox
101 VE 7.4 before upgrading to Proxmox VE 8 in addition to that.
102
103 -- Proxmox Support Team <support@proxmox.com> Wed, 21 Jun 2023 19:45:29 +0200
104
1852a929
TL
105libpve-access-control (8.0.2) bookworm; urgency=medium
106
107 * api: users: sort groups to avoid "flapping" text
108
109 * api: tfa: don't block tokens from viewing and list TFA entries, both are
110 safe to do for anybody with enough permissions to view a user.
111
112 * api: tfa: add missing links for child-routes
113
114 -- Proxmox Support Team <support@proxmox.com> Wed, 21 Jun 2023 18:13:54 +0200
115
ebf82c77
TL
116libpve-access-control (8.0.1) bookworm; urgency=medium
117
118 * tfa: cope with native versions in cluster version check
119
120 -- Proxmox Support Team <support@proxmox.com> Fri, 09 Jun 2023 16:12:01 +0200
121
6004f25e
TL
122libpve-access-control (8.0.0) bookworm; urgency=medium
123
124 * api: roles: forbid creating new roles starting with "PVE" namespace
125
126 -- Proxmox Support Team <support@proxmox.com> Fri, 09 Jun 2023 10:14:28 +0200
127
8e8023b1
TL
128libpve-access-control (8.0.0~3) bookworm; urgency=medium
129
130 * rpcenv: api permission heuristic: query Sys.Modify for root ACL-path
131
132 * access control: add /sdn/zones/<zone>/<vnet>/<vlan> ACL object path
133
134 * add helper for checking bridge access
135
136 * add new SDN.Use privilege in PVESDNUser role, allowing one to specify
137 which user are allowed to use a bridge (or vnet, if SDN is installed)
138
139 * add privileges and paths for cluster resource mapping
140
141 -- Proxmox Support Team <support@proxmox.com> Wed, 07 Jun 2023 19:06:54 +0200
142
3ef602fe
TL
143libpve-access-control (8.0.0~2) bookworm; urgency=medium
144
145 * api: user index: only include existing tfa lock flags
146
147 * add realm-sync plugin for jobs and CRUD api for realm-sync-jobs
148
149 * roles: only include Permissions.Modify in Administrator built-in role.
150 As, depending on the ACL object path, this privilege might allow one to
151 change their own permissions, which was making the distinction between
152 Admin and PVEAdmin irrelevant.
153
154 * acls: restrict less-privileged ACL modifications. Through allocate
155 permissions in pools, storages and virtual guests one can do some ACL
156 modifications without having the Permissions.Modify privilege, lock those
157 better down to ensure that one can only hand out only the subset of their
158 own privileges, never more. Note that this is mostly future proofing, as
159 the ACL object paths one could give out more permissions where already
160 limiting the scope.
