]> git.proxmox.com Git - pve-access-control.git/blob - debian/changelog
bump version to 8.0.2
[pve-access-control.git] / debian / changelog
1 libpve-access-control (8.0.2) bookworm; urgency=medium
2
3 * api: users: sort groups to avoid "flapping" text
4
5 * api: tfa: don't block tokens from viewing and list TFA entries, both are
6 safe to do for anybody with enough permissions to view a user.
7
8 * api: tfa: add missing links for child-routes
9
10 -- Proxmox Support Team <support@proxmox.com> Wed, 21 Jun 2023 18:13:54 +0200
11
12 libpve-access-control (8.0.1) bookworm; urgency=medium
13
14 * tfa: cope with native versions in cluster version check
15
16 -- Proxmox Support Team <support@proxmox.com> Fri, 09 Jun 2023 16:12:01 +0200
17
18 libpve-access-control (8.0.0) bookworm; urgency=medium
19
20 * api: roles: forbid creating new roles starting with "PVE" namespace
21
22 -- Proxmox Support Team <support@proxmox.com> Fri, 09 Jun 2023 10:14:28 +0200
23
24 libpve-access-control (8.0.0~3) bookworm; urgency=medium
25
26 * rpcenv: api permission heuristic: query Sys.Modify for root ACL-path
27
28 * access control: add /sdn/zones/<zone>/<vnet>/<vlan> ACL object path
29
30 * add helper for checking bridge access
31
32 * add new SDN.Use privilege in PVESDNUser role, allowing one to specify
33 which user are allowed to use a bridge (or vnet, if SDN is installed)
34
35 * add privileges and paths for cluster resource mapping
36
37 -- Proxmox Support Team <support@proxmox.com> Wed, 07 Jun 2023 19:06:54 +0200
38
39 libpve-access-control (8.0.0~2) bookworm; urgency=medium
40
41 * api: user index: only include existing tfa lock flags
42
43 * add realm-sync plugin for jobs and CRUD api for realm-sync-jobs
44
45 * roles: only include Permissions.Modify in Administrator built-in role.
46 As, depending on the ACL object path, this privilege might allow one to
47 change their own permissions, which was making the distinction between
48 Admin and PVEAdmin irrelevant.
49
50 * acls: restrict less-privileged ACL modifications. Through allocate
51 permissions in pools, storages and virtual guests one can do some ACL
52 modifications without having the Permissions.Modify privilege, lock those
53 better down to ensure that one can only hand out only the subset of their
54 own privileges, never more. Note that this is mostly future proofing, as
55 the ACL object paths one could give out more permissions where already
56 limiting the scope.
57
58 -- Proxmox Support Team <support@proxmox.com> Wed, 07 Jun 2023 11:34:30 +0200
59
60 libpve-access-control (8.0.0~1) bookworm; urgency=medium
61
62 * bump pve-rs dependency to 0.8.3
63
64 * drop old verify_tfa api call (POST /access/tfa)
65
66 * drop support for old login API:
67 - 'new-format' is now considured to be 1 and ignored by the API
68
69 * pam auth: set PAM_RHOST to allow pam configs to log/restrict/... by remote
70 address
71
72 * cli: add 'pveum tfa list'
73
74 * cli: add 'pveum tfa unlock'
75
76 * enable lockout of TFA:
77 - too many TOTP attempts will lock out of TOTP
78 - using a recovery key will unlock TOTP
79 - too many TFA attempts will lock a user's TFA auth for an hour
80
81 * api: add /access/users/<userid>/unlock-tfa to unlock a user's TFA
82 authentication if it was locked by too many wrong 2nd factor login attempts
83
84 * api: /access/tfa and /access/users now include the tfa lockout status
85
86 -- Proxmox Support Team <support@proxmox.com> Mon, 05 Jun 2023 14:52:29 +0200
87
88 libpve-access-control (7.99.0) bookworm; urgency=medium
89
90 * initial re-build for Proxmox VE 8.x series
91
92 * switch to native versioning
93
94 -- Proxmox Support Team <support@proxmox.com> Sun, 21 May 2023 10:34:19 +0200
95
96 libpve-access-control (7.4-3) bullseye; urgency=medium
97
98 * use new 2nd factor verification from pve-rs
99
100 -- Proxmox Support Team <support@proxmox.com> Tue, 16 May 2023 13:31:28 +0200
101
102 libpve-access-control (7.4-2) bullseye; urgency=medium
103
104 * fix #4609: fix regression where a valid DN in the ldap/ad realm config
105 wasn't accepted anymore
106
107 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Mar 2023 15:44:21 +0100
108
109 libpve-access-control (7.4-1) bullseye; urgency=medium
110
111 * realm sync: refactor scope/remove-vanished into a standard option
112
113 * ldap: Allow quoted values for DN attribute values
114
115 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Mar 2023 17:16:11 +0100
116
117 libpve-access-control (7.3-2) bullseye; urgency=medium
118
119 * fix #4518: dramatically improve ACL computation performance
120
121 * userid format: clarify that this is the full name@realm in description
122
123 -- Proxmox Support Team <support@proxmox.com> Mon, 06 Mar 2023 11:40:11 +0100
124
125 libpve-access-control (7.3-1) bullseye; urgency=medium
126
127 * realm: sync: allow explicit 'none' for 'remove-vanished' option
128
129 -- Proxmox Support Team <support@proxmox.com> Fri, 16 Dec 2022 13:11:04 +0100
130
131 libpve-access-control (7.2-5) bullseye; urgency=medium
132
133 * api: realm sync: avoid separate log line for "remove-vanished" opt
134
135 * auth ldap/ad: compare group member dn case-insensitively
136
137 * two factor auth: only lock tfa config for recovery keys
138
139 * privs: add Sys.Incoming for guarding cross-cluster data streams like guest
140 migrations and storage migrations
141
142 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Nov 2022 13:09:17 +0100
143
144 libpve-access-control (7.2-4) bullseye; urgency=medium
145
146 * fix #4074: increase API OpenID code size limit to 2048
147
148 * auth key: protect against rare chance of a double rotation in clusters,
149 leaving the potential that some set of nodes have the earlier key cached,
150 that then got rotated out due to the race, resulting in a possible other
151 set of nodes having the newer key cached. This is a split view of the auth
152 key and may resulting in spurious failures if API requests are made to a
153 different node than the ticket was generated on.
