Files
himmelblau/himmelblau.changes
David Mulder 3d193600bb - Update to version 1.2.0+git.0.6befefc:
* Version 1.2.0
  * Fix Kerberos credential cache permissions; (bsc#1247735), (CVE-2025-54882)
  * Set file owner and group before writing its content
  * Ensure alias domains match when checking Intune device id
  * Debian 12 doesn't support ConditionPathExists and notify-reload
  * Write scripts policy to a readable directory
  * Apply Intune policies right after enrollment
  * Add more debug instrumentation
  * Provide device_id to Intune enrollment if not cached
  * Ensure nss cache directory is created during install
  * Remove /var/cache/himmelblaud access from tasks daemon
  * Resolve daemon startup absolute path warnings
  * Version 1.1.0
  * Delay Intune enrollment on Device Auth fail
  * Do not leak the Intune IW service token in the logs
- Update to version 1.0.0+git.0.d01709b:
  * Fix policy application
  * Add remaining Linux password compliance policies
  * Add custom compliance enforcement
  * deps(rust): bump the all-cargo-updates group with 3 updates
  * deps(rust): bump the all-cargo-updates group with 5 updates
  * Add SLE15SP7 build target
  * Add RHEL 10 build target
  * Fix Intermittent auth issue AADSTSError 16000
  * Remove old utf8proc dependency
  * Add `fedora42` build target
  * Handle PRT expiration and tie to offline auth
  * Correctly delete the Hello keys on bad pin count
  * Add ability to disable Hello PIN per-service
  * Update NixOS support to 25.05
  * Handle disabled device by attempting re-enrollment
  * Always attempt confidential client creds for aad-tool
  * Include HSM option defs in himmelblau.conf man page
  * Update flake.nix
  * Improve the aad-tool cache-clear command
  * Add `mfaSshWorkaroundFlag` configuration option to Nix Flake.
  * Add the ability to remove confidential client creds
  * If bad PIN count is exceeded, delete the Hello key
  * deps(rust): bump the all-cargo-updates group with 4 updates
  * Add instructions for creating developer builds
  * Fix GDM3 first time login password prompt
  * Default HsmType should be soft
  * Add himmelblaud to tss group for TPM startup
  * Enforce strict order for the systemd units
  * Update libhimmelblau and compact_jwt
  * Fix builds w/tpm
  * aad-tool Authentication flow improvements
  * Filter out irrelevant debug in aad-tool
  * Create a unified login experience for aad-tool
  * Utilize confidential creds for aad-tool enumerate
  * himmelblau should get posix attributes w/out delegate user access
  * Always use the Object Id for mapping Group to GID
  * Update enhancement-request.md for SPI donations
  * Update bug_report.md with SPI donation
  * deps(rust): bump the all-cargo-updates group with 4 updates
  * Update build requires in README.md
  * Enforce strict order for the systemd units
  * Update FUNDING.yml with SPI Paypal donation button
  * Don't break from tasks loop when policies fail
  * Enroll in Intune as soon as it is enabled
  * Implement `decoupled hello` behavior
  * Cache encrypted PRT to disk for offline login SSO
  * Update to latest hsm-crypto
  * Enable tpm functionality
  * Allow altering the password and PIN prompt messages
  * Ensure Hello PIN lockout happens when online
  * Cache the build target output to improve build times
  * Easier build selection w/ Makefile
  * Revert mistaken removal from Makefile
  * Make the user wait longer with each incorrect PIN
  * Make the bad PIN count configurable