161
162 -- Proxmox Support Team <support@proxmox.com> Wed, 07 Jun 2023 11:34:30 +0200
163
f63364a7
WB
164libpve-access-control (8.0.0~1) bookworm; urgency=medium
165
166 * bump pve-rs dependency to 0.8.3
167
168 * drop old verify_tfa api call (POST /access/tfa)
169
170 * drop support for old login API:
171 - 'new-format' is now considured to be 1 and ignored by the API
172
173 * pam auth: set PAM_RHOST to allow pam configs to log/restrict/... by remote
174 address
175
176 * cli: add 'pveum tfa list'
177
178 * cli: add 'pveum tfa unlock'
179
180 * enable lockout of TFA:
181 - too many TOTP attempts will lock out of TOTP
182 - using a recovery key will unlock TOTP
183 - too many TFA attempts will lock a user's TFA auth for an hour
184
185 * api: add /access/users/<userid>/unlock-tfa to unlock a user's TFA
186 authentication if it was locked by too many wrong 2nd factor login attempts
187
188 * api: /access/tfa and /access/users now include the tfa lockout status
189
190 -- Proxmox Support Team <support@proxmox.com> Mon, 05 Jun 2023 14:52:29 +0200
191
a3dc6ff4
TL
192libpve-access-control (7.99.0) bookworm; urgency=medium
193
194 * initial re-build for Proxmox VE 8.x series
195
196 * switch to native versioning
197
198 -- Proxmox Support Team <support@proxmox.com> Sun, 21 May 2023 10:34:19 +0200
199
f2762a03
WB
200libpve-access-control (7.4-3) bullseye; urgency=medium
201
202 * use new 2nd factor verification from pve-rs
203
204 -- Proxmox Support Team <support@proxmox.com> Tue, 16 May 2023 13:31:28 +0200
205
f0595d15
TL
206libpve-access-control (7.4-2) bullseye; urgency=medium
207
208 * fix #4609: fix regression where a valid DN in the ldap/ad realm config
209 wasn't accepted anymore
210
211 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Mar 2023 15:44:21 +0100
212
a23eaa1a
TL
213libpve-access-control (7.4-1) bullseye; urgency=medium
214
215 * realm sync: refactor scope/remove-vanished into a standard option
216
217 * ldap: Allow quoted values for DN attribute values
218
219 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Mar 2023 17:16:11 +0100
220
df33b3b9
TL
221libpve-access-control (7.3-2) bullseye; urgency=medium
222
223 * fix #4518: dramatically improve ACL computation performance
224
225 * userid format: clarify that this is the full name@realm in description
226
227 -- Proxmox Support Team <support@proxmox.com> Mon, 06 Mar 2023 11:40:11 +0100
228
2da8c203
TL
229libpve-access-control (7.3-1) bullseye; urgency=medium
230
231 * realm: sync: allow explicit 'none' for 'remove-vanished' option
232
233 -- Proxmox Support Team <support@proxmox.com> Fri, 16 Dec 2022 13:11:04 +0100
234
b84bf623
TL
235libpve-access-control (7.2-5) bullseye; urgency=medium
236
237 * api: realm sync: avoid separate log line for "remove-vanished" opt
238
239 * auth ldap/ad: compare group member dn case-insensitively
240
241 * two factor auth: only lock tfa config for recovery keys
242
243 * privs: add Sys.Incoming for guarding cross-cluster data streams like guest
244 migrations and storage migrations
245
246 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Nov 2022 13:09:17 +0100
247
f4e68e49
TL
248libpve-access-control (7.2-4) bullseye; urgency=medium
249
250 * fix #4074: increase API OpenID code size limit to 2048
251
252 * auth key: protect against rare chance of a double rotation in clusters,
253 leaving the potential that some set of nodes have the earlier key cached,
254 that then got rotated out due to the race, resulting in a possible other
255 set of nodes having the newer key cached. This is a split view of the auth
256 key and may resulting in spurious failures if API requests are made to a
257 different node than the ticket was generated on.
258 In addition to that, the "keep validity of old tickets if signed in the
259 last two hours before rotation" logic was disabled too in such a case,
260 making such tickets invalid too early.
261 Note that both are cases where Proxmox VE was too strict, so while this
262 had no security implications it can be a nuisance, especially for
263 environments that use the API through an automated or scripted way
264
265 -- Proxmox Support Team <support@proxmox.com> Thu, 14 Jul 2022 08:36:51 +0200
266
26dde491
TL
267libpve-access-control (7.2-3) bullseye; urgency=medium
268
269 * api: token: use userid-group as API perm check to avoid being overly
270 strict through a misguided use of user id for non-root users.
271
272 * perm check: forbid undefined/empty ACL path for future proofing of against
273 above issue
274
275 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200
276
1cf4389b
TL
277libpve-access-control (7.2-2) bullseye; urgency=medium
278
279 * permissions: merge propagation flag for multiple roles on a path that
280 share privilege in a deterministic way, to avoid that it gets lost
281 depending on perl's random sort, which would result in returing less
282 privileges than an auth-id actually had.
