]> git.proxmox.com Git - pve-access-control.git/blob - debian/changelog
2ab4a635b93c1062c2762570a09f0df65a6ea2f2
[pve-access-control.git] / debian / changelog
1 libpve-access-control (7.1-4) bullseye; urgency=medium
2
3 * set current origin in the webauthn config if no fixed origin was
4 configured, to support webauthn via subdomains
5
6 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
7
8 libpve-access-control (7.1-3) bullseye; urgency=medium
9
10 * openid: allow arbitrary username-claims
11
12 * openid: support configuring the prompt, scopes and ACR values
13
14 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
15
16 libpve-access-control (7.1-2) bullseye; urgency=medium
17
18 * catch incompatible tfa entries with a nice error
19
20 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
21
22 libpve-access-control (7.1-1) bullseye; urgency=medium
23
24 * tfa: map HTTP 404 error in get_tfa_entry correctly
25
26 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
27
28 libpve-access-control (7.0-7) bullseye; urgency=medium
29
30 * fix #3513: pass configured proxy to OpenID
31
32 * use rust based parser for TFA config
33
34 * use PBS-like auth api call flow,
35
36 * merge old user.cfg keys to tfa config when adding entries
37
38 * implement version checks for new tfa config writer to ensure all
39 cluster nodes are ready to avoid login issues
40
41 * tickets: add tunnel ticket
42
43 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
44
45 libpve-access-control (7.0-6) bullseye; urgency=medium
46
47 * fix regression in user deletion when realm does not enforce TFA
48
49 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
50
51 libpve-access-control (7.0-5) bullseye; urgency=medium
52
53 * acl: check path: add /sdn/vnets/* path
54
55 * fix #2302: allow deletion of users when realm enforces TFA
56
57 * api: delete user: disable user first to avoid surprise on error during the
58 various cleanup action required for user deletion (e.g., TFA, ACL, group)
59
60 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
61
62 libpve-access-control (7.0-4) bullseye; urgency=medium
63
64 * realm: add OpenID configuration
65
66 * api: implement OpenID related endpoints
67
68 * implement opt-in OpenID autocreate user feature
69
70 * api: user: add 'realm-type' to user list response
71
72 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
73
74 libpve-access-control (7.0-3) bullseye; urgency=medium
75
76 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
77 `/sdn/zones/<zone>` to allowed ACL paths
78
79 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
80
81 libpve-access-control (7.0-2) bullseye; urgency=medium
82
83 * fix #3402: add Pool.Audit privilege - custom roles containing
84 Pool.Allocate must be updated to include the new privilege.
85
86 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
87
88 libpve-access-control (7.0-1) bullseye; urgency=medium
89
90 * re-build for Debian 11 Bullseye based releases
91
92 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
93
94 libpve-access-control (6.4-1) pve; urgency=medium
95
96 * fix #1670: change PAM service name to project specific name
97
98 * fix #1500: permission path syntax check for access control
99
100 * pveum: add resource pool CLI commands
101
102 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
103
104 libpve-access-control (6.1-3) pve; urgency=medium
105
106 * partially fix #2825: authkey: rotate if it was generated in the
107 future
108
109 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
110 insensitive
111
112 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
113
114 libpve-access-control (6.1-2) pve; urgency=medium
115
116 * also check SDN permission path when computing coarse permissions heuristic
117 for UIs
118
119 * add SDN Permissions.Modify
120
121 * add VM.Config.Cloudinit
122
123 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
124
125 libpve-access-control (6.1-1) pve; urgency=medium
126
127 * pveum: add tfa delete subcommand for deleting user-TFA
128
129 * LDAP: don't complain about missing credentials on realm removal
130
131 * LDAP: skip anonymous bind when client certificate and key is configured
132
133 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
134
135 libpve-access-control (6.0-7) pve; urgency=medium
136
137 * fix #2575: die when trying to edit built-in roles
138
139 * add realm sub commands to pveum CLI tool
140
141 * api: domains: add user group sync API enpoint
142
143 * allow one to sync and import users and groups from LDAP/AD based realms
144
145 * realm: add default-sync-options to config for more convenient sync configuration
146
147 * api: token create: return also full token id for convenience
148
149 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
150
151 libpve-access-control (6.0-6) pve; urgency=medium
152
153 * API: add group members to group index
154
155 * implement API token support and management
156
157 * pveum: add 'pveum user token add/update/remove/list'
158
159 * pveum: add permissions sub-commands
160
161 * API: add 'permissions' API endpoint
162
