]> git.proxmox.com Git - pve-access-control.git/blob - debian/changelog
bump version to 8.1.1
[pve-access-control.git] / debian / changelog
1 libpve-access-control (8.1.1) bookworm; urgency=medium
2
3 * LDAP sync: fix-up assembling valid attribute set
4
5 -- Proxmox Support Team <support@proxmox.com> Thu, 08 Feb 2024 19:03:26 +0100
6
7 libpve-access-control (8.1.0) bookworm; urgency=medium
8
9 * api: user: limit the legacy user-keys option to the depreacated values
10 that could be set in the first limited TFA system, like e.g., 'x!yubico'
11 or base32 encoded secrets.
12
13 * oidc: enforce generic URI regex for the ACR value to align with OIDC
14 specifications and with Proxmox Backup Server, which was recently changed
15 to actually be less strict.
16
17 * LDAP sync: improve validation of synced attributes, closely limit the
18 mapped attributes names and their values to avoid glitches through odd
19 LDIF entries.
20
21 * api: user: limit maximum length for first & last name to 1024 characters,
22 email to 254 characters (the maximum actually useable in practice) and
23 comment properties to 2048 characters. This avoid that a few single users
24 bloat the user.cfg to much by mistake, reducing the total amount of users
25 and ACLs that can be set up. Note that only users with User.Modify and
26 realm syncs (setup by admins) can change these in the first place, so this
27 is mostly to avoid mishaps and just to be sure.
28
29 -- Proxmox Support Team <support@proxmox.com> Thu, 08 Feb 2024 17:50:59 +0100
30
31 libpve-access-control (8.0.7) bookworm; urgency=medium
32
33 * fix #1148: allow up to three levels of pool nesting
34
35 * pools: record parent/subpool information
36
37 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Nov 2023 12:24:13 +0100
38
39 libpve-access-control (8.0.6) bookworm; urgency=medium
40
41 * perms: fix wrong /pools entry in default set of ACL paths
42
43 * acl: add missing SDN ACL paths to allowed list
44
45 -- Proxmox Support Team <support@proxmox.com> Fri, 17 Nov 2023 08:27:11 +0100
46
47 libpve-access-control (8.0.5) bookworm; urgency=medium
48
49 * fix an issue where setting ldap passwords would refuse to work unless
50 at least one additional property was changed as well
51
52 * add 'check-connection' parameter to create and update endpoints for ldap
53 based realms
54
55 -- Proxmox Support Team <support@proxmox.com> Fri, 11 Aug 2023 13:35:23 +0200
56
57 libpve-access-control (8.0.4) bookworm; urgency=medium
58
59 * Lookup of second factors is no longer tied to the 'keys' field in the
60 user.cfg. This fixes an issue where certain LDAP/AD sync job settings
61 could disable user-configured 2nd factors.
62
63 * Existing-but-disabled TFA factors can no longer circumvent realm-mandated
64 TFA.
65
66 -- Proxmox Support Team <support@proxmox.com> Thu, 20 Jul 2023 10:59:21 +0200
67
68 libpve-access-control (8.0.3) bookworm; urgency=medium
69
70 * pveum: list tfa: recovery keys have no descriptions
71
72 * pveum: list tfa: sort by user ID
73
74 * drop assert_new_tfa_config_available for Proxmox VE 8, as the new format
75 is understood since pve-manager 7.0-15, and users must upgrade to Proxmox
76 VE 7.4 before upgrading to Proxmox VE 8 in addition to that.
77
78 -- Proxmox Support Team <support@proxmox.com> Wed, 21 Jun 2023 19:45:29 +0200
79
80 libpve-access-control (8.0.2) bookworm; urgency=medium
81
82 * api: users: sort groups to avoid "flapping" text
83
84 * api: tfa: don't block tokens from viewing and list TFA entries, both are
85 safe to do for anybody with enough permissions to view a user.