283
284 * permissions: avoid that token and user privilege intersection is to strict
285 for user permissions that have propagation disabled.
286
287 -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200
288
e3604d48
TL
289libpve-access-control (7.2-1) bullseye; urgency=medium
290
291 * user check: fix expiration/enable order
292
293 -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200
294
79ae250f
TL
295libpve-access-control (7.1-8) bullseye; urgency=medium
296
297 * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove-
298 vanished'
299
300 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200
301
eed46286
TL
302libpve-access-control (7.1-7) bullseye; urgency=medium
303
304 * userid-group check: distinguish create and update
305
306 * api: get user: declare token schema
307
308 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100
309
cd78b295
FG
310libpve-access-control (7.1-6) bullseye; urgency=medium
311
312 * fix #3768: warn on bad u2f or webauthn settings
313
314 * tfa: when modifying others, verify the current user's password
315
316 * tfa list: account for admin permissions
317
318 * fix realm sync permissions
319
320 * fix token permission display bug
321
322 * include SDN permissions in permission tree
323
324 -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100
325
118088d8
TL
326libpve-access-control (7.1-5) bullseye; urgency=medium
327
328 * openid: fix username-claim fallback
329
330 -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100
331
ebb14277
WB
332libpve-access-control (7.1-4) bullseye; urgency=medium
333
334 * set current origin in the webauthn config if no fixed origin was
335 configured, to support webauthn via subdomains
336
337 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
338
44a55ff7
TL
339libpve-access-control (7.1-3) bullseye; urgency=medium
340
341 * openid: allow arbitrary username-claims
342
343 * openid: support configuring the prompt, scopes and ACR values
344
345 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
346
6f643e79
TL
347libpve-access-control (7.1-2) bullseye; urgency=medium
348
349 * catch incompatible tfa entries with a nice error
350
351 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
352
92bca71e
TL
353libpve-access-control (7.1-1) bullseye; urgency=medium
354
355 * tfa: map HTTP 404 error in get_tfa_entry correctly
356
357 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
358
1c9b6501
TL
359libpve-access-control (7.0-7) bullseye; urgency=medium
360
361 * fix #3513: pass configured proxy to OpenID
362
363 * use rust based parser for TFA config
364
365 * use PBS-like auth api call flow,
366
367 * merge old user.cfg keys to tfa config when adding entries
368
369 * implement version checks for new tfa config writer to ensure all
370 cluster nodes are ready to avoid login issues
371
372 * tickets: add tunnel ticket
373
374 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
375
cd46b379
TL
376libpve-access-control (7.0-6) bullseye; urgency=medium
377
378 * fix regression in user deletion when realm does not enforce TFA
379
380 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
381
52da88a8
TL
382libpve-access-control (7.0-5) bullseye; urgency=medium
383
384 * acl: check path: add /sdn/vnets/* path
385
386 * fix #2302: allow deletion of users when realm enforces TFA
387
388 * api: delete user: disable user first to avoid surprise on error during the
389 various cleanup action required for user deletion (e.g., TFA, ACL, group)