  * Improve aad-tool manpage
  * aad-tool fails if the user has FIDO2 enabled
  * Offline auth permits authentication with invalid Hello PIN
  * PIN complexity to match Windows
  * Update to latest SSSD idmap code
  * Add aad-tool options for setting posix attrs
  * Add scopes and redirect uris aad-tool application create
  * Add aad-tool commands for managaging extension attrs
  * deps(rust): bump the all-cargo-updates group with 4 updates
  * cargo clippy
  * cargo fmt
  * Utilize the sidtoname call for object id mapping
  * Add commands for listing/creating App registrations
  * Potential fix for code scanning alert no. 2: Workflow does not contain permissions
  * Potential fix for code scanning alert no. 4: Workflow does not contain permissions
  * Potential fix for code scanning alert: Workflow does not contain permissions
  * Never write the app_id to the server config
  * Disable passwordless Fido by default
  * Stop using deprecated `users` crate
  * When group membership lookup fails, use cached groups
  * deps(rust): bump the all-cargo-updates group across 1 directory with 11 updates
  * deps(rust): bump the all-cargo-updates group with 4 updates
  * aad-tool command for enumerating users and groups
  * Name-Based Group Matching in `pam_allow_groups` Leads to Potential Security Bypass
  * Add the configure-pam option to aad-tool man page
  * Add static idmap cache for on-prem to cloud migration
  * Update bug_report.md with request for himmelblau.conf
  * deps(rust): bump the all-cargo-updates group with 2 updates
  * Update crates in a group
  * Update crate bumps
  * Utilize new Intune compliance enforcement via libhimmelblau
  * Correct the README regarding Intune policy compliance
  * Disable Chromium policy
  * Re-enable Intune policy and add scripts and compliance policies
  * himmelblau.conf alias `domain` as `domains`
  * Support Fido auth in pam passwd
  * Add TAP support to himmelblaud and pam passwd
  * Mixed case names should properly identify Hello Key
  * Update linux-entra-sso to latest version
  * Fix group lookup for Entra Id group name
  * Fix mixed case name lookup from PRT cache
  * Crate updates
  * Fix tasks daemon debug output
  * Remove write locks where unecessary
  * Fix deadlock in nss
  * systemd notify fixes
  * Console
  * Address Feedback
  * Order services before gdb/nss-user-target
  * deps(rust): bump rpassword from 7.3.1 to 7.4.0
  * deps(rust): bump tokio from 1.44.2 to 1.45.0
  * deps(rust): bump sha2 from 0.10.8 to 0.10.9
  * deps(rust): bump systemd-journal-logger from 2.2.0 to 2.2.2
  * deps(rust): bump clap from 4.5.31 to 4.5.38
  * Update notify-debouncer-full
  * Update opentelemetry
  * Update dependencies
  * deps(rust): bump time from 0.3.39 to 0.3.41
  * Replace source filter that blacklists files with filter that whitelists files.
  * Mark himmelblau.conf as config in rpm
  * Update README.md
  * Ensure only the base URL is printed to log
  * If unix_user_get fails, wait, and try again
  * Supplying a PRT cookie to SSO doesn't require network
  * Don't send a password prompt if the network is down
  * Auth via MFA if Hello PIN fails 3 times
  * Improve Hello PIN failed auth error
  * Fix rocky9 build
  * deps(rust): bump anyhow from 1.0.96 to 1.0.98
  * deps(rust): bump libc from 0.2.170 to 0.2.172
  * deps(rust): bump cc from 1.2.16 to 1.2.19
  * Update README.md
  * deps(rust): bump tokio from 1.43.0 to 1.44.2
  * deps(rust): bump openssl from 0.10.71 to 0.10.72 in the cargo group