86
87 * api: tfa: add missing links for child-routes
88
89 -- Proxmox Support Team <support@proxmox.com> Wed, 21 Jun 2023 18:13:54 +0200
90
91 libpve-access-control (8.0.1) bookworm; urgency=medium
92
93 * tfa: cope with native versions in cluster version check
94
95 -- Proxmox Support Team <support@proxmox.com> Fri, 09 Jun 2023 16:12:01 +0200
96
97 libpve-access-control (8.0.0) bookworm; urgency=medium
98
99 * api: roles: forbid creating new roles starting with "PVE" namespace
100
101 -- Proxmox Support Team <support@proxmox.com> Fri, 09 Jun 2023 10:14:28 +0200
102
103 libpve-access-control (8.0.0~3) bookworm; urgency=medium
104
105 * rpcenv: api permission heuristic: query Sys.Modify for root ACL-path
106
107 * access control: add /sdn/zones/<zone>/<vnet>/<vlan> ACL object path
108
109 * add helper for checking bridge access
110
111 * add new SDN.Use privilege in PVESDNUser role, allowing one to specify
112 which user are allowed to use a bridge (or vnet, if SDN is installed)
113
114 * add privileges and paths for cluster resource mapping
115
116 -- Proxmox Support Team <support@proxmox.com> Wed, 07 Jun 2023 19:06:54 +0200
117
118 libpve-access-control (8.0.0~2) bookworm; urgency=medium
119
120 * api: user index: only include existing tfa lock flags
121
122 * add realm-sync plugin for jobs and CRUD api for realm-sync-jobs
123
124 * roles: only include Permissions.Modify in Administrator built-in role.
125 As, depending on the ACL object path, this privilege might allow one to
126 change their own permissions, which was making the distinction between
127 Admin and PVEAdmin irrelevant.
128
129 * acls: restrict less-privileged ACL modifications. Through allocate
130 permissions in pools, storages and virtual guests one can do some ACL
131 modifications without having the Permissions.Modify privilege, lock those
132 better down to ensure that one can only hand out only the subset of their
133 own privileges, never more. Note that this is mostly future proofing, as
134 the ACL object paths one could give out more permissions where already
135 limiting the scope.
136
137 -- Proxmox Support Team <support@proxmox.com> Wed, 07 Jun 2023 11:34:30 +0200
138
139 libpve-access-control (8.0.0~1) bookworm; urgency=medium
140
141 * bump pve-rs dependency to 0.8.3
142
143 * drop old verify_tfa api call (POST /access/tfa)
144
145 * drop support for old login API:
146 - 'new-format' is now considured to be 1 and ignored by the API
147
148 * pam auth: set PAM_RHOST to allow pam configs to log/restrict/... by remote
149 address
150
151 * cli: add 'pveum tfa list'
152
153 * cli: add 'pveum tfa unlock'
154
155 * enable lockout of TFA:
156 - too many TOTP attempts will lock out of TOTP
157 - using a recovery key will unlock TOTP
158 - too many TFA attempts will lock a user's TFA auth for an hour
159
160 * api: add /access/users/<userid>/unlock-tfa to unlock a user's TFA
161 authentication if it was locked by too many wrong 2nd factor login attempts
162
163 * api: /access/tfa and /access/users now include the tfa lockout status
164
165 -- Proxmox Support Team <support@proxmox.com> Mon, 05 Jun 2023 14:52:29 +0200
166
167 libpve-access-control (7.99.0) bookworm; urgency=medium
168
169 * initial re-build for Proxmox VE 8.x series
170
171 * switch to native versioning
172
173 -- Proxmox Support Team <support@proxmox.com> Sun, 21 May 2023 10:34:19 +0200
174
175 libpve-access-control (7.4-3) bullseye; urgency=medium
176
177 * use new 2nd factor verification from pve-rs
178
