]> git.proxmox.com Git - pve-access-control.git/blame - debian/changelog
auth key: fix double rotation in clusters
[pve-access-control.git] / debian / changelog
CommitLineData
26dde491
TL
1libpve-access-control (7.2-3) bullseye; urgency=medium
2
3 * api: token: use userid-group as API perm check to avoid being overly
4 strict through a misguided use of user id for non-root users.
5
6 * perm check: forbid undefined/empty ACL path for future proofing of against
7 above issue
8
9 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200
10
1cf4389b
TL
11libpve-access-control (7.2-2) bullseye; urgency=medium
12
13 * permissions: merge propagation flag for multiple roles on a path that
14 share privilege in a deterministic way, to avoid that it gets lost
15 depending on perl's random sort, which would result in returing less
16 privileges than an auth-id actually had.
17
18 * permissions: avoid that token and user privilege intersection is to strict
19 for user permissions that have propagation disabled.
20
21 -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200
22
e3604d48
TL
23libpve-access-control (7.2-1) bullseye; urgency=medium
24
25 * user check: fix expiration/enable order
26
27 -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200
28
79ae250f
TL
29libpve-access-control (7.1-8) bullseye; urgency=medium
30
31 * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove-
32 vanished'
33
34 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200
35
eed46286
TL
36libpve-access-control (7.1-7) bullseye; urgency=medium
37
38 * userid-group check: distinguish create and update
39
40 * api: get user: declare token schema
41
42 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100
43
cd78b295
FG
44libpve-access-control (7.1-6) bullseye; urgency=medium
45
46 * fix #3768: warn on bad u2f or webauthn settings
47
48 * tfa: when modifying others, verify the current user's password
49
50 * tfa list: account for admin permissions
51
52 * fix realm sync permissions
53
54 * fix token permission display bug
55
56 * include SDN permissions in permission tree
57
58 -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100
59
118088d8
TL
60libpve-access-control (7.1-5) bullseye; urgency=medium
61
62 * openid: fix username-claim fallback
63
64 -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100
65
ebb14277
WB
66libpve-access-control (7.1-4) bullseye; urgency=medium
67
68 * set current origin in the webauthn config if no fixed origin was
69 configured, to support webauthn via subdomains
70
71 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
72
44a55ff7
TL
73libpve-access-control (7.1-3) bullseye; urgency=medium
74
75 * openid: allow arbitrary username-claims
76
77 * openid: support configuring the prompt, scopes and ACR values
78
79 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
80
6f643e79
TL
81libpve-access-control (7.1-2) bullseye; urgency=medium
82
83 * catch incompatible tfa entries with a nice error
84
85 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
86
92bca71e
TL
87libpve-access-control (7.1-1) bullseye; urgency=medium
88
89 * tfa: map HTTP 404 error in get_tfa_entry correctly
90
91 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
92
1c9b6501
TL
93libpve-access-control (7.0-7) bullseye; urgency=medium
94
95 * fix #3513: pass configured proxy to OpenID
96
97 * use rust based parser for TFA config
98
99 * use PBS-like auth api call flow,
100
101 * merge old user.cfg keys to tfa config when adding entries
102
103 * implement version checks for new tfa config writer to ensure all
104 cluster nodes are ready to avoid login issues
105
106 * tickets: add tunnel ticket
107
108 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
109
cd46b379
TL
110libpve-access-control (7.0-6) bullseye; urgency=medium
111
112 * fix regression in user deletion when realm does not enforce TFA
113
114 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
115
52da88a8
TL
116libpve-access-control (7.0-5) bullseye; urgency=medium
117
118 * acl: check path: add /sdn/vnets/* path
119
120 * fix #2302: allow deletion of users when realm enforces TFA
121
122 * api: delete user: disable user first to avoid surprise on error during the
123 various cleanup action required for user deletion (e.g., TFA, ACL, group)