390
391 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
392
543d646c
TL
393libpve-access-control (7.0-4) bullseye; urgency=medium
394
395 * realm: add OpenID configuration
396
397 * api: implement OpenID related endpoints
398
399 * implement opt-in OpenID autocreate user feature
400
401 * api: user: add 'realm-type' to user list response
402
403 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
404
7a4c4fd8
TL
405libpve-access-control (7.0-3) bullseye; urgency=medium
406
407 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
408 `/sdn/zones/<zone>` to allowed ACL paths
409
410 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
411
0902a936
FG
412libpve-access-control (7.0-2) bullseye; urgency=medium
413
414 * fix #3402: add Pool.Audit privilege - custom roles containing
415 Pool.Allocate must be updated to include the new privilege.
416
417 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
418
67febb69
TL
419libpve-access-control (7.0-1) bullseye; urgency=medium
420
421 * re-build for Debian 11 Bullseye based releases
422
423 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
424
2942ba41
TL
425libpve-access-control (6.4-1) pve; urgency=medium
426
427 * fix #1670: change PAM service name to project specific name
428
429 * fix #1500: permission path syntax check for access control
430
431 * pveum: add resource pool CLI commands
432
433 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
434
54d312f3
TL
435libpve-access-control (6.1-3) pve; urgency=medium
436
437 * partially fix #2825: authkey: rotate if it was generated in the
438 future
439
440 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
441 insensitive
442
443 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
444
6a9be12f
TL
445libpve-access-control (6.1-2) pve; urgency=medium
446
447 * also check SDN permission path when computing coarse permissions heuristic
448 for UIs
449
450 * add SDN Permissions.Modify
451
452 * add VM.Config.Cloudinit
453
454 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
455
e6624f50
TL
456libpve-access-control (6.1-1) pve; urgency=medium
457
458 * pveum: add tfa delete subcommand for deleting user-TFA
459
460 * LDAP: don't complain about missing credentials on realm removal
461
462 * LDAP: skip anonymous bind when client certificate and key is configured
463
464 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
465
8f4a522f
TL
466libpve-access-control (6.0-7) pve; urgency=medium
467
468 * fix #2575: die when trying to edit built-in roles
469
470 * add realm sub commands to pveum CLI tool
471
7d23b7ca 472 * api: domains: add user group sync API endpoint
8f4a522f
TL
473
474 * allow one to sync and import users and groups from LDAP/AD based realms
475
476 * realm: add default-sync-options to config for more convenient sync configuration
477
478 * api: token create: return also full token id for convenience
479
480 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
481
23059f35
TL
482libpve-access-control (6.0-6) pve; urgency=medium
483
484 * API: add group members to group index
485
486 * implement API token support and management
487
488 * pveum: add 'pveum user token add/update/remove/list'
489
490 * pveum: add permissions sub-commands
491
492 * API: add 'permissions' API endpoint
493
494 * user.cfg: skip inexisting roles when parsing ACLs
495
496 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
497
3dd692e9
TL
498libpve-access-control (6.0-5) pve; urgency=medium
499
500 * pveum: add list command for users, groups, ACLs and roles
501
502 * add initial permissions for experimental SDN integration
503
504 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
505
4ef92d0d
FG
506libpve-access-control (6.0-4) pve; urgency=medium
507
508 * ticket: use clinfo to get cluster name
509
510 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
511 SSL version
512
513 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
514
6e5bbca4
TL
515libpve-access-control (6.0-3) pve; urgency=medium
516
517 * fix #2433: increase possible TFA secret length
518
519 * parse user configuration: correctly parse group names in ACLs, for users
520 which begin their name with an @
521
522 * sort user.cfg entries alphabetically
523
524 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
525
e073493c
TL
526libpve-access-control (6.0-2) pve; urgency=medium
527
528 * improve CSRF verification compatibility with newer PVE
529
530 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
531
a237dc2e
TL
532libpve-access-control (6.0-1) pve; urgency=medium
533
534 * ticket: properly verify exactly 5 minute old tickets
535
536 * use hmac_sha256 instead of sha1 for CSRF token generation
537
538 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
539
f1531f22
TL
540libpve-access-control (6.0-0+1) pve; urgency=medium
541
542 * bump for Debian buster
543
544 * fix #2079: add periodic auth key rotation
545
546 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
547
ef761f51
TL
548libpve-access-control (5.1-10) unstable; urgency=medium
549
550 * add /access/user/{id}/tfa api call to get tfa types
551
552 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
553
860ddcba
TL
554libpve-access-control (5.1-9) unstable; urgency=medium
555
556 * store the tfa type in user.cfg allowing to get it without proxying the call
7d23b7ca 557 to a higher privileged daemon.