179 -- Proxmox Support Team <support@proxmox.com> Tue, 16 May 2023 13:31:28 +0200
180
181 libpve-access-control (7.4-2) bullseye; urgency=medium
182
183 * fix #4609: fix regression where a valid DN in the ldap/ad realm config
184 wasn't accepted anymore
185
186 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Mar 2023 15:44:21 +0100
187
188 libpve-access-control (7.4-1) bullseye; urgency=medium
189
190 * realm sync: refactor scope/remove-vanished into a standard option
191
192 * ldap: Allow quoted values for DN attribute values
193
194 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Mar 2023 17:16:11 +0100
195
196 libpve-access-control (7.3-2) bullseye; urgency=medium
197
198 * fix #4518: dramatically improve ACL computation performance
199
200 * userid format: clarify that this is the full name@realm in description
201
202 -- Proxmox Support Team <support@proxmox.com> Mon, 06 Mar 2023 11:40:11 +0100
203
204 libpve-access-control (7.3-1) bullseye; urgency=medium
205
206 * realm: sync: allow explicit 'none' for 'remove-vanished' option
207
208 -- Proxmox Support Team <support@proxmox.com> Fri, 16 Dec 2022 13:11:04 +0100
209
210 libpve-access-control (7.2-5) bullseye; urgency=medium
211
212 * api: realm sync: avoid separate log line for "remove-vanished" opt
213
214 * auth ldap/ad: compare group member dn case-insensitively
215
216 * two factor auth: only lock tfa config for recovery keys
217
218 * privs: add Sys.Incoming for guarding cross-cluster data streams like guest
219 migrations and storage migrations
220
221 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Nov 2022 13:09:17 +0100
222
223 libpve-access-control (7.2-4) bullseye; urgency=medium
224
225 * fix #4074: increase API OpenID code size limit to 2048
226
227 * auth key: protect against rare chance of a double rotation in clusters,
228 leaving the potential that some set of nodes have the earlier key cached,
229 that then got rotated out due to the race, resulting in a possible other
230 set of nodes having the newer key cached. This is a split view of the auth
231 key and may resulting in spurious failures if API requests are made to a
232 different node than the ticket was generated on.
233 In addition to that, the "keep validity of old tickets if signed in the
234 last two hours before rotation" logic was disabled too in such a case,
235 making such tickets invalid too early.
236 Note that both are cases where Proxmox VE was too strict, so while this
237 had no security implications it can be a nuisance, especially for
238 environments that use the API through an automated or scripted way
239
240 -- Proxmox Support Team <support@proxmox.com> Thu, 14 Jul 2022 08:36:51 +0200
241
242 libpve-access-control (7.2-3) bullseye; urgency=medium
243
244 * api: token: use userid-group as API perm check to avoid being overly
245 strict through a misguided use of user id for non-root users.
246
247 * perm check: forbid undefined/empty ACL path for future proofing of against
248 above issue
249
250 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200
251
252 libpve-access-control (7.2-2) bullseye; urgency=medium
253
254 * permissions: merge propagation flag for multiple roles on a path that
255 share privilege in a deterministic way, to avoid that it gets lost
256 depending on perl's random sort, which would result in returing less
257 privileges than an auth-id actually had.
258
259 * permissions: avoid that token and user privilege intersection is to strict
260 for user permissions that have propagation disabled.