154 In addition to that, the "keep validity of old tickets if signed in the
155 last two hours before rotation" logic was disabled too in such a case,
156 making such tickets invalid too early.
157 Note that both are cases where Proxmox VE was too strict, so while this
158 had no security implications it can be a nuisance, especially for
159 environments that use the API through an automated or scripted way
160
161 -- Proxmox Support Team <support@proxmox.com> Thu, 14 Jul 2022 08:36:51 +0200
162
163 libpve-access-control (7.2-3) bullseye; urgency=medium
164
165 * api: token: use userid-group as API perm check to avoid being overly
166 strict through a misguided use of user id for non-root users.
167
168 * perm check: forbid undefined/empty ACL path for future proofing of against
169 above issue
170
171 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Jun 2022 15:51:14 +0200
172
173 libpve-access-control (7.2-2) bullseye; urgency=medium
174
175 * permissions: merge propagation flag for multiple roles on a path that
176 share privilege in a deterministic way, to avoid that it gets lost
177 depending on perl's random sort, which would result in returing less
178 privileges than an auth-id actually had.
179
180 * permissions: avoid that token and user privilege intersection is to strict
181 for user permissions that have propagation disabled.
182
183 -- Proxmox Support Team <support@proxmox.com> Fri, 03 Jun 2022 14:02:30 +0200
184
185 libpve-access-control (7.2-1) bullseye; urgency=medium
186
187 * user check: fix expiration/enable order
188
189 -- Proxmox Support Team <support@proxmox.com> Tue, 31 May 2022 13:43:37 +0200
190
191 libpve-access-control (7.1-8) bullseye; urgency=medium
192
193 * fix #3668: realm-sync: replace 'full' & 'purge' with 'remove-
194 vanished'
195
196 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Apr 2022 17:02:46 +0200
197
198 libpve-access-control (7.1-7) bullseye; urgency=medium
199
200 * userid-group check: distinguish create and update
201
202 * api: get user: declare token schema
203
204 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Mar 2022 16:15:23 +0100
205
206 libpve-access-control (7.1-6) bullseye; urgency=medium
207
208 * fix #3768: warn on bad u2f or webauthn settings
209
210 * tfa: when modifying others, verify the current user's password
211
212 * tfa list: account for admin permissions
213
214 * fix realm sync permissions
215
216 * fix token permission display bug
217
218 * include SDN permissions in permission tree
219
220 -- Proxmox Support Team <support@proxmox.com> Fri, 21 Jan 2022 14:20:42 +0100
221
222 libpve-access-control (7.1-5) bullseye; urgency=medium
223
224 * openid: fix username-claim fallback
225
226 -- Proxmox Support Team <support@proxmox.com> Thu, 25 Nov 2021 07:57:38 +0100
227
228 libpve-access-control (7.1-4) bullseye; urgency=medium
229
230 * set current origin in the webauthn config if no fixed origin was
231 configured, to support webauthn via subdomains
232
233 -- Proxmox Support Team <support@proxmox.com> Mon, 22 Nov 2021 14:04:06 +0100
234
235 libpve-access-control (7.1-3) bullseye; urgency=medium
236
237 * openid: allow arbitrary username-claims
238
239 * openid: support configuring the prompt, scopes and ACR values
240
241 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Nov 2021 08:11:52 +0100
242
243 libpve-access-control (7.1-2) bullseye; urgency=medium
244
245 * catch incompatible tfa entries with a nice error
246
247 -- Proxmox Support Team <support@proxmox.com> Wed, 17 Nov 2021 13:44:45 +0100
248
249 libpve-access-control (7.1-1) bullseye; urgency=medium
250
251 * tfa: map HTTP 404 error in get_tfa_entry correctly
252
253 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Nov 2021 15:33:22 +0100
254
255 libpve-access-control (7.0-7) bullseye; urgency=medium
256
257 * fix #3513: pass configured proxy to OpenID
258
259 * use rust based parser for TFA config
260
261 * use PBS-like auth api call flow,
262
263 * merge old user.cfg keys to tfa config when adding entries
264
265 * implement version checks for new tfa config writer to ensure all
266 cluster nodes are ready to avoid login issues
267
268 * tickets: add tunnel ticket
269
270 -- Proxmox Support Team <support@proxmox.com> Thu, 11 Nov 2021 18:17:49 +0100
271
272 libpve-access-control (7.0-6) bullseye; urgency=medium
273
274 * fix regression in user deletion when realm does not enforce TFA
275
276 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Oct 2021 12:28:52 +0200
277
278 libpve-access-control (7.0-5) bullseye; urgency=medium
279
280 * acl: check path: add /sdn/vnets/* path
281
