1 libpve-access-control (7.4-2) bullseye; urgency=medium
3 * fix #4609: fix regression where a valid DN in the ldap/ad realm config
4 wasn't accepted anymore
6 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Mar 2023 15:44:21 +0100
8 libpve-access-control (7.4-1) bullseye; urgency=medium
10 * realm sync: refactor scope/remove-vanished into a standard option
12 * ldap: Allow quoted values for DN attribute values
14 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Mar 2023 17:16:11 +0100
16 libpve-access-control (7.3-2) bullseye; urgency=medium
18 * fix #4518: dramatically improve ACL computation performance
20 * userid format: clarify that this is the full name@realm in description
22 -- Proxmox Support Team <support@proxmox.com> Mon, 06 Mar 2023 11:40:11 +0100
24 libpve-access-control (7.3-1) bullseye; urgency=medium
26 * realm: sync: allow explicit 'none' for 'remove-vanished' option
28 -- Proxmox Support Team <support@proxmox.com> Fri, 16 Dec 2022 13:11:04 +0100
30 libpve-access-control (7.2-5) bullseye; urgency=medium
32 * api: realm sync: avoid separate log line for "remove-vanished" opt
34 * auth ldap/ad: compare group member dn case-insensitively
36 * two factor auth: only lock tfa config for recovery keys
38 * privs: add Sys.Incoming for guarding cross-cluster data streams like guest
39 migrations and storage migrations
41 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Nov 2022 13:09:17 +0100
43 libpve-access-control (7.2-4) bullseye; urgency=medium
45 * fix #4074: increase API OpenID code size limit to 2048
47 * auth key: protect against rare chance of a double rotation in clusters,
48 leaving the potential that some set of nodes have the earlier key cached,
49 that then got rotated out due to the race, resulting in a possible other
50 set of nodes having the newer key cached. This is a split view of the auth
51 key and may resulting in spurious failures if API requests are made to a
52 different node than the ticket was generated on.
53 In addition to that, the "keep validity of old tickets if signed in the
54 last two hours before rotation" logic was disabled too in such a case,
55 making such tickets invalid too early.
56 Note that both are cases where Proxmox VE was too strict, so while this
57 had no security implications it can be a nuisance, especially for
58 environments that use the API through an automated or scripted way
60 -- Proxmox Support Team <support@proxmox.com> Thu, 14 Jul 2022 08:36:51 +0200
62 libpve-access-control (7.2-3) bullseye; urgency=medium
64 * api: token: use userid-group as API perm check to avoid being overly
65 strict through a misguided use of user id for non-root users.
67 * perm check: forbid undefined/empty ACL path for future proofing of against
70 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200
72 libpve-access-control (7.2-2) bullseye; urgency=medium
74 * permissions: merge propagation flag for multiple roles on a path that
75 share privilege in a deterministic way, to avoid that it gets lost
76 depending on perl's random sort, which would result in returing less
77 privileges than an auth-id actually had.
79 * permissions: avoid that token and user privilege intersection is to strict
80 for user permissions that have propagation disabled.