124
125 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
126
543d646c
TL
127libpve-access-control (7.0-4) bullseye; urgency=medium
128
129 * realm: add OpenID configuration
130
131 * api: implement OpenID related endpoints
132
133 * implement opt-in OpenID autocreate user feature
134
135 * api: user: add 'realm-type' to user list response
136
137 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
138
7a4c4fd8
TL
139libpve-access-control (7.0-3) bullseye; urgency=medium
140
141 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
142 `/sdn/zones/<zone>` to allowed ACL paths
143
144 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
145
0902a936
FG
146libpve-access-control (7.0-2) bullseye; urgency=medium
147
148 * fix #3402: add Pool.Audit privilege - custom roles containing
149 Pool.Allocate must be updated to include the new privilege.
150
151 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
152
67febb69
TL
153libpve-access-control (7.0-1) bullseye; urgency=medium
154
155 * re-build for Debian 11 Bullseye based releases
156
157 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
158
2942ba41
TL
159libpve-access-control (6.4-1) pve; urgency=medium
160
161 * fix #1670: change PAM service name to project specific name
162
163 * fix #1500: permission path syntax check for access control
164
165 * pveum: add resource pool CLI commands
166
167 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
168
54d312f3
TL
169libpve-access-control (6.1-3) pve; urgency=medium
170
171 * partially fix #2825: authkey: rotate if it was generated in the
172 future
173
174 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
175 insensitive
176
177 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
178
6a9be12f
TL
179libpve-access-control (6.1-2) pve; urgency=medium
180
181 * also check SDN permission path when computing coarse permissions heuristic
182 for UIs
183
184 * add SDN Permissions.Modify
185
186 * add VM.Config.Cloudinit
187
188 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
189
e6624f50
TL
190libpve-access-control (6.1-1) pve; urgency=medium
191
192 * pveum: add tfa delete subcommand for deleting user-TFA
193
194 * LDAP: don't complain about missing credentials on realm removal
195
196 * LDAP: skip anonymous bind when client certificate and key is configured
197
198 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
199
8f4a522f
TL
200libpve-access-control (6.0-7) pve; urgency=medium
201
202 * fix #2575: die when trying to edit built-in roles
203
204 * add realm sub commands to pveum CLI tool
205
7d23b7ca 206 * api: domains: add user group sync API endpoint
8f4a522f
TL
207
208 * allow one to sync and import users and groups from LDAP/AD based realms
209
210 * realm: add default-sync-options to config for more convenient sync configuration
211
212 * api: token create: return also full token id for convenience
213
214 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
215
23059f35
TL
216libpve-access-control (6.0-6) pve; urgency=medium
217
218 * API: add group members to group index
219
220 * implement API token support and management
221
222 * pveum: add 'pveum user token add/update/remove/list'
223
224 * pveum: add permissions sub-commands
225
226 * API: add 'permissions' API endpoint
227
228 * user.cfg: skip inexisting roles when parsing ACLs
229
230 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
231
3dd692e9
TL
232libpve-access-control (6.0-5) pve; urgency=medium
233
234 * pveum: add list command for users, groups, ACLs and roles
235
236 * add initial permissions for experimental SDN integration
237
238 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
239
4ef92d0d
FG
240libpve-access-control (6.0-4) pve; urgency=medium
241
242 * ticket: use clinfo to get cluster name
243
244 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
245 SSL version
246
247 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
248
6e5bbca4
TL
249libpve-access-control (6.0-3) pve; urgency=medium
250
251 * fix #2433: increase possible TFA secret length
252
253 * parse user configuration: correctly parse group names in ACLs, for users
254 which begin their name with an @
255
256 * sort user.cfg entries alphabetically
257
258 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
259
e073493c
TL
260libpve-access-control (6.0-2) pve; urgency=medium
261
262 * improve CSRF verification compatibility with newer PVE
263
264 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
265
a237dc2e
TL
266libpve-access-control (6.0-1) pve; urgency=medium
267
268 * ticket: properly verify exactly 5 minute old tickets
269
270 * use hmac_sha256 instead of sha1 for CSRF token generation
271
272 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
273
f1531f22
TL
274libpve-access-control (6.0-0+1) pve; urgency=medium
275
276 * bump for Debian buster
277
278 * fix #2079: add periodic auth key rotation
279
280 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
281
ef761f51
TL
282libpve-access-control (5.1-10) unstable; urgency=medium
283
284 * add /access/user/{id}/tfa api call to get tfa types
285
286 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
287
860ddcba
TL
288libpve-access-control (5.1-9) unstable; urgency=medium
289
290 * store the tfa type in user.cfg allowing to get it without proxying the call
7d23b7ca 291 to a higher privileged daemon.