  * deps(rust): bump reqwest from 0.12.12 to 0.12.15
  * Update libhimmelblau in Cargo.lock
  * Fix nss and offline checks for domain aliases
  * Report error when MS Authenticator denies authorization
  * Bail out of invalid offline auth
  * Handle AADSTS errors from BeginAuth response
  * Never dump failed reqwests to the log
  * Update sccache-action version to use new cache service
  * Permit daemon to start when network is down
  * Add an nss cache for when daemon is down
  * Additional pam info cues
  * Proceed with Hello auth even with net down
  * Indicate to the user what the password and PIN are
  * Ensure pam messages are seen
  * Display the minimum PIN length during Hello setup
  * PAM should loop, not die on error
  * Ensure prompt msg remains for confirmation
  * Update bug_report.md
  * Ignore demands for setting up MS Authenticator
  * Login fails if Entra is configured to recommend MS authenticator
  * Add pam configure command to aad-tool
  * Update README.md with pam passwd instructions
  * aad-tool authtest needs to map names
  * Update demo video in README.md
  * Sign RPM packages
  * Ensure the pam module is installed correctly for SLE
  * Improve pam error handling and messaging
  * Only push cachix builds for stable releases
  * Terminate linux-entra-sso when browser terminates
  * On deb, push pam config after install
  * Increase priority of deb PAM passwd for Himmelblau
  * Improve offline state handling
  * Specify request for Entra Id password in PAM
  * QR Greeter also supports gnome-shell 47
  * Fix profile photo loading
  * Clarify pam_allow_groups in himmelblau.conf man page
  * Don't hide debug for pam_allow_groups miss
  * Handle failures in passwordless auth
  * build all root packages
  * split config options that can be defined per-domain from those which are global only
  * configure cachix signing and upload in ci
  * deps(rust): bump serde_json from 1.0.138 to 1.0.140
  * deps(rust): bump serde from 1.0.218 to 1.0.219
  * deps(rust): bump time from 0.3.37 to 0.3.39
  * deps(rust): bump bytes from 1.10.0 to 1.10.1
  * deps(rust): bump pkg-config from 0.3.31 to 0.3.32
  * Entra Id is case insensitive, cache lookup must match
  * deps(rust): bump ring from 0.17.9 to 0.17.13 in the cargo group
  * Support CompanionAppsNotification mfa method
  * QR code for gnome-shell greeter
  * Allow tasks to start if AccountsService dir missing
  * Remove invalid python dependency from sso package
  * Fixes https://github.com/himmelblau-idm/himmelblau/issues/397
  * Clear server config when clearing cache
  * Update version in the Cargo.lock
  * deps(rust): bump async-trait from 0.1.86 to 0.1.87
  * deps(rust): bump chrono from 0.4.39 to 0.4.40
  * Fix himmelblau.conf man page cn_name_mapping entry
  * deps(rust): bump pem from 3.0.4 to 3.0.5
  * deps(rust): bump serde from 1.0.217 to 1.0.218
  * Version 1.0.0
  * deps(rust): bump cc from 1.2.15 to 1.2.16
  * Update workflow versions
- Update to version 0.9.21+git.0.6963ee0:
  * Fix authentication when passkeys are enabled
  * Version 0.9.20
  * Fix Intermittent auth issue AADSTSError 16000
  * Version 0.9.19
  * Disable cookies
  * Version 0.9.18
  * Cache the build target output to improve build times
  * Easier build selection w/ Makefile
  * Never write the app_id to the server config
- Update to version 0.9.17+git.0.4a97692:
  * Version 0.9.17
  * Offline auth permits authentication with invalid Hello PIN; (CVE-2025-53013).
