Accepting request 390020 from home:stroeder:branches:network:ldap
update to 1.13.4 OBS-URL: https://build.opensuse.org/request/show/390020 OBS-URL: https://build.opensuse.org/package/show/network:ldap/sssd?expand=0&rev=171
This commit is contained in:
parent
9b0795bf33
commit
b75ea40b70
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:3fd8fe8e6ee9f50b33eecd1bcccfaa44791f30d4e5f3113ba91457ba5f411f85
|
||||
size 4661143
|
@ -1,7 +0,0 @@
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v1
|
||||
|
||||
iEYEABECAAYFAlZwc5IACgkQHsardTLnvCXyOgCg20lBb2owmQRYRjPZClBcn9+y
|
||||
GU4AnR/tg+KqvfA/djm5yoV4/Ys3LA2g
|
||||
=zefD
|
||||
-----END PGP SIGNATURE-----
|
3
sssd-1.13.4.tar.gz
Normal file
3
sssd-1.13.4.tar.gz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:0a7bba7697088734c5fa1844dbb6de4f1f11afd30df02f0c1dd2579114c0a194
|
||||
size 4730392
|
7
sssd-1.13.4.tar.gz.asc
Normal file
7
sssd-1.13.4.tar.gz.asc
Normal file
@ -0,0 +1,7 @@
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v1
|
||||
|
||||
iEYEABECAAYFAlcPWC0ACgkQHsardTLnvCUN0ACfUaD9ymW6zqntaFMG+xYLChRj
|
||||
3FUAoItHho7bSsdNziD98BhPQKLPAETj
|
||||
=CSMb
|
||||
-----END PGP SIGNATURE-----
|
40
sssd.changes
40
sssd.changes
@ -1,3 +1,43 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Apr 14 17:20:11 UTC 2016 - michael@stroeder.com
|
||||
|
||||
- Update to new upstream release 1.13.4
|
||||
* The IPA sudo provider was reimplemented. The new version reads the
|
||||
data from IPA's LDAP tree (as opposed to the compat tree populated by
|
||||
the slapi-nis plugin that was used previously). The benefit is that
|
||||
deployments which don't require the compat tree for other purposes,
|
||||
such as support for non-SSSD clients can disable those autogenerated
|
||||
LDAP trees to conserve resources that slapi-nis otherwise requires. There
|
||||
should be no visible changes to the end user.
|
||||
* SSSD now has the ability to renew the machine credentials (keytabs)
|
||||
when the ad provider is used. Please note that a recent version of
|
||||
the adcli (0.8 or newer) package is required for this feature to work.
|
||||
* The automatic ID mapping feature was improved so that the administrator
|
||||
is no longer required to manually set the range size in case a RID in
|
||||
the AD domain is larger than the default range size
|
||||
* A potential infinite loop in the NFS ID mapping plugin that was
|
||||
resulting in an excessive memory usage was fixed
|
||||
* Clients that are pinned to a particular AD site using the ad_site
|
||||
option no longer communicate with DCs outside that site during service
|
||||
discovery.
|
||||
* The IPA identity provider is now able to resolve external
|
||||
(typically coming from a trusted AD forest) group members during
|
||||
get-group-information requests. Please note that resolving external
|
||||
group memberships for AD users during the initgroup requests used to
|
||||
work even prior to this update. This feature is mostly useful for cases
|
||||
where an IPA client is using the compat tree to resolve AD trust users.
|
||||
* The IPA ID views feature now works correctly even for deployments
|
||||
without a trust relationship. Previously, the subdomains IPA provider
|
||||
failed to read the views data if no master domain record was created
|
||||
on the IPA server during trust establishment.
|
||||
* A race condition in the client libraries between the SSSD closing
|
||||
the socket as idle and the client application using the socket was
|
||||
fixed. This bug manifested with a Broken Pipe error message on the
|
||||
client.
|
||||
* SSSD is now able to resolve users with the same usernames in different
|
||||
OUs of an AD domain
|
||||
* The smartcard authentication now works properly with gnome-screensaver
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 10 16:38:37 UTC 2016 - mpluskal@suse.com
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user