860ddcba
TL
292
293 * tfa: realm required TFA should lock out users without TFA configured, as it
294 was done before Proxmox VE 5.4
295
296 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
297
9fbad012
TL
298libpve-access-control (5.1-8) unstable; urgency=medium
299
300 * U2F: ensure we save correct public key on registration
301
302 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
303
4473c96c
TL
304libpve-access-control (5.1-7) unstable; urgency=medium
305
306 * verify_ticket: allow general non-challenge tfa to be run as two step
307 call
308
309 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
310
a270d4e1
TL
311libpve-access-control (5.1-6) unstable; urgency=medium
312
313 * more general 2FA configuration via priv/tfa.cfg
314
315 * add u2f api endpoints
316
317 * delete TFA entries when deleting a user
318
319 * allow users to change their TOTP settings
320
321 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
322
374647e8
TL
323libpve-access-control (5.1-5) unstable; urgency=medium
324
325 * fix vnc ticket verification without authkey lifetime
326
327 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
328
7fb70c94
TL
329libpve-access-control (5.1-4) unstable; urgency=medium
330
331 * fix #1891: Add zsh command completion for pveum
332
333 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
334 to avoid issues on upgrade, will be enabled with 6.0
335
336 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
337
6e010cde
TL
338libpve-access-control (5.1-3) unstable; urgency=medium
339
340 * api/ticket: move getting cluster name into an eval
341
342 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
343
f5a9380a
TL
344libpve-access-control (5.1-2) unstable; urgency=medium
345
346 * fix #1998: correct return properties for read_role
347
348 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
349
b54b7474
TL
350libpve-access-control (5.1-1) unstable; urgency=medium
351
352 * pveum: introduce sub-commands
353
354 * register userid with completion
355
356 * fix #233: return cluster name on successful login
357
358 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
359
52192dd4
WB
360libpve-access-control (5.0-8) unstable; urgency=medium
361
362 * fix #1612: ldap: make 2nd server work with bind domains again
363
364 * fix an error message where passing a bad pool id to an API function would
365 make it complain about a wrong group name instead
366
367 * fix the API-returned permission list so that the GUI knows to show the
368 'Permissions' tab for a storage to an administrator apart from root@pam
369
370 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
371
3dadf8cf
FG
372libpve-access-control (5.0-7) unstable; urgency=medium
373
374 * VM.Snapshot.Rollback privilege added
375
376 * api: check for special roles before locking the usercfg
377
378 * fix #1501: pveum: die when deleting special role
379
380 * API/ticket: rework coarse grained permission computation
381
382 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
383
ec4141f4
WB
384libpve-access-control (5.0-6) unstable; urgency=medium
385
386 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
387 'verify' option. For compatibility reasons this defaults to off for now,
388 but that might change with future updates.
389
390 * AD, LDAP: Add ability to specify a CA path or file, and a client
391 certificate via the 'capath', 'cert' and 'certkey' options.