282 * fix #2302: allow deletion of users when realm enforces TFA
283
284 * api: delete user: disable user first to avoid surprise on error during the
285 various cleanup action required for user deletion (e.g., TFA, ACL, group)
286
287 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Sep 2021 15:50:47 +0200
288
289 libpve-access-control (7.0-4) bullseye; urgency=medium
290
291 * realm: add OpenID configuration
292
293 * api: implement OpenID related endpoints
294
295 * implement opt-in OpenID autocreate user feature
296
297 * api: user: add 'realm-type' to user list response
298
299 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Jul 2021 13:45:46 +0200
300
301 libpve-access-control (7.0-3) bullseye; urgency=medium
302
303 * api: acl: add missing `/access/realm/<realm>`, `/access/group/<group>` and
304 `/sdn/zones/<zone>` to allowed ACL paths
305
306 -- Proxmox Support Team <support@proxmox.com> Mon, 21 Jun 2021 10:31:19 +0200
307
308 libpve-access-control (7.0-2) bullseye; urgency=medium
309
310 * fix #3402: add Pool.Audit privilege - custom roles containing
311 Pool.Allocate must be updated to include the new privilege.
312
313 -- Proxmox Support Team <support@proxmox.com> Tue, 1 Jun 2021 11:28:38 +0200
314
315 libpve-access-control (7.0-1) bullseye; urgency=medium
316
317 * re-build for Debian 11 Bullseye based releases
318
319 -- Proxmox Support Team <support@proxmox.com> Sun, 09 May 2021 18:18:23 +0200
320
321 libpve-access-control (6.4-1) pve; urgency=medium
322
323 * fix #1670: change PAM service name to project specific name
324
325 * fix #1500: permission path syntax check for access control
326
327 * pveum: add resource pool CLI commands
328
329 -- Proxmox Support Team <support@proxmox.com> Sat, 24 Apr 2021 19:48:21 +0200
330
331 libpve-access-control (6.1-3) pve; urgency=medium
332
333 * partially fix #2825: authkey: rotate if it was generated in the
334 future
335
336 * fix #2947: add an option to LDAP or AD realm to switch user lookup to case
337 insensitive
338
339 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Sep 2020 08:54:13 +0200
340
341 libpve-access-control (6.1-2) pve; urgency=medium
342
343 * also check SDN permission path when computing coarse permissions heuristic
344 for UIs
345
346 * add SDN Permissions.Modify
347
348 * add VM.Config.Cloudinit
349
350 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Jun 2020 13:06:56 +0200
351
352 libpve-access-control (6.1-1) pve; urgency=medium
353
354 * pveum: add tfa delete subcommand for deleting user-TFA
355
356 * LDAP: don't complain about missing credentials on realm removal
357
358 * LDAP: skip anonymous bind when client certificate and key is configured
359
360 -- Proxmox Support Team <support@proxmox.com> Fri, 08 May 2020 17:47:41 +0200
361
362 libpve-access-control (6.0-7) pve; urgency=medium
363
364 * fix #2575: die when trying to edit built-in roles
365
366 * add realm sub commands to pveum CLI tool
367
368 * api: domains: add user group sync API endpoint
369
370 * allow one to sync and import users and groups from LDAP/AD based realms
371
372 * realm: add default-sync-options to config for more convenient sync configuration
373
374 * api: token create: return also full token id for convenience
375
376 -- Proxmox Support Team <support@proxmox.com> Sat, 25 Apr 2020 19:35:17 +0200
377
378 libpve-access-control (6.0-6) pve; urgency=medium
379
380 * API: add group members to group index
381
382 * implement API token support and management
383
384 * pveum: add 'pveum user token add/update/remove/list'
385
386 * pveum: add permissions sub-commands
387
388 * API: add 'permissions' API endpoint
389
390 * user.cfg: skip inexisting roles when parsing ACLs
391
392 -- Proxmox Support Team <support@proxmox.com> Wed, 29 Jan 2020 10:17:27 +0100
393
394 libpve-access-control (6.0-5) pve; urgency=medium
395
396 * pveum: add list command for users, groups, ACLs and roles
397
398 * add initial permissions for experimental SDN integration
399
400 -- Proxmox Support Team <support@proxmox.com> Tue, 26 Nov 2019 17:56:37 +0100
401
402 libpve-access-control (6.0-4) pve; urgency=medium
403
404 * ticket: use clinfo to get cluster name
405
406 * ldaps: add sslversion configuration property to support TLS 1.1 to 1.3 as
407 SSL version
408
409 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2019 11:55:11 +0100
410
411 libpve-access-control (6.0-3) pve; urgency=medium
412
413 * fix #2433: increase possible TFA secret length
414
415 * parse user configuration: correctly parse group names in ACLs, for users
416 which begin their name with an @
417
418 * sort user.cfg entries alphabetically