860ddcba
TL
558
559 * tfa: realm required TFA should lock out users without TFA configured, as it
560 was done before Proxmox VE 5.4
561
562 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
563
9fbad012
TL
564libpve-access-control (5.1-8) unstable; urgency=medium
565
566 * U2F: ensure we save correct public key on registration
567
568 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
569
4473c96c
TL
570libpve-access-control (5.1-7) unstable; urgency=medium
571
572 * verify_ticket: allow general non-challenge tfa to be run as two step
573 call
574
575 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
576
a270d4e1
TL
577libpve-access-control (5.1-6) unstable; urgency=medium
578
579 * more general 2FA configuration via priv/tfa.cfg
580
581 * add u2f api endpoints
582
583 * delete TFA entries when deleting a user
584
585 * allow users to change their TOTP settings
586
587 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
588
374647e8
TL
589libpve-access-control (5.1-5) unstable; urgency=medium
590
591 * fix vnc ticket verification without authkey lifetime
592
593 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
594
7fb70c94
TL
595libpve-access-control (5.1-4) unstable; urgency=medium
596
597 * fix #1891: Add zsh command completion for pveum
598
599 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
600 to avoid issues on upgrade, will be enabled with 6.0
601
602 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
603
6e010cde
TL
604libpve-access-control (5.1-3) unstable; urgency=medium
605
606 * api/ticket: move getting cluster name into an eval
607
608 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
609
f5a9380a
TL
610libpve-access-control (5.1-2) unstable; urgency=medium
611
612 * fix #1998: correct return properties for read_role
613
614 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
615
b54b7474
TL
616libpve-access-control (5.1-1) unstable; urgency=medium
617
618 * pveum: introduce sub-commands
619
620 * register userid with completion
621
622 * fix #233: return cluster name on successful login
623
624 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
625
52192dd4
WB
626libpve-access-control (5.0-8) unstable; urgency=medium
627
628 * fix #1612: ldap: make 2nd server work with bind domains again
629
630 * fix an error message where passing a bad pool id to an API function would
631 make it complain about a wrong group name instead
632
633 * fix the API-returned permission list so that the GUI knows to show the
634 'Permissions' tab for a storage to an administrator apart from root@pam
635
636 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
637
3dadf8cf
FG
638libpve-access-control (5.0-7) unstable; urgency=medium
639
640 * VM.Snapshot.Rollback privilege added
641
642 * api: check for special roles before locking the usercfg
643
644 * fix #1501: pveum: die when deleting special role
645
646 * API/ticket: rework coarse grained permission computation
647
648 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
649
ec4141f4
WB
650libpve-access-control (5.0-6) unstable; urgency=medium
651
652 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
653 'verify' option. For compatibility reasons this defaults to off for now,
654 but that might change with future updates.
655
656 * AD, LDAP: Add ability to specify a CA path or file, and a client
657 certificate via the 'capath', 'cert' and 'certkey' options.
658
659 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
660
63134bd4
DM
661libpve-access-control (5.0-5) unstable; urgency=medium
662
663 * change from dpkg-deb to dpkg-buildpackage
664
665 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
666
868fb1ea
DM
667libpve-access-control (5.0-4) unstable; urgency=medium
668
669 * PVE/CLI/pveum.pm: call setup_default_cli_env()
670
671 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
672
673 * check_api2_permissions: avoid warning about uninitialized value
674
675 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
676
63358f40
DM
677libpve-access-control (5.0-3) unstable; urgency=medium
678
679 * use new PVE::OTP class from pve-common
680
681 * use new PVE::Tools::encrypt_pw from pve-common
682
683 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
684
05fd50af
DM
685libpve-access-control (5.0-2) unstable; urgency=medium
686
687 * encrypt_pw: avoid '+' for crypt salt
688
689 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
690
0835385b
FG
691libpve-access-control (5.0-1) unstable; urgency=medium
692
693 * rebuild for PVE 5.0
694
695 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
696
730f8863
DM
697libpve-access-control (4.0-23) unstable; urgency=medium