82 -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200
84 libpve-access-control (7.2-1) bullseye; urgency=medium
86 * user check: fix expiration/enable order
88 -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200
90 libpve-access-control (7.1-8) bullseye; urgency=medium
92 * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove-
95 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200
97 libpve-access-control (7.1-7) bullseye; urgency=medium
99 * userid-group check: distinguish create and update
101 * api: get user: declare token schema
103 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100
105 libpve-access-control (7.1-6) bullseye; urgency=medium
107 * fix #3768: warn on bad u2f or webauthn settings
109 * tfa: when modifying others, verify the current user's password
111 * tfa list: account for admin permissions
113 * fix realm sync permissions
115 * fix token permission display bug
117 * include SDN permissions in permission tree
119 -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100
121 libpve-access-control (7.1-5) bullseye; urgency=medium
123 * openid: fix username-claim fallback
125 -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100
127 libpve-access-control (7.1-4) bullseye; urgency=medium
129 * set current origin in the webauthn config if no fixed origin was
130 configured, to support webauthn via subdomains
132 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
134 libpve-access-control (7.1-3) bullseye; urgency=medium
136 * openid: allow arbitrary username-claims
138 * openid: support configuring the prompt, scopes and ACR values
140 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
142 libpve-access-control (7.1-2) bullseye; urgency=medium
144 * catch incompatible tfa entries with a nice error
146 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
148 libpve-access-control (7.1-1) bullseye; urgency=medium
150 * tfa: map HTTP 404 error in get_tfa_entry correctly
152 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
154 libpve-access-control (7.0-7) bullseye; urgency=medium
156 * fix #3513: pass configured proxy to OpenID
158 * use rust based parser for TFA config
160 * use PBS-like auth api call flow,
162 * merge old user.cfg keys to tfa config when adding entries
164 * implement version checks for new tfa config writer to ensure all
165 cluster nodes are ready to avoid login issues
167 * tickets: add tunnel ticket
169 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
171 libpve-access-control (7.0-6) bullseye; urgency=medium
173 * fix regression in user deletion when realm does not enforce TFA
175 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
177 libpve-access-control (7.0-5) bullseye; urgency=medium
179 * acl: check path: add /sdn/vnets/* path
181 * fix #2302: allow deletion of users when realm enforces TFA
183 * api: delete user: disable user first to avoid surprise on error during the
184 various cleanup action required for user deletion (e.g., TFA, ACL, group)
186 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
188 libpve-access-control (7.0-4) bullseye; urgency=medium
190 * realm: add OpenID configuration
192 * api: implement OpenID related endpoints
194 * implement opt-in OpenID autocreate user feature
196 * api: user: add 'realm-type' to user list response
198 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
200 libpve-access-control (7.0-3) bullseye; urgency=medium
202 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
203 `/sdn/zones/<zone>` to allowed ACL paths
205 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
207 libpve-access-control (7.0-2) bullseye; urgency=medium
209 * fix #3402: add Pool.Audit privilege - custom roles containing
210 Pool.Allocate must be updated to include the new privilege.
212 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
214 libpve-access-control (7.0-1) bullseye; urgency=medium
216 * re-build for Debian 11 Bullseye based releases
218 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
220 libpve-access-control (6.4-1) pve; urgency=medium
222 * fix #1670: change PAM service name to project specific name
224 * fix #1500: permission path syntax check for access control
226 * pveum: add resource pool CLI commands
228 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
230 libpve-access-control (6.1-3) pve; urgency=medium
232 * partially fix #2825: authkey: rotate if it was generated in the
235 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
238 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
240 libpve-access-control (6.1-2) pve; urgency=medium
242 * also check SDN permission path when computing coarse permissions heuristic
245 * add SDN Permissions.Modify
247 * add VM.Config.Cloudinit
249 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
251 libpve-access-control (6.1-1) pve; urgency=medium
253 * pveum: add tfa delete subcommand for deleting user-TFA
255 * LDAP: don't complain about missing credentials on realm removal
257 * LDAP: skip anonymous bind when client certificate and key is configured
259 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
261 libpve-access-control (6.0-7) pve; urgency=medium
263 * fix #2575: die when trying to edit built-in roles
265 * add realm sub commands to pveum CLI tool
267 * api: domains: add user group sync API endpoint
269 * allow one to sync and import users and groups from LDAP/AD based realms
271 * realm: add default-sync-options to config for more convenient sync configuration
273 * api: token create: return also full token id for convenience
275 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
277 libpve-access-control (6.0-6) pve; urgency=medium
279 * API: add group members to group index
281 * implement API token support and management
283 * pveum: add 'pveum user token add/update/remove/list'
285 * pveum: add permissions sub-commands
287 * API: add 'permissions' API endpoint
289 * user.cfg: skip inexisting roles when parsing ACLs
291 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
293 libpve-access-control (6.0-5) pve; urgency=medium
295 * pveum: add list command for users, groups, ACLs and roles
297 * add initial permissions for experimental SDN integration
299 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
301 libpve-access-control (6.0-4) pve; urgency=medium
303 * ticket: use clinfo to get cluster name
305 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
308 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
310 libpve-access-control (6.0-3) pve; urgency=medium
312 * fix #2433: increase possible TFA secret length
314 * parse user configuration: correctly parse group names in ACLs, for users
315 which begin their name with an @
317 * sort user.cfg entries alphabetically
319 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
321 libpve-access-control (6.0-2) pve; urgency=medium
323 * improve CSRF verification compatibility with newer PVE
325 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
327 libpve-access-control (6.0-1) pve; urgency=medium
329 * ticket: properly verify exactly 5 minute old tickets
331 * use hmac_sha256 instead of sha1 for CSRF token generation
333 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
335 libpve-access-control (6.0-0+1) pve; urgency=medium
337 * bump for Debian buster
339 * fix #2079: add periodic auth key rotation
341 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
343 libpve-access-control (5.1-10) unstable; urgency=medium
345 * add /access/user/{id}/tfa api call to get tfa types
347 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
349 libpve-access-control (5.1-9) unstable; urgency=medium
351 * store the tfa type in user.cfg allowing to get it without proxying the call
352 to a higher privileged daemon.