419
420 -- Proxmox Support Team <support@proxmox.com> Tue, 29 Oct 2019 08:52:23 +0100
421
422 libpve-access-control (6.0-2) pve; urgency=medium
423
424 * improve CSRF verification compatibility with newer PVE
425
426 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2019 20:24:35 +0200
427
428 libpve-access-control (6.0-1) pve; urgency=medium
429
430 * ticket: properly verify exactly 5 minute old tickets
431
432 * use hmac_sha256 instead of sha1 for CSRF token generation
433
434 -- Proxmox Support Team <support@proxmox.com> Mon, 24 Jun 2019 18:14:45 +0200
435
436 libpve-access-control (6.0-0+1) pve; urgency=medium
437
438 * bump for Debian buster
439
440 * fix #2079: add periodic auth key rotation
441
442 -- Proxmox Support Team <support@proxmox.com> Tue, 21 May 2019 21:31:15 +0200
443
444 libpve-access-control (5.1-10) unstable; urgency=medium
445
446 * add /access/user/{id}/tfa api call to get tfa types
447
448 -- Proxmox Support Team <support@proxmox.com> Wed, 15 May 2019 16:21:10 +0200
449
450 libpve-access-control (5.1-9) unstable; urgency=medium
451
452 * store the tfa type in user.cfg allowing to get it without proxying the call
453 to a higher privileged daemon.
454
455 * tfa: realm required TFA should lock out users without TFA configured, as it
456 was done before Proxmox VE 5.4
457
458 -- Proxmox Support Team <support@proxmox.com> Tue, 30 Apr 2019 14:01:00 +0000
459
460 libpve-access-control (5.1-8) unstable; urgency=medium
461
462 * U2F: ensure we save correct public key on registration
463
464 -- Proxmox Support Team <support@proxmox.com> Tue, 09 Apr 2019 12:47:12 +0200
465
466 libpve-access-control (5.1-7) unstable; urgency=medium
467
468 * verify_ticket: allow general non-challenge tfa to be run as two step
469 call
470
471 -- Proxmox Support Team <support@proxmox.com> Mon, 08 Apr 2019 16:56:14 +0200
472
473 libpve-access-control (5.1-6) unstable; urgency=medium
474
475 * more general 2FA configuration via priv/tfa.cfg
476
477 * add u2f api endpoints
478
479 * delete TFA entries when deleting a user
480
481 * allow users to change their TOTP settings
482
483 -- Proxmox Support Team <support@proxmox.com> Wed, 03 Apr 2019 13:40:26 +0200
484
485 libpve-access-control (5.1-5) unstable; urgency=medium
486
487 * fix vnc ticket verification without authkey lifetime
488
489 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 10:43:17 +0100
490
491 libpve-access-control (5.1-4) unstable; urgency=medium
492
493 * fix #1891: Add zsh command completion for pveum
494
495 * ground work to fix #2079: add periodic auth key rotation. Not yet enabled
496 to avoid issues on upgrade, will be enabled with 6.0
497
498 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Mar 2019 09:12:05 +0100
499
500 libpve-access-control (5.1-3) unstable; urgency=medium
501
502 * api/ticket: move getting cluster name into an eval
503
504 -- Proxmox Support Team <support@proxmox.com> Thu, 29 Nov 2018 12:59:36 +0100
505
506 libpve-access-control (5.1-2) unstable; urgency=medium
507
508 * fix #1998: correct return properties for read_role
509
510 -- Proxmox Support Team <support@proxmox.com> Fri, 23 Nov 2018 14:22:40 +0100
511
512 libpve-access-control (5.1-1) unstable; urgency=medium
513
514 * pveum: introduce sub-commands
515
516 * register userid with completion
517
518 * fix #233: return cluster name on successful login
519
520 -- Proxmox Support Team <support@proxmox.com> Thu, 15 Nov 2018 09:34:47 +0100
521
522 libpve-access-control (5.0-8) unstable; urgency=medium
523
524 * fix #1612: ldap: make 2nd server work with bind domains again
525
526 * fix an error message where passing a bad pool id to an API function would
527 make it complain about a wrong group name instead
528
529 * fix the API-returned permission list so that the GUI knows to show the
530 'Permissions' tab for a storage to an administrator apart from root@pam
531
532 -- Proxmox Support Team <support@proxmox.com> Thu, 18 Jan 2018 13:34:50 +0100
533
534 libpve-access-control (5.0-7) unstable; urgency=medium
535
536 * VM.Snapshot.Rollback privilege added
537
538 * api: check for special roles before locking the usercfg
539
540 * fix #1501: pveum: die when deleting special role
541
542 * API/ticket: rework coarse grained permission computation
543
544 -- Proxmox Support Team <support@proxmox.com> Thu, 5 Oct 2017 11:27:48 +0200
545
546 libpve-access-control (5.0-6) unstable; urgency=medium
547
548 * Close #1470: Add server ceritifcate verification for AD and LDAP via the
549 'verify' option. For compatibility reasons this defaults to off for now,
550 but that might change with future updates.