261
262 -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200
263
264 libpve-access-control (7.2-1) bullseye; urgency=medium
265
266 * user check: fix expiration/enable order
267
268 -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200
269
270 libpve-access-control (7.1-8) bullseye; urgency=medium
271
272 * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove-
273 vanished'
274
275 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200
276
277 libpve-access-control (7.1-7) bullseye; urgency=medium
278
279 * userid-group check: distinguish create and update
280
281 * api: get user: declare token schema
282
283 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100
284
285 libpve-access-control (7.1-6) bullseye; urgency=medium
286
287 * fix #3768: warn on bad u2f or webauthn settings
288
289 * tfa: when modifying others, verify the current user's password
290
291 * tfa list: account for admin permissions
292
293 * fix realm sync permissions
294
295 * fix token permission display bug
296
297 * include SDN permissions in permission tree
298
299 -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100
300
301 libpve-access-control (7.1-5) bullseye; urgency=medium
302
303 * openid: fix username-claim fallback
304
305 -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100
306
307 libpve-access-control (7.1-4) bullseye; urgency=medium
308
309 * set current origin in the webauthn config if no fixed origin was
310 configured, to support webauthn via subdomains
311
312 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
313
314 libpve-access-control (7.1-3) bullseye; urgency=medium
315
316 * openid: allow arbitrary username-claims
317
318 * openid: support configuring the prompt, scopes and ACR values
319
320 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
321
322 libpve-access-control (7.1-2) bullseye; urgency=medium
323
324 * catch incompatible tfa entries with a nice error
325
326 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
327
328 libpve-access-control (7.1-1) bullseye; urgency=medium
329
330 * tfa: map HTTP 404 error in get_tfa_entry correctly
331
332 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
333
334 libpve-access-control (7.0-7) bullseye; urgency=medium
335
336 * fix #3513: pass configured proxy to OpenID
337
338 * use rust based parser for TFA config
339
340 * use PBS-like auth api call flow,
341
342 * merge old user.cfg keys to tfa config when adding entries
343
344 * implement version checks for new tfa config writer to ensure all
345 cluster nodes are ready to avoid login issues
346
347 * tickets: add tunnel ticket
348
349 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
350
351 libpve-access-control (7.0-6) bullseye; urgency=medium
352
353 * fix regression in user deletion when realm does not enforce TFA
354
355 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
356
357 libpve-access-control (7.0-5) bullseye; urgency=medium
358
359 * acl: check path: add /sdn/vnets/* path
360
361 * fix #2302: allow deletion of users when realm enforces TFA
362
363 * api: delete user: disable user first to avoid surprise on error during the
364 various cleanup action required for user deletion (e.g., TFA, ACL, group)
365
366 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
367
368 libpve-access-control (7.0-4) bullseye; urgency=medium
369
370 * realm: add OpenID configuration
371
372 * api: implement OpenID related endpoints
373
374 * implement opt-in OpenID autocreate user feature
375
376 * api: user: add 'realm-type' to user list response
377
378 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
379
380 libpve-access-control (7.0-3) bullseye; urgency=medium
381
382 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
383 `/sdn/zones/<zone>` to allowed ACL paths
384
385 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
386
387 libpve-access-control (7.0-2) bullseye; urgency=medium
388
389 * fix #3402: add Pool.Audit privilege - custom roles containing
390 Pool.Allocate must be updated to include the new privilege.
391
392 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
393
394 libpve-access-control (7.0-1) bullseye; urgency=medium
395
396 * re-build for Debian 11 Bullseye based releases
397
398 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
399
400 libpve-access-control (6.4-1) pve; urgency=medium
401
402 * fix #1670: change PAM service name to project specific name
403
404 * fix #1500: permission path syntax check for access control
405
406 * pveum: add resource pool CLI commands
407
408 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
409
410 libpve-access-control (6.1-3) pve; urgency=medium
411
412 * partially fix #2825: authkey: rotate if it was generated in the
413 future
414
415 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
416 insensitive
417
418 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
419
420 libpve-access-control (6.1-2) pve; urgency=medium
421
422 * also check SDN permission path when computing coarse permissions heuristic
423 for UIs
424
425 * add SDN Permissions.Modify
426
427 * add VM.Config.Cloudinit
428
429 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
430
431 libpve-access-control (6.1-1) pve; urgency=medium
432
433 * pveum: add tfa delete subcommand for deleting user-TFA
434
435 * LDAP: don't complain about missing credentials on realm removal
436
437 * LDAP: skip anonymous bind when client certificate and key is configured
438
439 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
440
441 libpve-access-control (6.0-7) pve; urgency=medium
442
443 * fix #2575: die when trying to edit built-in roles
444
445 * add realm sub commands to pveum CLI tool
446
447 * api: domains: add user group sync API endpoint
448