  * Cargo fmt
  * Don't neglect to sign the rpm packages
- Update to version 0.9.16+git.0.aac2205:
  * Disable passwordless Fido by default
  * Stop using deprecated `users` crate
  * Version 0.9.16
  * When group membership lookup fails, use cached groups
  * Just report whether some passwordless type is available
  * Version 0.9.15
  * Name-Based Group Matching in `pam_allow_groups` Leads to Potential Security Bypass
  * Version 0.9.14
  * Support Fido auth in pam passwd
  * Add TAP support to himmelblaud and pam passwd
  * Mixed case names should properly identify Hello Key
  * Remove write locks where unecessary
  * Fix group lookup for Entra Id group name
  * Version 0.9.13
  * Fix mixed case name lookup from PRT cache
- Update to version 0.9.12+git.0.99b5ca6:
  * Version 0.9.12
  * Fix deadlock in nss
  * systemd notify fixes
- Update to version 0.9.11+git.0.04ef9c8:
  * Ensure only the base URL is printed to log
  * Version 0.9.11
  * Supplying a PRT cookie to SSO doesn't require network
  * Improve Hello PIN failed auth error
  * Fix rocky9 build
  * Fix nss and offline checks for domain aliases
  * Report error when MS Authenticator denies authorization
  * Bail out of invalid offline auth
  * Handle AADSTS errors from BeginAuth response
  * Never dump failed reqwests to the log
  * Update sccache-action version to use new cache service
  * Permit daemon to start when network is down
  * Version 0.9.10
  * Add an nss cache for when daemon is down
  * Additional pam info cues
  * Proceed with Hello auth even with net down
  * Indicate to the user what the password and PIN are
  * Specify request for Entra Id password in PAM
  * Ensure pam messages are seen
  * Display the minimum PIN length during Hello setup
  * PAM should loop, not die on error
  * Ensure prompt msg remains for confirmation
- Update to version 0.9.9+git.0.5425b98:
  * Version 0.9.9
  * Ignore demands for setting up MS Authenticator
- Update to version 0.9.8+git.0.3f20b1b:
  * configure cachix signing and upload in ci
  * Version 0.9.8
  * Improve pam error handling and messaging
  * Version 0.9.7
  * Terminate linux-entra-sso when browser terminates
  * On deb, push pam config after install
  * Increase priority of deb PAM passwd for Himmelblau
  * Improve offline state handling
  * QR Greeter also supports gnome-shell 47
  * Version 0.9.6
  * Fix profile photo loading
  * Clarify pam_allow_groups in himmelblau.conf man page
  * Don't hide debug for pam_allow_groups miss
  * Version 0.9.5
  * Handle failures in passwordless auth
- Update to version 0.9.4+git.0.9909238:
  * Version 0.9.4
  * bump ring from 0.17.9 to 0.17.13
  * Entra Id is case insensitive, cache lookup must match
  * Support CompanionAppsNotification mfa method
  * Version 0.9.2
  * QR code for gnome-shell greeter
  * Allow tasks to start if AccountsService dir missing
  * Remove invalid python dependency from sso package
  * Version 0.9.1
  * himmelblaud-tasks stops due to missing dir
  * Clear server config when clearing cache
  * Fix himmelblau.conf man page cn_name_mapping entry
  * Update workflow versions
  * Document the requirements for app_id
  * Properly handle aad error from auth code req
  * Provide a group gid fallback for rfc2307 id map
  * Remove option defs from the default debian himmelblau.conf
  * Ensure tasks daemon creates files w/ correct gid
  * Isolate the name mapping so it only happens if enabled
  * Default to request group info via Edge browser
  * Avoid modifying the cache entries
  * Utilize systemd notify to avoid tasks started fail
  * Ubuntu PAM module configuration to change PIN
  * Resolve migration error `real_gidnumber` missing
  * deps(rust): bump libc from 0.2.169 to 0.2.170
  * deps(rust): bump clap_complete from 4.5.45 to 4.5.46
  * Fix some clippy warnings
  * Cause tasks daemon to honor configured debug