551
552 * AD, LDAP: Add ability to specify a CA path or file, and a client
553 certificate via the 'capath', 'cert' and 'certkey' options.
554
555 -- Proxmox Support Team <support@proxmox.com> Tue, 08 Aug 2017 11:56:38 +0200
556
557 libpve-access-control (5.0-5) unstable; urgency=medium
558
559 * change from dpkg-deb to dpkg-buildpackage
560
561 -- Proxmox Support Team <support@proxmox.com> Thu, 22 Jun 2017 09:12:37 +0200
562
563 libpve-access-control (5.0-4) unstable; urgency=medium
564
565 * PVE/CLI/pveum.pm: call setup_default_cli_env()
566
567 * PVE/Auth/PVE.pm: encode uft8 password before calling crypt
568
569 * check_api2_permissions: avoid warning about uninitialized value
570
571 -- Proxmox Support Team <support@proxmox.com> Tue, 02 May 2017 11:58:15 +0200
572
573 libpve-access-control (5.0-3) unstable; urgency=medium
574
575 * use new PVE::OTP class from pve-common
576
577 * use new PVE::Tools::encrypt_pw from pve-common
578
579 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 17:45:55 +0200
580
581 libpve-access-control (5.0-2) unstable; urgency=medium
582
583 * encrypt_pw: avoid '+' for crypt salt
584
585 -- Proxmox Support Team <support@proxmox.com> Thu, 30 Mar 2017 08:54:10 +0200
586
587 libpve-access-control (5.0-1) unstable; urgency=medium
588
589 * rebuild for PVE 5.0
590
591 -- Proxmox Support Team <support@proxmox.com> Mon, 6 Mar 2017 13:42:01 +0100
592
593 libpve-access-control (4.0-23) unstable; urgency=medium
594
595 * use new PVE::Ticket class
596
597 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 13:42:06 +0100
598
599 libpve-access-control (4.0-22) unstable; urgency=medium
600
601 * RPCEnvironment: removed check_volume_access() to avoid cyclic dependency
602 (moved to PVE::Storage)
603
604 * PVE::PCEnvironment: use new PVE::RESTEnvironment as base class
605
606 -- Proxmox Support Team <support@proxmox.com> Thu, 19 Jan 2017 09:12:04 +0100
607
608 libpve-access-control (4.0-21) unstable; urgency=medium
609
610 * setup_default_cli_env: expect $class as first parameter
611
612 -- Proxmox Support Team <support@proxmox.com> Thu, 12 Jan 2017 13:54:27 +0100
613
614 libpve-access-control (4.0-20) unstable; urgency=medium
615
616 * PVE/RPCEnvironment.pm: new function setup_default_cli_env
617
618 * PVE/API2/Domains.pm: fix property description
619
620 * use new repoman for upload target
621
622 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2017 12:13:26 +0100
623
624 libpve-access-control (4.0-19) unstable; urgency=medium
625
626 * Close #833: ldap: non-anonymous bind support
627
628 * don't import 'RFC' from MIME::Base32
629
630 -- Proxmox Support Team <support@proxmox.com> Fri, 05 Aug 2016 13:09:08 +0200
631
632 libpve-access-control (4.0-18) unstable; urgency=medium
633
634 * fix #1062: recognize base32 otp keys again
635
636 -- Proxmox Support Team <support@proxmox.com> Thu, 21 Jul 2016 08:43:18 +0200
637
638 libpve-access-control (4.0-17) unstable; urgency=medium
639
640 * drop oathtool and libdigest-hmac-perl dependencies
641
642 -- Proxmox Support Team <support@proxmox.com> Mon, 11 Jul 2016 12:03:22 +0200
643
644 libpve-access-control (4.0-16) unstable; urgency=medium
645
646 * use pve-doc-generator to generate man pages