449 * allow one to sync and import users and groups from LDAP/AD based realms
450
451 * realm: add default-sync-options to config for more convenient sync configuration
452
453 * api: token create: return also full token id for convenience
454
455 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
456
457 libpve-access-control (6.0-6) pve; urgency=medium
458
459 * API: add group members to group index
460
461 * implement API token support and management
462
463 * pveum: add 'pveum user token add/update/remove/list'
464
465 * pveum: add permissions sub-commands
466
467 * API: add 'permissions' API endpoint
468
469 * user.cfg: skip inexisting roles when parsing ACLs
470
471 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
472
473 libpve-access-control (6.0-5) pve; urgency=medium
474
475 * pveum: add list command for users, groups, ACLs and roles
476
477 * add initial permissions for experimental SDN integration
478
479 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
480
481 libpve-access-control (6.0-4) pve; urgency=medium
482
483 * ticket: use clinfo to get cluster name
484
485 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
486 SSL version
487
488 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
489
490 libpve-access-control (6.0-3) pve; urgency=medium
491
492 * fix #2433: increase possible TFA secret length
493
494 * parse user configuration: correctly parse group names in ACLs, for users
495 which begin their name with an @
496
497 * sort user.cfg entries alphabetically
498
499 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
500
501 libpve-access-control (6.0-2) pve; urgency=medium
502
503 * improve CSRF verification compatibility with newer PVE
504
505 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
506
507 libpve-access-control (6.0-1) pve; urgency=medium
508
509 * ticket: properly verify exactly 5 minute old tickets
510
511 * use hmac_sha256 instead of sha1 for CSRF token generation
512
513 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
514
515 libpve-access-control (6.0-0+1) pve; urgency=medium
516
517 * bump for Debian buster
518
519 * fix #2079: add periodic auth key rotation
520
521 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
522
523 libpve-access-control (5.1-10) unstable; urgency=medium
524
525 * add /access/user/{id}/tfa api call to get tfa types
526
527 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
528
529 libpve-access-control (5.1-9) unstable; urgency=medium
530
531 * store the tfa type in user.cfg allowing to get it without proxying the call
532 to a higher privileged daemon.
533
534 * tfa: realm required TFA should lock out users without TFA configured, as it
535 was done before Proxmox VE 5.4
536
537 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
538
539 libpve-access-control (5.1-8) unstable; urgency=medium
540
541 * U2F: ensure we save correct public key on registration
542
543 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
544
545 libpve-access-control (5.1-7) unstable; urgency=medium
546
547 * verify_ticket: allow general non-challenge tfa to be run as two step
548 call
549
550 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
551
552 libpve-access-control (5.1-6) unstable; urgency=medium
553
554 * more general 2FA configuration via priv/tfa.cfg
555
556 * add u2f api endpoints
557
558 * delete TFA entries when deleting a user
559
560 * allow users to change their TOTP settings
561
562 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
563
564 libpve-access-control (5.1-5) unstable; urgency=medium
565
566 * fix vnc ticket verification without authkey lifetime
567
568 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
569
570 libpve-access-control (5.1-4) unstable; urgency=medium
571
572 * fix #1891: Add zsh command completion for pveum
573
574 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
575 to avoid issues on upgrade, will be enabled with 6.0
576
577 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
578
579 libpve-access-control (5.1-3) unstable; urgency=medium
580
581 * api/ticket: move getting cluster name into an eval
582
583 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
584
585 libpve-access-control (5.1-2) unstable; urgency=medium
586
587 * fix #1998: correct return properties for read_role
588
589 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
590
591 libpve-access-control (5.1-1) unstable; urgency=medium
592
593 * pveum: introduce sub-commands
594
595 * register userid with completion
596
597 * fix #233: return cluster name on successful login
598
599 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
600
601 libpve-access-control (5.0-8) unstable; urgency=medium
602
603 * fix #1612: ldap: make 2nd server work with bind domains again
604
605 * fix an error message where passing a bad pool id to an API function would
606 make it complain about a wrong group name instead
607
608 * fix the API-returned permission list so that the GUI knows to show the
609 'Permissions' tab for a storage to an administrator apart from root@pam
610
611 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
612
613 libpve-access-control (5.0-7) unstable; urgency=medium
614
615 * VM.Snapshot.Rollback privilege added
616
617 * api: check for special roles before locking the usercfg
618
619 * fix #1501: pveum: die when deleting special role
620
621 * API/ticket: rework coarse grained permission computation
622
623 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
624
625 libpve-access-control (5.0-6) unstable; urgency=medium
626
627 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
628 'verify' option. For compatibility reasons this defaults to off for now,
629 but that might change with future updates.