  * Fetch user profile photo via tasks daemon
  * deps(rust): bump clap from 4.5.30 to 4.5.31
  * deps(rust): bump anyhow from 1.0.95 to 1.0.96
  * deps(rust): bump cc from 1.2.14 to 1.2.15
  * Add apparmor whitelisting for nss mapping cache
  * Dramatically improve debug logging
  * Move the NixOS CI to a different workflow (w/out main)
  * Add a sample himmelblau.conf in docs
  * Resolve missed auth code redirect
  * Implement mapped name caching in NSS
  * Add script on-behalf-of flow for logon scripts
  * Update Cargo.lock deps
  * Update installation instructions in the README
  * Donation requests in the issue templates
  * Update README.md with contribute badge
  * Update README.md with contributions statement
  * Create FUNDING.yml
  * Update README.md
  * fix failing test expecting /bin/echo to be available
  * add nixos ci tests
  * Use sd_notify to signal service readiness, prevent startup failures
  * Add build command to Makefile
  * Update documentation
  * Add NixOS Module
  * enable build with nix
  * Implement logon name script mapping
  * deps(rust): update libnss requirement from 0.8.0 to 0.9.0
  * Only the himmelblau-sso package should conflict with intune-portal
  * deps(rust): update gethostname requirement from 0.5.0 to 1.0.0
  * deps(rust): update lru requirement from ^0.12.3 to ^0.13.0
  * deps(rust): update rand requirement from ^0.8.5 to ^0.9.0
  * Fetch the group extension attrs with the group object
  * Ensure access token has the GroupMember.Read.All scope
  * Replace the unix attribute option with a rfc2307 idmap
  * Map the extended attr gidNumber to primary group
  * Permit configuration of an Application for group fetching
  * Use posix attributes synchronized from on-prem AD
  * Fix debug option in himmelblau.conf
  * Add a span around server initialisation for correct log coalescing
  * Fix GOA crash when krb5.conf doesn't include /etc/krb5.conf.d
  * Fix libutf8proc dependency issue on Ubuntu 22.04
  * Fix Credentials leaking in the debug log
  * deps(rust): update rusqlite requirement from ^0.32.0 to ^0.33.0 (#345)
  * Decrease CI build time
  * Fix CI failure caused by package revision
  * Support password changes when demanded
  * Update README.md
  * Entra Id no longer permits SFA enrollment
  * Rewrite the sso code in Rust
  * Add profile photo fetching
  * Version 0.9.0
- Update to version 0.8.3+git.5.1510f5a:
  * Decrease CI build time
  * Fix CI failure caused by package revision
  * Version 0.8.4
  * Fix libutf8proc dependency issue on Ubuntu 22.04
  * Version 0.8.3
  * Fix Credentials leaking in the debug log
- Update to version 0.8.2+git.0.553c632:
  * Version 0.8.2
  * Entra Id no longer permits SFA enrollment
  * Remove SSO python dependencies
  * Version 0.8.1
  * Rewrite the sso code in Rust
- Update to version 0.8.0+git.0.249ba5f:
  * Branch version stable-0.8.x
  * Passwordless auth doesn't provide polling numbers
  * Resolve deadlock introduced by Fido auth
  * Implement NGC Passwordless authentication
  * Remove unused commit checklist
  * deps(rust): update bindgen requirement from 0.70.1 to 0.71.1
  * Update libhimmelblau version
  * Custom domains matching
  * Fix IdmapError to indicate the failure
  * Fix Fedora build dependencies
  * Add Fido MFA
  * Add Debian 12 packaging
  * Disable SELinux labeling on build container volume mounts
  * Update github CI dependencies
  * Implement Hello Pin changes via PAM
  * Formatting fix
  * Utilize HimmelblauConfig directly in pam and nss
  * Add config parsing unit tests
  * Fix incorrect default domain
  * Fix config hsm type Tpm error
  * Include multi-domain important info in himmelblau.conf man
  * Update to the latest libhimmelblau
  * Add DAG flow as a fallback for MFA
  * Fix CVE-2024-11738: rustls network-reachable panic in `Acceptor::accept`
  * Update README.md with build requires