354 * tfa: realm required TFA should lock out users without TFA configured, as it
355 was done before Proxmox VE 5.4
357 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
359 libpve-access-control (5.1-8) unstable; urgency=medium
361 * U2F: ensure we save correct public key on registration
363 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
365 libpve-access-control (5.1-7) unstable; urgency=medium
367 * verify_ticket: allow general non-challenge tfa to be run as two step
370 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
372 libpve-access-control (5.1-6) unstable; urgency=medium
374 * more general 2FA configuration via priv/tfa.cfg
376 * add u2f api endpoints
378 * delete TFA entries when deleting a user
380 * allow users to change their TOTP settings
382 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
384 libpve-access-control (5.1-5) unstable; urgency=medium
386 * fix vnc ticket verification without authkey lifetime
388 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
390 libpve-access-control (5.1-4) unstable; urgency=medium
392 * fix #1891: Add zsh command completion for pveum
394 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
395 to avoid issues on upgrade, will be enabled with 6.0
397 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
399 libpve-access-control (5.1-3) unstable; urgency=medium
401 * api/ticket: move getting cluster name into an eval
403 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
405 libpve-access-control (5.1-2) unstable; urgency=medium
407 * fix #1998: correct return properties for read_role
409 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
411 libpve-access-control (5.1-1) unstable; urgency=medium
413 * pveum: introduce sub-commands
415 * register userid with completion
417 * fix #233: return cluster name on successful login
419 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
421 libpve-access-control (5.0-8) unstable; urgency=medium
423 * fix #1612: ldap: make 2nd server work with bind domains again
425 * fix an error message where passing a bad pool id to an API function would
426 make it complain about a wrong group name instead
428 * fix the API-returned permission list so that the GUI knows to show the
429 'Permissions' tab for a storage to an administrator apart from root@pam
431 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
433 libpve-access-control (5.0-7) unstable; urgency=medium
435 * VM.Snapshot.Rollback privilege added
437 * api: check for special roles before locking the usercfg
439 * fix #1501: pveum: die when deleting special role
441 * API/ticket: rework coarse grained permission computation
443 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
445 libpve-access-control (5.0-6) unstable; urgency=medium
447 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
448 'verify' option. For compatibility reasons this defaults to off for now,
449 but that might change with future updates.
451 * AD, LDAP: Add ability to specify a CA path or file, and a client
452 certificate via the 'capath', 'cert' and 'certkey' options.