698
699 * use new PVE::Ticket class
700
701 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
702
1f1c4593
DM
703libpve-access-control (4.0-22) unstable; urgency=medium
704
705 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
706 (moved to PVE::Storage)
707
708 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
709
710 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
711
f9105063
DM
712libpve-access-control (4.0-21) unstable; urgency=medium
713
714 * setup_default_cli_env: expect $class as first parameter
715
716 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
717
9595066e
DM
718libpve-access-control (4.0-20) unstable; urgency=medium
719
720 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
721
722 * PVE/API2/Domains.pm: fix property description
723
724 * use new repoman for upload target
725
726 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
727
2af5a793
DM
728libpve-access-control (4.0-19) unstable; urgency=medium
729
730 * Close #833: ldap: non-anonymous bind support
731
732 * don't import 'RFC' from MIME::Base32
733
734 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
735
5d87bb77
WB
736libpve-access-control (4.0-18) unstable; urgency=medium
737
738 * fix #1062: recognize base32 otp keys again
739
740 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
741
28ddf48b
WB
742libpve-access-control (4.0-17) unstable; urgency=medium
743
744 * drop oathtool and libdigest-hmac-perl dependencies
745
746 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
747
15cebb28
DM
748libpve-access-control (4.0-16) unstable; urgency=medium
749
750 * use pve-doc-generator to generate man pages
751
752 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
753
678df887
DM
754libpve-access-control (4.0-15) unstable; urgency=medium
755
756 * Fix uninitialized warning when shadow.cfg does not exist
757
758 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
759
cca9761a
DM
760libpve-access-control (4.0-14) unstable; urgency=medium
761
762 * Add is_worker to RPCEnvironment
763
764 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
765
8643c99d
DM
766libpve-access-control (4.0-13) unstable; urgency=medium
767
768 * fix #916: allow HTTPS to access custom yubico url
769
770 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
771
ae2a6bf9
DM
772libpve-access-control (4.0-12) unstable; urgency=medium
773
774 * Catch certificate errors instead of segfaulting
775
776 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
777
4836db5f
DM
778libpve-access-control (4.0-11) unstable; urgency=medium
779
780 * Fix #861: use safer sprintf formatting
781
782 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
783
ccbe23dc
DM
784libpve-access-control (4.0-10) unstable; urgency=medium
785
786 * Auth::LDAP, Auth::AD: ipv6 support
787
788 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
789
90399ca4
DM
790libpve-access-control (4.0-9) unstable; urgency=medium
791
792 * pveum: implement bash completion
793
794 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
795
364ffc13
DM
796libpve-access-control (4.0-8) unstable; urgency=medium
797
798 * remove_storage_access: cleanup of access permissions for removed storage
799
800 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
801
7c26cb4a
DM
802libpve-access-control (4.0-7) unstable; urgency=medium
803
804 * new helper to remove access permissions for removed VMs
805
806 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
807
296afbd1
DM
808libpve-access-control (4.0-6) unstable; urgency=medium
809
810 * improve parse_user_config, parse_shadow_config
811
812 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
813
7d2df2ef
DM
814libpve-access-control (4.0-5) unstable; urgency=medium
815
816 * pveum: check for $cmd being defined
817
818 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
819
98a34e3f
DM
820libpve-access-control (4.0-4) unstable; urgency=medium
821
822 * use activate-noawait triggers
823
824 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
825
15462727
DM
826libpve-access-control (4.0-3) unstable; urgency=medium
827
828 * IPv6 fixes
829
830 * non-root buildfix
831
832 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
833
bbf4cc9a
DM
834libpve-access-control (4.0-2) unstable; urgency=medium
835
836 * trigger pve-api-updates event
837
838 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
839
dfbcf6d3
DM
840libpve-access-control (4.0-1) unstable; urgency=medium
841
842 * bump version for Debian Jessie
843
844 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
845
94971b3a
DM
846libpve-access-control (3.0-16) unstable; urgency=low
847
848 * root@pam can now be disabled in GUI.