  * Enable module for utf8proc-devel in Rocky8
  * Remove the org.samba.himmelblau dbus service
  * Fix missing dependency utf8proc_NFKC_Casefold
  * The tasks daemon needs /etc/groups write access
  * Revert "Fix Ubuntu PAM fallback to password prompt"
  * Fix Ubuntu PAM fallback to password prompt
  * Increase the cache timeout to 5 minutes
  * Always fetch and cache the graph url
  * Package Siemens Linux Entra SSO for Himmelblau
  * Add Kerberos CCache support
  * Update the tasks daemon man page
  * Add a himmelblau.conf man page, and package the man pages
  * Add SLE15SP6 packaging
  * Add Fedora 41 packaging
  * Add Fedora Rawhide packaging
  * Provide enhancement request template
  * Create an issue template
  * Hello support depends on openssl3
  * Fix sshd rpm depends
  * Resolve RPM dependencies automatically
  * Revert "deps(rust): update notify-debouncer-full requirement from 0.3 to 0.4"
  * Add openSUSE Tumbleweed packaging
  * Fix RPM packaging placement of systemd files
  * Remove the failed attempt at debian packaging
  * Add stable-0.7.x to CI workflows
  * Version 0.8.0
- Update to version 0.7.13+git.0.d790d31:
  * Version 0.7.13
  * Fix Fedora build dependencies
  * Version 0.7.12
  * Add Debian 12 packaging
  * Update github CI dependencies
  * Version 0.7.11
  * Implement Hello Pin changes via PAM
  * Utilize HimmelblauConfig directly in pam and nss
  * Version 0.7.10
  * Add config parsing unit tests
  * Fix incorrect default domain
  * Fix config hsm type Tpm error
  * Include multi-domain important info in himmelblau.conf man
- Update to version 0.7.9+git.0.93655d2:
  * Version 0.7.9
  * Update to the latest libhimmelblau
  * Version 0.7.8
  * Add a himmelblau.conf man page, and package the man pages
  * Add DAG flow as a fallback for MFA
- Update to version 0.7.7+git.0.b48d0bb:
  * Version 0.7.7
  * Fix CVE-2024-11738: rustls network-reachable panic in `Acceptor::accept`
    (bsc#1233949).
  * Version 0.7.6
  * Enable module for utf8proc-devel in Rocky8
- Update to version 0.7.5+git.0.8f421b0:
  * Version 0.7.5
  * Remove the org.samba.himmelblau dbus service
- Update to version 0.7.4+git.0.d1291c6:
  * Version 0.7.4
  * Fix missing dependency utf8proc_NFKC_Casefold
  * Package Siemens Linux Entra SSO for Himmelblau
  * Add SLE15SP6 packaging
  * Add Fedora 41 packaging
  * Add Fedora Rawhide packaging
  * The tasks daemon needs /etc/groups write access
  * Version 0.7.3
  * Increase the cache timeout to 5 minutes
  * Always fetch and cache the graph url
- Update to version 0.7.2+git.0.c76ac0e:
  * Version 0.7.2
  * Hello support depends on openssl3
  * Version 0.7.1
  * Fix sshd rpm depends
  * Resolve RPM dependencies automatically
  * Revert "deps(rust): update notify-debouncer-full requirement from 0.3 to 0.4"
  * Add openSUSE Tumbleweed packaging
  * Fix RPM packaging placement of systemd files
  * Remove the failed attempt at debian packaging
  * Add stable-0.7.x to CI workflows
  * deps(rust): update utoipa requirement from 4.0.0 to 4.2.0
  * deps(rust): update hashbrown requirement from 0.14.0 to 0.15.1
  * Remove missing feature causing warnings
  * deps(rust): update notify-debouncer-full requirement from 0.3 to 0.4
  * Specify scopes when making an SSO request
  * Implement logon script for ensuring compliance
  * Option for adding Entra Id users to local groups
  * Configure EL sshd with ChallengeResponseAuthentication yes
  * Add rocky 8 packaging
  * Add RPM packaging for EL9
  * Modify Ubuntu defaults to fix snaps
  * Resolve Libreoffice fails to start on Ubuntu
  * Minor formatting fix
  * Revert RwLock -> Arc<Mutex> change in idmap
  * Ignore broker scopes requests for now
  * Ensure every file specifies the proper license
  * postinst should not fail on patch or apparmor update
  * Install pam module to additional location via make