454 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
456 libpve-access-control (5.0-5) unstable; urgency=medium
458 * change from dpkg-deb to dpkg-buildpackage
460 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
462 libpve-access-control (5.0-4) unstable; urgency=medium
464 * PVE/CLI/pveum.pm: call setup_default_cli_env()
466 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
468 * check_api2_permissions: avoid warning about uninitialized value
470 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
472 libpve-access-control (5.0-3) unstable; urgency=medium
474 * use new PVE::OTP class from pve-common
476 * use new PVE::Tools::encrypt_pw from pve-common
478 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
480 libpve-access-control (5.0-2) unstable; urgency=medium
482 * encrypt_pw: avoid '+' for crypt salt
484 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
486 libpve-access-control (5.0-1) unstable; urgency=medium
488 * rebuild for PVE 5.0
490 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
492 libpve-access-control (4.0-23) unstable; urgency=medium
494 * use new PVE::Ticket class
496 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
498 libpve-access-control (4.0-22) unstable; urgency=medium
500 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
501 (moved to PVE::Storage)
503 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
505 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
507 libpve-access-control (4.0-21) unstable; urgency=medium
509 * setup_default_cli_env: expect $class as first parameter
511 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
513 libpve-access-control (4.0-20) unstable; urgency=medium
515 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
517 * PVE/API2/Domains.pm: fix property description
519 * use new repoman for upload target
521 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
523 libpve-access-control (4.0-19) unstable; urgency=medium
525 * Close #833: ldap: non-anonymous bind support
527 * don't import 'RFC' from MIME::Base32
529 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
531 libpve-access-control (4.0-18) unstable; urgency=medium
533 * fix #1062: recognize base32 otp keys again
535 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
537 libpve-access-control (4.0-17) unstable; urgency=medium
539 * drop oathtool and libdigest-hmac-perl dependencies
541 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
543 libpve-access-control (4.0-16) unstable; urgency=medium
545 * use pve-doc-generator to generate man pages
547 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
549 libpve-access-control (4.0-15) unstable; urgency=medium
551 * Fix uninitialized warning when shadow.cfg does not exist
553 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
555 libpve-access-control (4.0-14) unstable; urgency=medium
557 * Add is_worker to RPCEnvironment
559 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
561 libpve-access-control (4.0-13) unstable; urgency=medium
563 * fix #916: allow HTTPS to access custom yubico url
565 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
567 libpve-access-control (4.0-12) unstable; urgency=medium
569 * Catch certificate errors instead of segfaulting
571 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
573 libpve-access-control (4.0-11) unstable; urgency=medium
575 * Fix #861: use safer sprintf formatting
577 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
579 libpve-access-control (4.0-10) unstable; urgency=medium
581 * Auth::LDAP, Auth::AD: ipv6 support
583 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
585 libpve-access-control (4.0-9) unstable; urgency=medium
587 * pveum: implement bash completion
589 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
591 libpve-access-control (4.0-8) unstable; urgency=medium
593 * remove_storage_access: cleanup of access permissions for removed storage
595 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
597 libpve-access-control (4.0-7) unstable; urgency=medium
599 * new helper to remove access permissions for removed VMs
601 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
603 libpve-access-control (4.0-6) unstable; urgency=medium
605 * improve parse_user_config, parse_shadow_config
607 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
609 libpve-access-control (4.0-5) unstable; urgency=medium
611 * pveum: check for $cmd being defined
613 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
615 libpve-access-control (4.0-4) unstable; urgency=medium
617 * use activate-noawait triggers
619 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
621 libpve-access-control (4.0-3) unstable; urgency=medium
627 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
629 libpve-access-control (4.0-2) unstable; urgency=medium
631 * trigger pve-api-updates event
633 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
635 libpve-access-control (4.0-1) unstable; urgency=medium
637 * bump version for Debian Jessie
639 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
641 libpve-access-control (3.0-16) unstable; urgency=low
643 * root@pam can now be disabled in GUI.
645 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
647 libpve-access-control (3.0-15) unstable; urgency=low
649 * oath: add 'step' and 'digits' option
651 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
653 libpve-access-control (3.0-14) unstable; urgency=low
655 * add oath two factor auth
657 * add oathkeygen binary to generate keys for oath
659 * add yubico two factor auth
663 * depend on libmime-base32-perl
665 * allow to write builtin auth domains config (comment/tfa/default)
667 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
669 libpve-access-control (3.0-13) unstable; urgency=low
671 * use correct connection string for AD auth
673 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
675 libpve-access-control (3.0-12) unstable; urgency=low
677 * add dummy API for GET /access/ticket (useful to generate login pages)
679 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
681 libpve-access-control (3.0-11) unstable; urgency=low
683 * Sets common hot keys for spice client
685 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
687 libpve-access-control (3.0-10) unstable; urgency=low
689 * implement helper to generate SPICE remote-viewer configuration
691 * depend on libnet-ssleay-perl
693 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
695 libpve-access-control (3.0-9) unstable; urgency=low
697 * prevent user enumeration attacks
699 * allow dots in access paths
701 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
703 libpve-access-control (3.0-8) unstable; urgency=low
705 * spice: use lowercase hostname in ticktet signature
707 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
709 libpve-access-control (3.0-7) unstable; urgency=low
711 * check_volume_access : use parse_volname instead of path, and remove
714 * use warnings instead of global -w flag.