647
648 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Apr 2016 07:06:05 +0200
649
650 libpve-access-control (4.0-15) unstable; urgency=medium
651
652 * Fix uninitialized warning when shadow.cfg does not exist
653
654 -- Proxmox Support Team <support@proxmox.com> Fri, 01 Apr 2016 07:10:57 +0200
655
656 libpve-access-control (4.0-14) unstable; urgency=medium
657
658 * Add is_worker to RPCEnvironment
659
660 -- Proxmox Support Team <support@proxmox.com> Tue, 15 Mar 2016 16:47:34 +0100
661
662 libpve-access-control (4.0-13) unstable; urgency=medium
663
664 * fix #916: allow HTTPS to access custom yubico url
665
666 -- Proxmox Support Team <support@proxmox.com> Mon, 14 Mar 2016 11:39:23 +0100
667
668 libpve-access-control (4.0-12) unstable; urgency=medium
669
670 * Catch certificate errors instead of segfaulting
671
672 -- Proxmox Support Team <support@proxmox.com> Wed, 09 Mar 2016 14:41:01 +0100
673
674 libpve-access-control (4.0-11) unstable; urgency=medium
675
676 * Fix #861: use safer sprintf formatting
677
678 -- Proxmox Support Team <support@proxmox.com> Fri, 08 Jan 2016 12:52:39 +0100
679
680 libpve-access-control (4.0-10) unstable; urgency=medium
681
682 * Auth::LDAP, Auth::AD: ipv6 support
683
684 -- Proxmox Support Team <support@proxmox.com> Thu, 03 Dec 2015 12:09:32 +0100
685
686 libpve-access-control (4.0-9) unstable; urgency=medium
687
688 * pveum: implement bash completion
689
690 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Oct 2015 17:22:52 +0200
691
692 libpve-access-control (4.0-8) unstable; urgency=medium
693
694 * remove_storage_access: cleanup of access permissions for removed storage
695
696 -- Proxmox Support Team <support@proxmox.com> Wed, 19 Aug 2015 15:39:15 +0200
697
698 libpve-access-control (4.0-7) unstable; urgency=medium
699
700 * new helper to remove access permissions for removed VMs
701
702 -- Proxmox Support Team <support@proxmox.com> Fri, 14 Aug 2015 07:57:02 +0200
703
704 libpve-access-control (4.0-6) unstable; urgency=medium
705
706 * improve parse_user_config, parse_shadow_config
707
708 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jul 2015 13:14:33 +0200
709
710 libpve-access-control (4.0-5) unstable; urgency=medium
711
712 * pveum: check for $cmd being defined
713
714 -- Proxmox Support Team <support@proxmox.com> Wed, 10 Jun 2015 10:40:15 +0200
715
716 libpve-access-control (4.0-4) unstable; urgency=medium
717
718 * use activate-noawait triggers
719
720 -- Proxmox Support Team <support@proxmox.com> Mon, 01 Jun 2015 12:25:31 +0200
721
722 libpve-access-control (4.0-3) unstable; urgency=medium
723
724 * IPv6 fixes
725
726 * non-root buildfix
727
728 -- Proxmox Support Team <support@proxmox.com> Wed, 27 May 2015 11:15:44 +0200
729
730 libpve-access-control (4.0-2) unstable; urgency=medium
731
732 * trigger pve-api-updates event
733
734 -- Proxmox Support Team <support@proxmox.com> Tue, 05 May 2015 15:06:38 +0200
735
736 libpve-access-control (4.0-1) unstable; urgency=medium
737
738 * bump version for Debian Jessie
739
740 -- Proxmox Support Team <support@proxmox.com> Thu, 26 Feb 2015 11:22:01 +0100
741
742 libpve-access-control (3.0-16) unstable; urgency=low
743
744 * root@pam can now be disabled in GUI.