392
393 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
394
63134bd4
DM
395libpve-access-control (5.0-5) unstable; urgency=medium
396
397 * change from dpkg-deb to dpkg-buildpackage
398
399 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
400
868fb1ea
DM
401libpve-access-control (5.0-4) unstable; urgency=medium
402
403 * PVE/CLI/pveum.pm: call setup_default_cli_env()
404
405 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
406
407 * check_api2_permissions: avoid warning about uninitialized value
408
409 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
410
63358f40
DM
411libpve-access-control (5.0-3) unstable; urgency=medium
412
413 * use new PVE::OTP class from pve-common
414
415 * use new PVE::Tools::encrypt_pw from pve-common
416
417 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
418
05fd50af
DM
419libpve-access-control (5.0-2) unstable; urgency=medium
420
421 * encrypt_pw: avoid '+' for crypt salt
422
423 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
424
0835385b
FG
425libpve-access-control (5.0-1) unstable; urgency=medium
426
427 * rebuild for PVE 5.0
428
429 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
430
730f8863
DM
431libpve-access-control (4.0-23) unstable; urgency=medium
432
433 * use new PVE::Ticket class
434
435 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
436
1f1c4593
DM
437libpve-access-control (4.0-22) unstable; urgency=medium
438
439 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
440 (moved to PVE::Storage)
441
442 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
443
444 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
445
f9105063
DM
446libpve-access-control (4.0-21) unstable; urgency=medium
447
448 * setup_default_cli_env: expect $class as first parameter
449
450 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
451
9595066e
DM
452libpve-access-control (4.0-20) unstable; urgency=medium
453
454 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
455
456 * PVE/API2/Domains.pm: fix property description
457
458 * use new repoman for upload target
459
460 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
461
2af5a793
DM
462libpve-access-control (4.0-19) unstable; urgency=medium
463
464 * Close #833: ldap: non-anonymous bind support
465
466 * don't import 'RFC' from MIME::Base32
467
468 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
469
5d87bb77
WB
470libpve-access-control (4.0-18) unstable; urgency=medium
471
472 * fix #1062: recognize base32 otp keys again
473
474 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
475
28ddf48b
WB
476libpve-access-control (4.0-17) unstable; urgency=medium
477
478 * drop oathtool and libdigest-hmac-perl dependencies
479
480 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
481
15cebb28
DM
482libpve-access-control (4.0-16) unstable; urgency=medium
483
484 * use pve-doc-generator to generate man pages
485
486 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
487
678df887
DM
488libpve-access-control (4.0-15) unstable; urgency=medium
489
490 * Fix uninitialized warning when shadow.cfg does not exist
491
492 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
493
cca9761a
DM
494libpve-access-control (4.0-14) unstable; urgency=medium
495
496 * Add is_worker to RPCEnvironment
497
498 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
499
8643c99d
DM
500libpve-access-control (4.0-13) unstable; urgency=medium
501
502 * fix #916: allow HTTPS to access custom yubico url
503
504 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
505
ae2a6bf9
DM
506libpve-access-control (4.0-12) unstable; urgency=medium
507
508 * Catch certificate errors instead of segfaulting
509
510 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
511
4836db5f
DM
512libpve-access-control (4.0-11) unstable; urgency=medium
513
514 * Fix #861: use safer sprintf formatting
515
516 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
517
ccbe23dc
DM
518libpve-access-control (4.0-10) unstable; urgency=medium
519
520 * Auth::LDAP, Auth::AD: ipv6 support
521
522 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
523
90399ca4
DM
524libpve-access-control (4.0-9) unstable; urgency=medium
525
526 * pveum: implement bash completion
527
528 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
529
364ffc13
DM
530libpve-access-control (4.0-8) unstable; urgency=medium
531
532 * remove_storage_access: cleanup of access permissions for removed storage
533
534 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
535
7c26cb4a
DM
536libpve-access-control (4.0-7) unstable; urgency=medium
537
538 * new helper to remove access permissions for removed VMs
539
540 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
541
296afbd1
DM
542libpve-access-control (4.0-6) unstable; urgency=medium
543
544 * improve parse_user_config, parse_shadow_config
545
546 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
547
7d2df2ef
DM
548libpve-access-control (4.0-5) unstable; urgency=medium
549
550 * pveum: check for $cmd being defined
551
552 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
553
98a34e3f
DM
554libpve-access-control (4.0-4) unstable; urgency=medium
555
556 * use activate-noawait triggers
557
558 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
559
15462727
DM
560libpve-access-control (4.0-3) unstable; urgency=medium
561
562 * IPv6 fixes
563
564 * non-root buildfix
565
566 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
567
bbf4cc9a
DM
568libpve-access-control (4.0-2) unstable; urgency=medium
569
570 * trigger pve-api-updates event
571
572 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
573
dfbcf6d3
DM
574libpve-access-control (4.0-1) unstable; urgency=medium
575
576 * bump version for Debian Jessie
577
578 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
579
94971b3a
DM
580libpve-access-control (3.0-16) unstable; urgency=low
581
582 * root@pam can now be disabled in GUI.