  * Add sshd config to the Makefile
  * Don't use sudo in postinst/postrm scripts for deb
  * PAM should be placed first in the stack
  * Add the libutf8proc-dev dep for deb
  * Match the object ID of the fake user and group
  * Make it possible to stop the broker service
  * Move sshd config into it's own debian package
  * Allow the graph to start w/out network
  * Add hello_pin_min_length conf option
  * Don't attempt SFA fallback if AADSTSError
  * Have libhimmelblau handle the DAG fallback
  * Add a warning to user that SSH needs restarted
  * Ensure local users are ignored when CN mapping
  * Ensure DAG is rejected if lifetime expires
  * Rework the poll logic to resolve timeout issues
  * Add a sshd soft depends for the deb package
  * CN name mapping in PAM and NSS
  * Make CN an optional home directory attribute
  * Remove the sssd build dependencies
  * Configuration patches for himmelblau on Debian
  * Simplify PAM get_item_string calls
  * Bug in pam which needs defended against
  * Fix deb build by adding Broker service file
  * Install Ubuntu unix-chkpwd apparmor deps
  * Ensure make install places pam_himmelblau correctly
  * Add Ubuntu pam-config for pam_himmelblau
  * Never return Err(PAM_SUCCESS) from get_user
  * Never return the Pam result from get_user()
  * Revert "Speed up nss requests w/out auth attempt"
  * Speed up nss requests w/out auth attempt
  * Fix some broker responses
  * Fixes for the dbus broker
  * Attempt to fix the cargo version in launchpad build
  * Makefile typo fixes
  * Version 0.7.0
  * Add libdbus-1-dev dep
  * Improve the README installation instructions
  * Add `make install` command
  * Improve Debian/Ubuntu install instructions
  * Fix tag push permissions for tag-version workflow
  * Add a version check script
  * Remove the rustc dependency, breaking rustup
  * Add a debug option to the config
  * DBus requires that the service file match the name
  * Add a pam option for the OpenSSH 2876 workaround
  * Update to the latest libhimmelblau
- Update to version 0.6.14+git.0.bbda0b6:
  * Version 0.6.14
  * postinst should not fail on patch or apparmor update
  * Version 0.6.13
  * Don't use sudo in postinst/postrm scripts for deb
  * Version 0.6.12
  * PAM should be placed first in the stack
  * Match the object ID of the fake user and group
  * Version 0.6.11
  * Move sshd config into it's own debian package
  * Version 0.6.10
  * Allow the graph to start w/out network
  * Add hello_pin_min_length conf option
  * Version 0.6.9
  * Don't attempt SFA fallback if AADSTSError
  * Have libhimmelblau handle the DAG fallback
  * Add a warning to user that SSH needs restarted
  * Version 0.6.8
  * Ensure local users are ignored when CN mapping
  * Ensure DAG is rejected if lifetime expires
  * Version 0.6.7
  * Rework the poll logic to resolve timeout issues
  * Version 0.6.6
  * Add a sshd soft depends for the deb package
  * CN name mapping in PAM and NSS
  * Version 0.6.5
  * Make CN an optional home directory attribute
  * Version 0.6.4
  * Add Ubuntu pam-config for pam_himmelblau
  * Configuration patches for himmelblau on Debian
  * Version 0.6.3
  * Bug in pam which needs defended against
  * Version 0.6.2
  * Never return the Pam result from get_user()
  * Correct installation directory of the deb pam module
  * Makefile typo fixes
  * Add libdbus-1-dev dep
  * Version 0.6.1
  * Debian build requires libdbus-1-dev
- Update to version 0.6.0+git.0.b8dae18:
  * Attempt to fix the cargo version in launchpad build
  * Add branch stable-0.6.x to the workflows
  * Install the pam module to the proper location
  * Update README.md
  * Add a debug option to the config
  * Add a pam option for the OpenSSH 2876 workaround
  * Update to the latest libhimmelblau
  * Authorize all users when pam_allow_groups is empty
  * Fix clippy warnings