163 * user.cfg: skip inexisting roles when parsing ACLs
164
165 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
166
167 libpve-access-control (6.0-5) pve; urgency=medium
168
169 * pveum: add list command for users, groups, ACLs and roles
170
171 * add initial permissions for experimental SDN integration
172
173 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
174
175 libpve-access-control (6.0-4) pve; urgency=medium
176
177 * ticket: use clinfo to get cluster name
178
179 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
180 SSL version
181
182 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
183
184 libpve-access-control (6.0-3) pve; urgency=medium
185
186 * fix #2433: increase possible TFA secret length
187
188 * parse user configuration: correctly parse group names in ACLs, for users
189 which begin their name with an @
190
191 * sort user.cfg entries alphabetically
192
193 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
194
195 libpve-access-control (6.0-2) pve; urgency=medium
196
197 * improve CSRF verification compatibility with newer PVE
198
199 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
200
201 libpve-access-control (6.0-1) pve; urgency=medium
202
203 * ticket: properly verify exactly 5 minute old tickets
204
205 * use hmac_sha256 instead of sha1 for CSRF token generation
206
207 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
208
209 libpve-access-control (6.0-0+1) pve; urgency=medium
210
211 * bump for Debian buster
212
213 * fix #2079: add periodic auth key rotation
214
215 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
216
217 libpve-access-control (5.1-10) unstable; urgency=medium
218
219 * add /access/user/{id}/tfa api call to get tfa types
220
221 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
222
223 libpve-access-control (5.1-9) unstable; urgency=medium
224
225 * store the tfa type in user.cfg allowing to get it without proxying the call
226 to a higher priviledged daemon.
227
228 * tfa: realm required TFA should lock out users without TFA configured, as it
229 was done before Proxmox VE 5.4
230
231 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
232
233 libpve-access-control (5.1-8) unstable; urgency=medium
234
235 * U2F: ensure we save correct public key on registration
236
237 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
238
239 libpve-access-control (5.1-7) unstable; urgency=medium
240
241 * verify_ticket: allow general non-challenge tfa to be run as two step
242 call
243
244 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
245
246 libpve-access-control (5.1-6) unstable; urgency=medium
247
248 * more general 2FA configuration via priv/tfa.cfg
249
250 * add u2f api endpoints
251
252 * delete TFA entries when deleting a user
253
254 * allow users to change their TOTP settings
255
256 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
257
258 libpve-access-control (5.1-5) unstable; urgency=medium
259
260 * fix vnc ticket verification without authkey lifetime
261
262 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
263
264 libpve-access-control (5.1-4) unstable; urgency=medium
265
266 * fix #1891: Add zsh command completion for pveum
267
268 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
269 to avoid issues on upgrade, will be enabled with 6.0
270
271 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
272
273 libpve-access-control (5.1-3) unstable; urgency=medium
274
275 * api/ticket: move getting cluster name into an eval
276
277 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
278
279 libpve-access-control (5.1-2) unstable; urgency=medium
280
281 * fix #1998: correct return properties for read_role
282
283 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
284
285 libpve-access-control (5.1-1) unstable; urgency=medium
286
287 * pveum: introduce sub-commands
288
289 * register userid with completion
290
291 * fix #233: return cluster name on successful login
292
293 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
294
295 libpve-access-control (5.0-8) unstable; urgency=medium
296
297 * fix #1612: ldap: make 2nd server work with bind domains again
298
299 * fix an error message where passing a bad pool id to an API function would
300 make it complain about a wrong group name instead
301
302 * fix the API-returned permission list so that the GUI knows to show the
303 'Permissions' tab for a storage to an administrator apart from root@pam
304
305 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
306
307 libpve-access-control (5.0-7) unstable; urgency=medium
308
309 * VM.Snapshot.Rollback privilege added
310
311 * api: check for special roles before locking the usercfg
312
313 * fix #1501: pveum: die when deleting special role
314
315 * API/ticket: rework coarse grained permission computation
316
317 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
318
319 libpve-access-control (5.0-6) unstable; urgency=medium
320
321 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
322 'verify' option. For compatibility reasons this defaults to off for now,
323 but that might change with future updates.