583
584 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
585
7b17c7cb
DM
586libpve-access-control (3.0-15) unstable; urgency=low
587
588 * oath: add 'step' and 'digits' option
589
590 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
591
1abc2c0a
DM
592libpve-access-control (3.0-14) unstable; urgency=low
593
594 * add oath two factor auth
595
596 * add oathkeygen binary to generate keys for oath
597
598 * add yubico two factor auth
599
600 * dedend on oathtool
601
602 * depend on libmime-base32-perl
30be0de9
DM
603
604 * allow to write builtin auth domains config (comment/tfa/default)
1abc2c0a
DM
605
606 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
607
298450ab
DM
608libpve-access-control (3.0-13) unstable; urgency=low
609
610 * use correct connection string for AD auth
611
612 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
613
396034e4
DM
614libpve-access-control (3.0-12) unstable; urgency=low
615
616 * add dummy API for GET /access/ticket (useful to generate login pages)
617
618 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
619
26361123
DM
620libpve-access-control (3.0-11) unstable; urgency=low
621
622 * Sets common hot keys for spice client
623
624 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
625
3643383d
DM
626libpve-access-control (3.0-10) unstable; urgency=low
627
628 * implement helper to generate SPICE remote-viewer configuration
629
630 * depend on libnet-ssleay-perl
631
632 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
633
0baedcf7
DM
634libpve-access-control (3.0-9) unstable; urgency=low
635
636 * prevent user enumeration attacks
e4f8fc2e
DM
637
638 * allow dots in access paths
0baedcf7
DM
639
640 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
641
d4b63eae
DM
642libpve-access-control (3.0-8) unstable; urgency=low
643
644 * spice: use lowercase hostname in ticktet signature
645
646 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
647
49594944
DM
648libpve-access-control (3.0-7) unstable; urgency=low
649
650 * check_volume_access : use parse_volname instead of path, and remove
651 path related code.
7c410d63
DM
652
653 * use warnings instead of global -w flag.
49594944
DM
654
655 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
656
fe7de5d0
DM
657libpve-access-control (3.0-6) unstable; urgency=low
658
659 * use shorter spiceproxy tickets
660
661 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
662
4cdd9507
DM
663libpve-access-control (3.0-5) unstable; urgency=low
664
665 * add code to generate tickets for SPICE
666
667 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
668
677f9ab0
DM
669libpve-access-control (3.0-4) unstable; urgency=low
670
671 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
672
673 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
674
139a8ecf
DM
675libpve-access-control (3.0-3) unstable; urgency=low
676
7d23b7ca 677 * Add new role PVETemplateUser (and VM.Clone privilege)
139a8ecf
DM
678
679 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
680
b78ce7c2
DM
681libpve-access-control (3.0-2) unstable; urgency=low
682
683 * remove CGI.pm related code (pveproxy does not need that)
684
685 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
686
786820f9
DM
687libpve-access-control (3.0-1) unstable; urgency=low
688
689 * bump version for wheezy release
690
691 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
692
e5ae5487
DM
693libpve-access-control (1.0-26) unstable; urgency=low
694
695 * check_volume_access: fix access permissions for backup files
696
697 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
698
e3e6510c
DM
699libpve-access-control (1.0-25) unstable; urgency=low
700
701 * add VM.Snapshot permission
702
703 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
704
1e15ebe7
DM
705libpve-access-control (1.0-24) unstable; urgency=low
706
707 * untaint path (allow root to restore arbitrary paths)
708
709 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
710
437be042
DM
711libpve-access-control (1.0-23) unstable; urgency=low
712
713 * correctly compute GUI capabilities (consider pools)
714
715 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
716
5bb4e06a
DM
717libpve-access-control (1.0-22) unstable; urgency=low
718
719 * new plugin architecture for Auth modules, minor API change for Auth
720 domains (new 'delete' parameter)
721
722 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