630
631 * AD, LDAP: Add ability to specify a CA path or file, and a client
632 certificate via the 'capath', 'cert' and 'certkey' options.
633
634 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
635
636 libpve-access-control (5.0-5) unstable; urgency=medium
637
638 * change from dpkg-deb to dpkg-buildpackage
639
640 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
641
642 libpve-access-control (5.0-4) unstable; urgency=medium
643
644 * PVE/CLI/pveum.pm: call setup_default_cli_env()
645
646 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
647
648 * check_api2_permissions: avoid warning about uninitialized value
649
650 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
651
652 libpve-access-control (5.0-3) unstable; urgency=medium
653
654 * use new PVE::OTP class from pve-common
655
656 * use new PVE::Tools::encrypt_pw from pve-common
657
658 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
659
660 libpve-access-control (5.0-2) unstable; urgency=medium
661
662 * encrypt_pw: avoid '+' for crypt salt
663
664 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
665
666 libpve-access-control (5.0-1) unstable; urgency=medium
667
668 * rebuild for PVE 5.0
669
670 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
671
672 libpve-access-control (4.0-23) unstable; urgency=medium
673
674 * use new PVE::Ticket class
675
676 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
677
678 libpve-access-control (4.0-22) unstable; urgency=medium
679
680 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
681 (moved to PVE::Storage)
682
683 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
684
685 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
686
687 libpve-access-control (4.0-21) unstable; urgency=medium
688
689 * setup_default_cli_env: expect $class as first parameter
690
691 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
692
693 libpve-access-control (4.0-20) unstable; urgency=medium
694
695 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
696
697 * PVE/API2/Domains.pm: fix property description
698
699 * use new repoman for upload target
700
701 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
702
703 libpve-access-control (4.0-19) unstable; urgency=medium
704
705 * Close #833: ldap: non-anonymous bind support
706
707 * don't import 'RFC' from MIME::Base32
708
709 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
710
711 libpve-access-control (4.0-18) unstable; urgency=medium
712
713 * fix #1062: recognize base32 otp keys again
714
715 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
716
717 libpve-access-control (4.0-17) unstable; urgency=medium
718
719 * drop oathtool and libdigest-hmac-perl dependencies
720
721 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
722
723 libpve-access-control (4.0-16) unstable; urgency=medium
724
725 * use pve-doc-generator to generate man pages
726
727 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
728
729 libpve-access-control (4.0-15) unstable; urgency=medium
730
731 * Fix uninitialized warning when shadow.cfg does not exist
732
733 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
734
735 libpve-access-control (4.0-14) unstable; urgency=medium
736
737 * Add is_worker to RPCEnvironment
738
739 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
740
741 libpve-access-control (4.0-13) unstable; urgency=medium
742
743 * fix #916: allow HTTPS to access custom yubico url
744
745 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
746
747 libpve-access-control (4.0-12) unstable; urgency=medium
748
749 * Catch certificate errors instead of segfaulting
750
751 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
752
753 libpve-access-control (4.0-11) unstable; urgency=medium
754
755 * Fix #861: use safer sprintf formatting
756
757 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
758