324
325 * AD, LDAP: Add ability to specify a CA path or file, and a client
326 certificate via the 'capath', 'cert' and 'certkey' options.
327
328 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
329
330 libpve-access-control (5.0-5) unstable; urgency=medium
331
332 * change from dpkg-deb to dpkg-buildpackage
333
334 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
335
336 libpve-access-control (5.0-4) unstable; urgency=medium
337
338 * PVE/CLI/pveum.pm: call setup_default_cli_env()
339
340 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
341
342 * check_api2_permissions: avoid warning about uninitialized value
343
344 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
345
346 libpve-access-control (5.0-3) unstable; urgency=medium
347
348 * use new PVE::OTP class from pve-common
349
350 * use new PVE::Tools::encrypt_pw from pve-common
351
352 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
353
354 libpve-access-control (5.0-2) unstable; urgency=medium
355
356 * encrypt_pw: avoid '+' for crypt salt
357
358 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
359
360 libpve-access-control (5.0-1) unstable; urgency=medium
361
362 * rebuild for PVE 5.0
363
364 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
365
366 libpve-access-control (4.0-23) unstable; urgency=medium
367
368 * use new PVE::Ticket class
369
370 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
371
372 libpve-access-control (4.0-22) unstable; urgency=medium
373
374 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
375 (moved to PVE::Storage)
376
377 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
378
379 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
380
381 libpve-access-control (4.0-21) unstable; urgency=medium
382
383 * setup_default_cli_env: expect $class as first parameter
384
385 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
386
387 libpve-access-control (4.0-20) unstable; urgency=medium
388
389 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
390
391 * PVE/API2/Domains.pm: fix property description
392
393 * use new repoman for upload target
394
395 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
396
397 libpve-access-control (4.0-19) unstable; urgency=medium
398
399 * Close #833: ldap: non-anonymous bind support
400
401 * don't import 'RFC' from MIME::Base32
402
403 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
404
405 libpve-access-control (4.0-18) unstable; urgency=medium
406
407 * fix #1062: recognize base32 otp keys again
408
409 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
410
411 libpve-access-control (4.0-17) unstable; urgency=medium
412
413 * drop oathtool and libdigest-hmac-perl dependencies
414
415 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
416
417 libpve-access-control (4.0-16) unstable; urgency=medium
418
419 * use pve-doc-generator to generate man pages
420
421 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
422
423 libpve-access-control (4.0-15) unstable; urgency=medium
424
425 * Fix uninitialized warning when shadow.cfg does not exist
426
427 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
428
429 libpve-access-control (4.0-14) unstable; urgency=medium
430
431 * Add is_worker to RPCEnvironment
432
433 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
434
435 libpve-access-control (4.0-13) unstable; urgency=medium
436
437 * fix #916: allow HTTPS to access custom yubico url
438
439 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
440
441 libpve-access-control (4.0-12) unstable; urgency=medium
442
443 * Catch certificate errors instead of segfaulting
444
445 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
446
447 libpve-access-control (4.0-11) unstable; urgency=medium
448
449 * Fix #861: use safer sprintf formatting
450
451 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
452