723
3030a176
DM
724libpve-access-control (1.0-21) unstable; urgency=low
725
726 * do not allow user names including slash
727
728 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
729
730libpve-access-control (1.0-20) unstable; urgency=low
731
732 * add ability to fork cli workers in background
733
734 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
735
dd2cfee0
DM
736libpve-access-control (1.0-19) unstable; urgency=low
737
738 * return set of privileges on login - can be used to adopt GUI
739
740 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
741
1cf154b7
DM
742libpve-access-control (1.0-18) unstable; urgency=low
743
7d23b7ca 744 * fix bug #151: correctly parse username inside ticket
533219a1
DM
745
746 * fix bug #152: allow user to change his own password
1cf154b7
DM
747
748 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
749
2de14407
DM
750libpve-access-control (1.0-17) unstable; urgency=low
751
752 * set propagate flag by default
753
754 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
755
bdc61d7a
DM
756libpve-access-control (1.0-16) unstable; urgency=low
757
758 * add 'pveum passwd' method
759
760 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
761
cc7bdf33
DM
762libpve-access-control (1.0-15) unstable; urgency=low
763
764 * Add VM.Config.CDROM privilege to PVEVMUser rule
765
766 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
767
a69bbe2e
DM
768libpve-access-control (1.0-14) unstable; urgency=low
769
770 * fix buf in userid-param permission check
771
772 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
773
d9483d94
DM
774libpve-access-control (1.0-13) unstable; urgency=low
775
776 * allow more characters in ldap base_dn attribute
777
778 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
779
84619607
DM
780libpve-access-control (1.0-12) unstable; urgency=low
781
782 * allow more characters with realm IDs
783
784 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
785
09d27058
DM
786libpve-access-control (1.0-11) unstable; urgency=low
787
788 * fix bug in exec_api2_perm_check
789
790 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
791
7a4c849e
DM
792libpve-access-control (1.0-10) unstable; urgency=low
793
794 * fix ACL group name parser
795
796 * changed 'pveum aclmod' command line arguments
797
798 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
799
3eac4e35
DM
800libpve-access-control (1.0-9) unstable; urgency=low
801
802 * fix bug in check_volume_access (fixes vzrestore)
803
804 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
805
4384e19e
DM
806libpve-access-control (1.0-8) unstable; urgency=low
807
808 * fix return value for empty ACL list.
809
810 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
811
d8a56966
DM
812libpve-access-control (1.0-7) unstable; urgency=low
813
814 * fix bug #85: allow root@pam to generate tickets for other users
815
816 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
817
cb6f2f93
DM
818libpve-access-control (1.0-6) unstable; urgency=low
819
820 * API change: allow to filter enabled/disabled users.
821
822 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
823
272fe9ff
DM
824libpve-access-control (1.0-5) unstable; urgency=low
825
826 * add a way to return file changes (diffs): set_result_changes()
827
828 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
829
e42eedbc
DM
830libpve-access-control (1.0-4) unstable; urgency=low
831
832 * new environment type for ha agents
833
834 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
835
1fba27e0
DM
836libpve-access-control (1.0-3) unstable; urgency=low
837
838 * add support for delayed parameter parsing - We need that to disable
7d23b7ca 839 file upload for normal API request (avoid DOS attacks)
1fba27e0
DM
840
841 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
842
5bf71a96
DM
843libpve-access-control (1.0-2) unstable; urgency=low
844
845 * fix bug in fork_worker
846
847 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
848
2c3a6c0a
DM
849libpve-access-control (1.0-1) unstable; urgency=low
850
851 * allow '-' in permission paths
852
853 * bump version to 1.0
854
855 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
856
857libpve-access-control (0.1) unstable; urgency=low
858
859 * first dummy package - no functionality
860
861 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200
862