759 libpve-access-control (4.0-10) unstable; urgency=medium
760
761 * Auth::LDAP, Auth::AD: ipv6 support
762
763 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
764
765 libpve-access-control (4.0-9) unstable; urgency=medium
766
767 * pveum: implement bash completion
768
769 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
770
771 libpve-access-control (4.0-8) unstable; urgency=medium
772
773 * remove_storage_access: cleanup of access permissions for removed storage
774
775 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
776
777 libpve-access-control (4.0-7) unstable; urgency=medium
778
779 * new helper to remove access permissions for removed VMs
780
781 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
782
783 libpve-access-control (4.0-6) unstable; urgency=medium
784
785 * improve parse_user_config, parse_shadow_config
786
787 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
788
789 libpve-access-control (4.0-5) unstable; urgency=medium
790
791 * pveum: check for $cmd being defined
792
793 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
794
795 libpve-access-control (4.0-4) unstable; urgency=medium
796
797 * use activate-noawait triggers
798
799 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
800
801 libpve-access-control (4.0-3) unstable; urgency=medium
802
803 * IPv6 fixes
804
805 * non-root buildfix
806
807 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
808
809 libpve-access-control (4.0-2) unstable; urgency=medium
810
811 * trigger pve-api-updates event
812
813 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
814
815 libpve-access-control (4.0-1) unstable; urgency=medium
816
817 * bump version for Debian Jessie
818
819 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
820
821 libpve-access-control (3.0-16) unstable; urgency=low
822
823 * root@pam can now be disabled in GUI.
824
825 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
826
827 libpve-access-control (3.0-15) unstable; urgency=low
828
829 * oath: add 'step' and 'digits' option
830
831 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
832
833 libpve-access-control (3.0-14) unstable; urgency=low
834
835 * add oath two factor auth
836
837 * add oathkeygen binary to generate keys for oath
838
839 * add yubico two factor auth
840
841 * dedend on oathtool
842
843 * depend on libmime-base32-perl
844
845 * allow to write builtin auth domains config (comment/tfa/default)
846
847 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
848
849 libpve-access-control (3.0-13) unstable; urgency=low
850
851 * use correct connection string for AD auth
852
853 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
854
855 libpve-access-control (3.0-12) unstable; urgency=low
856
857 * add dummy API for GET /access/ticket (useful to generate login pages)
858
859 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
860
861 libpve-access-control (3.0-11) unstable; urgency=low
862
863 * Sets common hot keys for spice client
864
865 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
866
867 libpve-access-control (3.0-10) unstable; urgency=low
868
869 * implement helper to generate SPICE remote-viewer configuration
870
871 * depend on libnet-ssleay-perl
872
873 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
874
875 libpve-access-control (3.0-9) unstable; urgency=low
876
877 * prevent user enumeration attacks
878
879 * allow dots in access paths
880
881 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
882
883 libpve-access-control (3.0-8) unstable; urgency=low
884
885 * spice: use lowercase hostname in ticktet signature
886
887 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
888
889 libpve-access-control (3.0-7) unstable; urgency=low
890
891 * check_volume_access : use parse_volname instead of path, and remove
892 path related code.
893
894 * use warnings instead of global -w flag.