453 libpve-access-control (4.0-10) unstable; urgency=medium
454
455 * Auth::LDAP, Auth::AD: ipv6 support
456
457 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
458
459 libpve-access-control (4.0-9) unstable; urgency=medium
460
461 * pveum: implement bash completion
462
463 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
464
465 libpve-access-control (4.0-8) unstable; urgency=medium
466
467 * remove_storage_access: cleanup of access permissions for removed storage
468
469 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
470
471 libpve-access-control (4.0-7) unstable; urgency=medium
472
473 * new helper to remove access permissions for removed VMs
474
475 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
476
477 libpve-access-control (4.0-6) unstable; urgency=medium
478
479 * improve parse_user_config, parse_shadow_config
480
481 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
482
483 libpve-access-control (4.0-5) unstable; urgency=medium
484
485 * pveum: check for $cmd being defined
486
487 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
488
489 libpve-access-control (4.0-4) unstable; urgency=medium
490
491 * use activate-noawait triggers
492
493 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
494
495 libpve-access-control (4.0-3) unstable; urgency=medium
496
497 * IPv6 fixes
498
499 * non-root buildfix
500
501 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
502
503 libpve-access-control (4.0-2) unstable; urgency=medium
504
505 * trigger pve-api-updates event
506
507 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
508
509 libpve-access-control (4.0-1) unstable; urgency=medium
510
511 * bump version for Debian Jessie
512
513 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
514
515 libpve-access-control (3.0-16) unstable; urgency=low
516
517 * root@pam can now be disabled in GUI.
518
519 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
520
521 libpve-access-control (3.0-15) unstable; urgency=low
522
523 * oath: add 'step' and 'digits' option
524
525 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
526
527 libpve-access-control (3.0-14) unstable; urgency=low
528
529 * add oath two factor auth
530
531 * add oathkeygen binary to generate keys for oath
532
533 * add yubico two factor auth
534
535 * dedend on oathtool
536
537 * depend on libmime-base32-perl
538
539 * allow to write builtin auth domains config (comment/tfa/default)
540
541 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
542
543 libpve-access-control (3.0-13) unstable; urgency=low
544
545 * use correct connection string for AD auth
546
547 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
548
549 libpve-access-control (3.0-12) unstable; urgency=low
550
551 * add dummy API for GET /access/ticket (useful to generate login pages)
552
553 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
554
555 libpve-access-control (3.0-11) unstable; urgency=low
556
557 * Sets common hot keys for spice client
558
559 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
560
561 libpve-access-control (3.0-10) unstable; urgency=low
562
563 * implement helper to generate SPICE remote-viewer configuration
564
565 * depend on libnet-ssleay-perl
566
567 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
568
569 libpve-access-control (3.0-9) unstable; urgency=low
570
571 * prevent user enumeration attacks
572
573 * allow dots in access paths
574
575 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
576
577 libpve-access-control (3.0-8) unstable; urgency=low
578
579 * spice: use lowercase hostname in ticktet signature
580
581 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
582
583 libpve-access-control (3.0-7) unstable; urgency=low
584
585 * check_volume_access : use parse_volname instead of path, and remove
586 path related code.
587
588 * use warnings instead of global -w flag.