849
850 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
851
7b17c7cb
DM
852libpve-access-control (3.0-15) unstable; urgency=low
853
854 * oath: add 'step' and 'digits' option
855
856 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
857
1abc2c0a
DM
858libpve-access-control (3.0-14) unstable; urgency=low
859
860 * add oath two factor auth
861
862 * add oathkeygen binary to generate keys for oath
863
864 * add yubico two factor auth
865
866 * dedend on oathtool
867
868 * depend on libmime-base32-perl
30be0de9
DM
869
870 * allow to write builtin auth domains config (comment/tfa/default)
1abc2c0a
DM
871
872 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
873
298450ab
DM
874libpve-access-control (3.0-13) unstable; urgency=low
875
876 * use correct connection string for AD auth
877
878 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
879
396034e4
DM
880libpve-access-control (3.0-12) unstable; urgency=low
881
882 * add dummy API for GET /access/ticket (useful to generate login pages)
883
884 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
885
26361123
DM
886libpve-access-control (3.0-11) unstable; urgency=low
887
888 * Sets common hot keys for spice client
889
890 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
891
3643383d
DM
892libpve-access-control (3.0-10) unstable; urgency=low
893
894 * implement helper to generate SPICE remote-viewer configuration
895
896 * depend on libnet-ssleay-perl
897
898 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
899
0baedcf7
DM
900libpve-access-control (3.0-9) unstable; urgency=low
901
902 * prevent user enumeration attacks
e4f8fc2e
DM
903
904 * allow dots in access paths
0baedcf7
DM
905
906 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
907
d4b63eae
DM
908libpve-access-control (3.0-8) unstable; urgency=low
909
910 * spice: use lowercase hostname in ticktet signature
911
912 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
913
49594944
DM
914libpve-access-control (3.0-7) unstable; urgency=low
915
916 * check_volume_access : use parse_volname instead of path, and remove
917 path related code.
7c410d63
DM
918
919 * use warnings instead of global -w flag.
49594944
DM
920
921 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
922
fe7de5d0
DM
923libpve-access-control (3.0-6) unstable; urgency=low
924
925 * use shorter spiceproxy tickets
926
927 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
928
4cdd9507
DM
929libpve-access-control (3.0-5) unstable; urgency=low
930
931 * add code to generate tickets for SPICE
932
933 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
934
677f9ab0
DM
935libpve-access-control (3.0-4) unstable; urgency=low
936
937 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
938
939 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
940
139a8ecf
DM
941libpve-access-control (3.0-3) unstable; urgency=low
942
7d23b7ca 943 * Add new role PVETemplateUser (and VM.Clone privilege)
139a8ecf
DM
944
945 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
946
b78ce7c2
DM
947libpve-access-control (3.0-2) unstable; urgency=low
948
949 * remove CGI.pm related code (pveproxy does not need that)
950
951 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
952
786820f9
DM
953libpve-access-control (3.0-1) unstable; urgency=low
954
955 * bump version for wheezy release
956
957 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
958
e5ae5487
DM
959libpve-access-control (1.0-26) unstable; urgency=low
960
961 * check_volume_access: fix access permissions for backup files
962
963 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
964
e3e6510c
DM
965libpve-access-control (1.0-25) unstable; urgency=low
966
967 * add VM.Snapshot permission
968
969 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
970
1e15ebe7
DM
971libpve-access-control (1.0-24) unstable; urgency=low
972
973 * untaint path (allow root to restore arbitrary paths)
974
975 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
976
437be042
DM
977libpve-access-control (1.0-23) unstable; urgency=low
978
979 * correctly compute GUI capabilities (consider pools)
980
981 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
982
5bb4e06a
DM
983libpve-access-control (1.0-22) unstable; urgency=low
984
985 * new plugin architecture for Auth modules, minor API change for Auth
986 domains (new 'delete' parameter)
987
988 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
989
3030a176
DM