895
896 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
897
898 libpve-access-control (3.0-6) unstable; urgency=low
899
900 * use shorter spiceproxy tickets
901
902 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
903
904 libpve-access-control (3.0-5) unstable; urgency=low
905
906 * add code to generate tickets for SPICE
907
908 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
909
910 libpve-access-control (3.0-4) unstable; urgency=low
911
912 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
913
914 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
915
916 libpve-access-control (3.0-3) unstable; urgency=low
917
918 * Add new role PVETemplateUser (and VM.Clone privilege)
919
920 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
921
922 libpve-access-control (3.0-2) unstable; urgency=low
923
924 * remove CGI.pm related code (pveproxy does not need that)
925
926 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
927
928 libpve-access-control (3.0-1) unstable; urgency=low
929
930 * bump version for wheezy release
931
932 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
933
934 libpve-access-control (1.0-26) unstable; urgency=low
935
936 * check_volume_access: fix access permissions for backup files
937
938 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
939
940 libpve-access-control (1.0-25) unstable; urgency=low
941
942 * add VM.Snapshot permission
943
944 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
945
946 libpve-access-control (1.0-24) unstable; urgency=low
947
948 * untaint path (allow root to restore arbitrary paths)
949
950 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
951
952 libpve-access-control (1.0-23) unstable; urgency=low
953
954 * correctly compute GUI capabilities (consider pools)
955
956 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
957
958 libpve-access-control (1.0-22) unstable; urgency=low
959
960 * new plugin architecture for Auth modules, minor API change for Auth
961 domains (new 'delete' parameter)
962
963 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
964
965 libpve-access-control (1.0-21) unstable; urgency=low
966
967 * do not allow user names including slash
968
969 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
970
971 libpve-access-control (1.0-20) unstable; urgency=low
972
973 * add ability to fork cli workers in background
974
975 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
976
977 libpve-access-control (1.0-19) unstable; urgency=low
978
979 * return set of privileges on login - can be used to adopt GUI
980
981 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
982
983 libpve-access-control (1.0-18) unstable; urgency=low
984
985 * fix bug #151: correctly parse username inside ticket
986
987 * fix bug #152: allow user to change his own password
988
989 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
990
991 libpve-access-control (1.0-17) unstable; urgency=low
992
993 * set propagate flag by default
994
995 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
996
997 libpve-access-control (1.0-16) unstable; urgency=low
998
999 * add 'pveum passwd' method
1000
1001 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
1002
1003 libpve-access-control (1.0-15) unstable; urgency=low
1004
1005 * Add VM.Config.CDROM privilege to PVEVMUser rule
1006
1007 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
1008
1009 libpve-access-control (1.0-14) unstable; urgency=low
1010
1011 * fix buf in userid-param permission check
1012
1013 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
1014
1015 libpve-access-control (1.0-13) unstable; urgency=low
1016
1017 * allow more characters in ldap base_dn attribute
1018
1019 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
1020
1021 libpve-access-control (1.0-12) unstable; urgency=low
1022
1023 * allow more characters with realm IDs
1024
1025 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
1026
1027 libpve-access-control (1.0-11) unstable; urgency=low
1028
1029 * fix bug in exec_api2_perm_check
1030
1031 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
1032
1033 libpve-access-control (1.0-10) unstable; urgency=low
1034
1035 * fix ACL group name parser
1036
1037 * changed 'pveum aclmod' command line arguments
1038
1039 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
1040
1041 libpve-access-control (1.0-9) unstable; urgency=low
1042
1043 * fix bug in check_volume_access (fixes vzrestore)
1044
1045 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
1046
1047 libpve-access-control (1.0-8) unstable; urgency=low
1048
1049 * fix return value for empty ACL list.
1050
1051 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
1052
1053 libpve-access-control (1.0-7) unstable; urgency=low
1054
1055 * fix bug #85: allow root@pam to generate tickets for other users
1056
1057 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
1058
1059 libpve-access-control (1.0-6) unstable; urgency=low
1060
1061 * API change: allow to filter enabled/disabled users.
1062
1063 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
1064
1065 libpve-access-control (1.0-5) unstable; urgency=low
1066
1067 * add a way to return file changes (diffs): set_result_changes()
1068
1069 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
1070
1071 libpve-access-control (1.0-4) unstable; urgency=low
1072
1073 * new environment type for ha agents
1074
1075 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
1076
1077 libpve-access-control (1.0-3) unstable; urgency=low
1078
1079 * add support for delayed parameter parsing - We need that to disable
1080 file upload for normal API request (avoid DOS attacks)
1081
1082 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
1083
1084 libpve-access-control (1.0-2) unstable; urgency=low
1085
1086 * fix bug in fork_worker
1087
1088 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
1089
1090 libpve-access-control (1.0-1) unstable; urgency=low
1091
1092 * allow '-' in permission paths
1093
1094 * bump version to 1.0
1095
1096 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
1097
1098 libpve-access-control (0.1) unstable; urgency=low
1099
1100 * first dummy package - no functionality
1101
1102 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200
1103