589
590 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
591
592 libpve-access-control (3.0-6) unstable; urgency=low
593
594 * use shorter spiceproxy tickets
595
596 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
597
598 libpve-access-control (3.0-5) unstable; urgency=low
599
600 * add code to generate tickets for SPICE
601
602 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
603
604 libpve-access-control (3.0-4) unstable; urgency=low
605
606 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
607
608 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
609
610 libpve-access-control (3.0-3) unstable; urgency=low
611
612 * Add new role PVETemplateUser (and VM.Clone priviledge)
613
614 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
615
616 libpve-access-control (3.0-2) unstable; urgency=low
617
618 * remove CGI.pm related code (pveproxy does not need that)
619
620 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
621
622 libpve-access-control (3.0-1) unstable; urgency=low
623
624 * bump version for wheezy release
625
626 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
627
628 libpve-access-control (1.0-26) unstable; urgency=low
629
630 * check_volume_access: fix access permissions for backup files
631
632 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
633
634 libpve-access-control (1.0-25) unstable; urgency=low
635
636 * add VM.Snapshot permission
637
638 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
639
640 libpve-access-control (1.0-24) unstable; urgency=low
641
642 * untaint path (allow root to restore arbitrary paths)
643
644 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
645
646 libpve-access-control (1.0-23) unstable; urgency=low
647
648 * correctly compute GUI capabilities (consider pools)
649
650 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
651
652 libpve-access-control (1.0-22) unstable; urgency=low
653
654 * new plugin architecture for Auth modules, minor API change for Auth
655 domains (new 'delete' parameter)
656
657 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
658
659 libpve-access-control (1.0-21) unstable; urgency=low
660
661 * do not allow user names including slash
662
663 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
664
665 libpve-access-control (1.0-20) unstable; urgency=low
666
667 * add ability to fork cli workers in background
668
669 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
670
671 libpve-access-control (1.0-19) unstable; urgency=low
672
673 * return set of privileges on login - can be used to adopt GUI
674
675 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
676
677 libpve-access-control (1.0-18) unstable; urgency=low
678
679 * fix bug #151: corretly parse username inside ticket
680
681 * fix bug #152: allow user to change his own password
682
683 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
684
685 libpve-access-control (1.0-17) unstable; urgency=low
686
687 * set propagate flag by default
688
689 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
690
691 libpve-access-control (1.0-16) unstable; urgency=low
692
693 * add 'pveum passwd' method
694
695 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
696
697 libpve-access-control (1.0-15) unstable; urgency=low
698
699 * Add VM.Config.CDROM privilege to PVEVMUser rule
700
701 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
702
703 libpve-access-control (1.0-14) unstable; urgency=low
704
705 * fix buf in userid-param permission check
706
707 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
708
709 libpve-access-control (1.0-13) unstable; urgency=low
710
711 * allow more characters in ldap base_dn attribute
712
713 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
714
715 libpve-access-control (1.0-12) unstable; urgency=low
716
717 * allow more characters with realm IDs
718
719 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
720
721 libpve-access-control (1.0-11) unstable; urgency=low
722
723 * fix bug in exec_api2_perm_check
724
725 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
726
727 libpve-access-control (1.0-10) unstable; urgency=low
728
729 * fix ACL group name parser
730
731 * changed 'pveum aclmod' command line arguments
732
733 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
734
735 libpve-access-control (1.0-9) unstable; urgency=low
736
737 * fix bug in check_volume_access (fixes vzrestore)
738
739 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
740
741 libpve-access-control (1.0-8) unstable; urgency=low
742
743 * fix return value for empty ACL list.
744
745 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
746
747 libpve-access-control (1.0-7) unstable; urgency=low
748
749 * fix bug #85: allow root@pam to generate tickets for other users
750
751 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
752
753 libpve-access-control (1.0-6) unstable; urgency=low
754
755 * API change: allow to filter enabled/disabled users.
756
757 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
758
759 libpve-access-control (1.0-5) unstable; urgency=low
760
761 * add a way to return file changes (diffs): set_result_changes()
762
763 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
764
765 libpve-access-control (1.0-4) unstable; urgency=low
766
767 * new environment type for ha agents
768
769 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
770
771 libpve-access-control (1.0-3) unstable; urgency=low
772
773 * add support for delayed parameter parsing - We need that to disable
774 file upload for normal API request (avoid DOS attacs)
775
776 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
777
778 libpve-access-control (1.0-2) unstable; urgency=low
779
780 * fix bug in fork_worker
781
782 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
783
784 libpve-access-control (1.0-1) unstable; urgency=low
785
786 * allow '-' in permission paths
787
788 * bump version to 1.0
789
790 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
791
792 libpve-access-control (0.1) unstable; urgency=low
793
794 * first dummy package - no functionality
795
796 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200
797