716 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
718 libpve-access-control (3.0-6) unstable; urgency=low
720 * use shorter spiceproxy tickets
722 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
724 libpve-access-control (3.0-5) unstable; urgency=low
726 * add code to generate tickets for SPICE
728 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
730 libpve-access-control (3.0-4) unstable; urgency=low
732 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
734 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
736 libpve-access-control (3.0-3) unstable; urgency=low
738 * Add new role PVETemplateUser (and VM.Clone privilege)
740 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
742 libpve-access-control (3.0-2) unstable; urgency=low
744 * remove CGI.pm related code (pveproxy does not need that)
746 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
748 libpve-access-control (3.0-1) unstable; urgency=low
750 * bump version for wheezy release
752 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
754 libpve-access-control (1.0-26) unstable; urgency=low
756 * check_volume_access: fix access permissions for backup files
758 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
760 libpve-access-control (1.0-25) unstable; urgency=low
762 * add VM.Snapshot permission
764 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
766 libpve-access-control (1.0-24) unstable; urgency=low
768 * untaint path (allow root to restore arbitrary paths)
770 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
772 libpve-access-control (1.0-23) unstable; urgency=low
774 * correctly compute GUI capabilities (consider pools)
776 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
778 libpve-access-control (1.0-22) unstable; urgency=low
780 * new plugin architecture for Auth modules, minor API change for Auth
781 domains (new 'delete' parameter)
783 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
785 libpve-access-control (1.0-21) unstable; urgency=low
787 * do not allow user names including slash
789 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
791 libpve-access-control (1.0-20) unstable; urgency=low
793 * add ability to fork cli workers in background
795 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
797 libpve-access-control (1.0-19) unstable; urgency=low
799 * return set of privileges on login - can be used to adopt GUI
801 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
803 libpve-access-control (1.0-18) unstable; urgency=low
805 * fix bug #151: correctly parse username inside ticket
807 * fix bug #152: allow user to change his own password
809 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
811 libpve-access-control (1.0-17) unstable; urgency=low
813 * set propagate flag by default
815 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
817 libpve-access-control (1.0-16) unstable; urgency=low
819 * add 'pveum passwd' method
821 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
823 libpve-access-control (1.0-15) unstable; urgency=low
825 * Add VM.Config.CDROM privilege to PVEVMUser rule
827 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
829 libpve-access-control (1.0-14) unstable; urgency=low
831 * fix buf in userid-param permission check
833 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
835 libpve-access-control (1.0-13) unstable; urgency=low
837 * allow more characters in ldap base_dn attribute
839 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
841 libpve-access-control (1.0-12) unstable; urgency=low
843 * allow more characters with realm IDs
845 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
847 libpve-access-control (1.0-11) unstable; urgency=low
849 * fix bug in exec_api2_perm_check
851 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
853 libpve-access-control (1.0-10) unstable; urgency=low
855 * fix ACL group name parser
857 * changed 'pveum aclmod' command line arguments
859 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
861 libpve-access-control (1.0-9) unstable; urgency=low
863 * fix bug in check_volume_access (fixes vzrestore)
865 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
867 libpve-access-control (1.0-8) unstable; urgency=low
869 * fix return value for empty ACL list.
871 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
873 libpve-access-control (1.0-7) unstable; urgency=low
875 * fix bug #85: allow root@pam to generate tickets for other users
877 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
879 libpve-access-control (1.0-6) unstable; urgency=low
881 * API change: allow to filter enabled/disabled users.
883 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
885 libpve-access-control (1.0-5) unstable; urgency=low
887 * add a way to return file changes (diffs): set_result_changes()
889 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
891 libpve-access-control (1.0-4) unstable; urgency=low
893 * new environment type for ha agents
895 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
897 libpve-access-control (1.0-3) unstable; urgency=low
899 * add support for delayed parameter parsing - We need that to disable
900 file upload for normal API request (avoid DOS attacks)
902 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
904 libpve-access-control (1.0-2) unstable; urgency=low
906 * fix bug in fork_worker
908 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
910 libpve-access-control (1.0-1) unstable; urgency=low
912 * allow '-' in permission paths
914 * bump version to 1.0
916 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
918 libpve-access-control (0.1) unstable; urgency=low
920 * first dummy package - no functionality
922 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200