745
746 -- Proxmox Support Team <support@proxmox.com> Fri, 30 Jan 2015 06:20:22 +0100
747
748 libpve-access-control (3.0-15) unstable; urgency=low
749
750 * oath: add 'step' and 'digits' option
751
752 -- Proxmox Support Team <support@proxmox.com> Wed, 23 Jul 2014 06:59:52 +0200
753
754 libpve-access-control (3.0-14) unstable; urgency=low
755
756 * add oath two factor auth
757
758 * add oathkeygen binary to generate keys for oath
759
760 * add yubico two factor auth
761
762 * dedend on oathtool
763
764 * depend on libmime-base32-perl
765
766 * allow to write builtin auth domains config (comment/tfa/default)
767
768 -- Proxmox Support Team <support@proxmox.com> Thu, 17 Jul 2014 13:09:56 +0200
769
770 libpve-access-control (3.0-13) unstable; urgency=low
771
772 * use correct connection string for AD auth
773
774 -- Proxmox Support Team <support@proxmox.com> Thu, 22 May 2014 07:16:09 +0200
775
776 libpve-access-control (3.0-12) unstable; urgency=low
777
778 * add dummy API for GET /access/ticket (useful to generate login pages)
779
780 -- Proxmox Support Team <support@proxmox.com> Wed, 30 Apr 2014 14:47:56 +0200
781
782 libpve-access-control (3.0-11) unstable; urgency=low
783
784 * Sets common hot keys for spice client
785
786 -- Proxmox Support Team <support@proxmox.com> Fri, 31 Jan 2014 10:24:28 +0100
787
788 libpve-access-control (3.0-10) unstable; urgency=low
789
790 * implement helper to generate SPICE remote-viewer configuration
791
792 * depend on libnet-ssleay-perl
793
794 -- Proxmox Support Team <support@proxmox.com> Tue, 10 Dec 2013 10:45:08 +0100
795
796 libpve-access-control (3.0-9) unstable; urgency=low
797
798 * prevent user enumeration attacks
799
800 * allow dots in access paths
801
802 -- Proxmox Support Team <support@proxmox.com> Mon, 18 Nov 2013 09:06:38 +0100
803
804 libpve-access-control (3.0-8) unstable; urgency=low
805
806 * spice: use lowercase hostname in ticktet signature
807
808 -- Proxmox Support Team <support@proxmox.com> Mon, 28 Oct 2013 08:11:57 +0100
809
810 libpve-access-control (3.0-7) unstable; urgency=low
811
812 * check_volume_access : use parse_volname instead of path, and remove
813 path related code.
814
815 * use warnings instead of global -w flag.
816
817 -- Proxmox Support Team <support@proxmox.com> Tue, 01 Oct 2013 12:35:53 +0200
818
819 libpve-access-control (3.0-6) unstable; urgency=low
820
821 * use shorter spiceproxy tickets
822
823 -- Proxmox Support Team <support@proxmox.com> Fri, 19 Jul 2013 12:39:09 +0200
824
825 libpve-access-control (3.0-5) unstable; urgency=low
826
827 * add code to generate tickets for SPICE
828
829 -- Proxmox Support Team <support@proxmox.com> Wed, 26 Jun 2013 13:08:32 +0200
830
831 libpve-access-control (3.0-4) unstable; urgency=low
832
833 * moved add_vm_to_pool/remove_vm_from_pool from qemu-server
834
835 -- Proxmox Support Team <support@proxmox.com> Tue, 14 May 2013 11:56:54 +0200
836
837 libpve-access-control (3.0-3) unstable; urgency=low
838
839 * Add new role PVETemplateUser (and VM.Clone privilege)
840
841 -- Proxmox Support Team <support@proxmox.com> Mon, 29 Apr 2013 11:42:15 +0200
842
843 libpve-access-control (3.0-2) unstable; urgency=low
844
845 * remove CGI.pm related code (pveproxy does not need that)
846
847 -- Proxmox Support Team <support@proxmox.com> Mon, 15 Apr 2013 12:34:23 +0200
848
849 libpve-access-control (3.0-1) unstable; urgency=low
850
851 * bump version for wheezy release
852
853 -- Proxmox Support Team <support@proxmox.com> Fri, 15 Mar 2013 08:07:06 +0100
854
855 libpve-access-control (1.0-26) unstable; urgency=low
856
857 * check_volume_access: fix access permissions for backup files
858
859 -- Proxmox Support Team <support@proxmox.com> Thu, 28 Feb 2013 10:00:14 +0100
860
861 libpve-access-control (1.0-25) unstable; urgency=low
862
863 * add VM.Snapshot permission
864
865 -- Proxmox Support Team <support@proxmox.com> Mon, 10 Sep 2012 09:23:32 +0200
866
867 libpve-access-control (1.0-24) unstable; urgency=low
868
869 * untaint path (allow root to restore arbitrary paths)
870
871 -- Proxmox Support Team <support@proxmox.com> Wed, 06 Jun 2012 13:06:34 +0200
872
873 libpve-access-control (1.0-23) unstable; urgency=low
874
875 * correctly compute GUI capabilities (consider pools)
876
877 -- Proxmox Support Team <support@proxmox.com> Wed, 30 May 2012 08:47:23 +0200
878
879 libpve-access-control (1.0-22) unstable; urgency=low
880
881 * new plugin architecture for Auth modules, minor API change for Auth
882 domains (new 'delete' parameter)
883
884 -- Proxmox Support Team <support@proxmox.com> Wed, 16 May 2012 07:21:44 +0200