990libpve-access-control (1.0-21) unstable; urgency=low
991
992 * do not allow user names including slash
993
994 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
995
996libpve-access-control (1.0-20) unstable; urgency=low
997
998 * add ability to fork cli workers in background
999
1000 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
1001
dd2cfee0
DM
1002libpve-access-control (1.0-19) unstable; urgency=low
1003
1004 * return set of privileges on login - can be used to adopt GUI
1005
1006 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
1007
1cf154b7
DM
1008libpve-access-control (1.0-18) unstable; urgency=low
1009
7d23b7ca 1010 * fix bug #151: correctly parse username inside ticket
533219a1
DM
1011
1012 * fix bug #152: allow user to change his own password
1cf154b7
DM
1013
1014 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
1015
2de14407
DM
1016libpve-access-control (1.0-17) unstable; urgency=low
1017
1018 * set propagate flag by default
1019
1020 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
1021
bdc61d7a
DM
1022libpve-access-control (1.0-16) unstable; urgency=low
1023
1024 * add 'pveum passwd' method
1025
1026 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
1027
cc7bdf33
DM
1028libpve-access-control (1.0-15) unstable; urgency=low
1029
1030 * Add VM.Config.CDROM privilege to PVEVMUser rule
1031
1032 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
1033
a69bbe2e
DM
1034libpve-access-control (1.0-14) unstable; urgency=low
1035
1036 * fix buf in userid-param permission check
1037
1038 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
1039
d9483d94
DM
1040libpve-access-control (1.0-13) unstable; urgency=low
1041
1042 * allow more characters in ldap base_dn attribute
1043
1044 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
1045
84619607
DM
1046libpve-access-control (1.0-12) unstable; urgency=low
1047
1048 * allow more characters with realm IDs
1049
1050 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
1051
09d27058
DM
1052libpve-access-control (1.0-11) unstable; urgency=low
1053
1054 * fix bug in exec_api2_perm_check
1055
1056 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
1057
7a4c849e
DM
1058libpve-access-control (1.0-10) unstable; urgency=low
1059
1060 * fix ACL group name parser
1061
1062 * changed 'pveum aclmod' command line arguments
1063
1064 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
1065
3eac4e35
DM
1066libpve-access-control (1.0-9) unstable; urgency=low
1067
1068 * fix bug in check_volume_access (fixes vzrestore)
1069
1070 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
1071
4384e19e
DM
1072libpve-access-control (1.0-8) unstable; urgency=low
1073
1074 * fix return value for empty ACL list.
1075
1076 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
1077
d8a56966
DM
1078libpve-access-control (1.0-7) unstable; urgency=low
1079
1080 * fix bug #85: allow root@pam to generate tickets for other users
1081
1082 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
1083
cb6f2f93
DM
1084libpve-access-control (1.0-6) unstable; urgency=low
1085
1086 * API change: allow to filter enabled/disabled users.
1087
1088 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
1089
272fe9ff
DM
1090libpve-access-control (1.0-5) unstable; urgency=low
1091
1092 * add a way to return file changes (diffs): set_result_changes()
1093
1094 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
1095
e42eedbc
DM
1096libpve-access-control (1.0-4) unstable; urgency=low
1097
1098 * new environment type for ha agents
1099
1100 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
1101
1fba27e0
DM
1102libpve-access-control (1.0-3) unstable; urgency=low
1103
1104 * add support for delayed parameter parsing - We need that to disable
7d23b7ca 1105 file upload for normal API request (avoid DOS attacks)
1fba27e0
DM
1106
1107 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
1108
5bf71a96
DM
1109libpve-access-control (1.0-2) unstable; urgency=low
1110
1111 * fix bug in fork_worker
1112
1113 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
1114
2c3a6c0a
DM
1115libpve-access-control (1.0-1) unstable; urgency=low
1116
1117 * allow '-' in permission paths
1118
1119 * bump version to 1.0
1120
1121 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
1122
1123libpve-access-control (0.1) unstable; urgency=low
1124
1125 * first dummy package - no functionality
1126
1127 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200
1128