885
886 libpve-access-control (1.0-21) unstable; urgency=low
887
888 * do not allow user names including slash
889
890 -- Proxmox Support Team <support@proxmox.com> Tue, 24 Apr 2012 10:07:47 +0200
891
892 libpve-access-control (1.0-20) unstable; urgency=low
893
894 * add ability to fork cli workers in background
895
896 -- Proxmox Support Team <support@proxmox.com> Wed, 18 Apr 2012 08:28:20 +0200
897
898 libpve-access-control (1.0-19) unstable; urgency=low
899
900 * return set of privileges on login - can be used to adopt GUI
901
902 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Apr 2012 10:25:10 +0200
903
904 libpve-access-control (1.0-18) unstable; urgency=low
905
906 * fix bug #151: correctly parse username inside ticket
907
908 * fix bug #152: allow user to change his own password
909
910 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Apr 2012 09:40:15 +0200
911
912 libpve-access-control (1.0-17) unstable; urgency=low
913
914 * set propagate flag by default
915
916 -- Proxmox Support Team <support@proxmox.com> Thu, 01 Mar 2012 12:40:19 +0100
917
918 libpve-access-control (1.0-16) unstable; urgency=low
919
920 * add 'pveum passwd' method
921
922 -- Proxmox Support Team <support@proxmox.com> Thu, 23 Feb 2012 12:05:25 +0100
923
924 libpve-access-control (1.0-15) unstable; urgency=low
925
926 * Add VM.Config.CDROM privilege to PVEVMUser rule
927
928 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 11:44:23 +0100
929
930 libpve-access-control (1.0-14) unstable; urgency=low
931
932 * fix buf in userid-param permission check
933
934 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 10:52:35 +0100
935
936 libpve-access-control (1.0-13) unstable; urgency=low
937
938 * allow more characters in ldap base_dn attribute
939
940 -- Proxmox Support Team <support@proxmox.com> Wed, 22 Feb 2012 06:17:02 +0100
941
942 libpve-access-control (1.0-12) unstable; urgency=low
943
944 * allow more characters with realm IDs
945
946 -- Proxmox Support Team <support@proxmox.com> Mon, 20 Feb 2012 08:50:33 +0100
947
948 libpve-access-control (1.0-11) unstable; urgency=low
949
950 * fix bug in exec_api2_perm_check
951
952 -- Proxmox Support Team <support@proxmox.com> Wed, 15 Feb 2012 07:06:30 +0100
953
954 libpve-access-control (1.0-10) unstable; urgency=low
955
956 * fix ACL group name parser
957
958 * changed 'pveum aclmod' command line arguments
959
960 -- Proxmox Support Team <support@proxmox.com> Tue, 14 Feb 2012 12:08:02 +0100
961
962 libpve-access-control (1.0-9) unstable; urgency=low
963
964 * fix bug in check_volume_access (fixes vzrestore)
965
966 -- Proxmox Support Team <support@proxmox.com> Mon, 13 Feb 2012 09:56:37 +0100
967
968 libpve-access-control (1.0-8) unstable; urgency=low
969
970 * fix return value for empty ACL list.
971
972 -- Proxmox Support Team <support@proxmox.com> Fri, 10 Feb 2012 11:25:04 +0100
973
974 libpve-access-control (1.0-7) unstable; urgency=low
975
976 * fix bug #85: allow root@pam to generate tickets for other users
977
978 -- Proxmox Support Team <support@proxmox.com> Tue, 17 Jan 2012 06:40:18 +0100
979
980 libpve-access-control (1.0-6) unstable; urgency=low
981
982 * API change: allow to filter enabled/disabled users.
983
984 -- Proxmox Support Team <support@proxmox.com> Wed, 11 Jan 2012 12:30:37 +0100
985
986 libpve-access-control (1.0-5) unstable; urgency=low
987
988 * add a way to return file changes (diffs): set_result_changes()
989
990 -- Proxmox Support Team <support@proxmox.com> Tue, 20 Dec 2011 11:18:48 +0100
991
992 libpve-access-control (1.0-4) unstable; urgency=low
993
994 * new environment type for ha agents
995
996 -- Proxmox Support Team <support@proxmox.com> Tue, 13 Dec 2011 10:08:53 +0100
997
998 libpve-access-control (1.0-3) unstable; urgency=low
999
1000 * add support for delayed parameter parsing - We need that to disable
1001 file upload for normal API request (avoid DOS attacks)
1002
1003 -- Proxmox Support Team <support@proxmox.com> Fri, 02 Dec 2011 09:56:10 +0100
1004
1005 libpve-access-control (1.0-2) unstable; urgency=low
1006
1007 * fix bug in fork_worker
1008
1009 -- Proxmox Support Team <support@proxmox.com> Tue, 11 Oct 2011 08:37:05 +0200
1010
1011 libpve-access-control (1.0-1) unstable; urgency=low
1012
1013 * allow '-' in permission paths
1014
1015 * bump version to 1.0
1016
1017 -- Proxmox Support Team <support@proxmox.com> Mon, 27 Jun 2011 13:51:48 +0200
1018
1019 libpve-access-control (0.1) unstable; urgency=low
1020
1021 * first dummy package - no functionality
1022
1023 -- Proxmox Support Team <support@proxmox.com> Thu, 09 Jul 2009 16:03:00 +0200
1024