  * Fix pam echo not displayed via ssh
  * Fix pam failure to register Pin following mfa poll
  * Fork from kanidm
  * Version 0.6.0
  * Add cargo deb build
  * Version 0.5.3
  * Improve the README installation instructions
  * Add `make install` command
  * Improve Debian/Ubuntu install instructions
  * Fix tag push permissions for tag-version workflow
  * Version 0.5.2
  * Add a version check script
  * Version 0.5.1
  * Remove the rustc dependency, breaking rustup
  * Added Debian packaging workflow and files
- explicitly depend on cargo to pull in latest compiler revision
- Update to version 0.5.0+git.0.22f84f0:
  * Update workflows for 0.5.x
  * Update Debian dependencies in README.md
  * Compilation fails on Ubuntu, missing ldb header
  * Fix base32 with kandim updates
  * deps(rust): update base32 requirement from ^0.4.0 to ^0.5.0
  * deps(rust): update scim_proto requirement from ^0.2.1 to ^1.3.2
  * deps(rust): update bindgen requirement from 0.69.4 to 0.70.1
  * Fix CI failures caused by cargo 1.80.1
  * Update to libhimmelblau version 0.2.9
  * deps(rust): update rusqlite requirement from ^0.31.0 to ^0.32.0
  * deps(rust): update tonic requirement from 0.11.0 to 0.12.0
  * update libnss requirement from 0.7.0 to 0.8.0
  * Switch to using libhimmelblau
  * himmelblaud stops working after suspend
  * Update required packages for tumbleweed
  * Disable the SFA fallback by default
  * Fix ConsolidatedTelephony MFA method
  * Use the group ID for the name if no display name
  * Use latest msal with MFA fixes
  * PhoneAppNotification is not a cred request algorithm
  * The polling_interval is in milliseconds, not seconds
  * OneWaySMS is additionally a valid OTP
  * Relicensing as GPL3, as SSSD source inclusion requires
  * Utilize the graph code in msal
  * config: Remove comments about experimental policy enforement
  * Remove the experimental policy code from the id provider
  * Fix a refresh token leak in debug from msal
  * Correct README details
  * Always normalize idmap upn inputs
  * Add video links to the README
  * Minor updates to the Contributing section
  * Add a Installation section to the README
  * Add the new SSSD idmap build deps to the README
  * Add a section about donations
  * Include the Samba Technical matrix channel
  * Add github workflows for the 0.4.x branch
  * Version 0.5.0 bump for main
- Update to version 0.4.3+git.2.6379abc:
  * Specifically use msal 0.2.6
  * Version 0.4.3
  * update libnss requirement from 0.7.0 to 0.8.0
  * himmelblaud stops working after suspend
  * Version 0.4.2
  * Fix ConsolidatedTelephony MFA method
- Update to version 0.4.1+git.0.41dd0dc:
  * Version 0.4.1
  * Use latest msal with MFA fixes
  * PhoneAppNotification is not a cred request algorithm
  * The polling_interval is in milliseconds, not seconds
  * OneWaySMS is additionally a valid OTP
  * Relicensing as GPL3, as SSSD source inclusion requires
- Update to version 0.4.0+git.4.63e3704:
  * Fix a refresh token leak in debug from msal
- Update to version 0.4.0+git.2.7b57f5e:
  * Always normalize idmap upn inputs
- Update to version 0.4.0+git.0.69b64fe:
  * Add github workflows for the 0.4.x branch
  * Do not append to pam_allow_groups automatically
  * Pam Allow Groups must be specified by Object ID
  * Request the correct resource and permissions
  * Improve error output on group lookup failure
  * When faking a uuid for NSS, use a random uuid
  * Fix clippy warning about inefficient use of clone()
  * Remove the initial uid hack, use name mapping
  * Don't stop an MR based on a clippy warning
  * Update Kanidm tracking
  * Modify CI workflows to handle idmap build
  * Add CI job for cargo test
  * Test the new and legacy idmapping
  * Ensure duplicate providers are not started
  * Use the SSSD Idmap code in Himmelblau
  * Specify in conf that pam_allow_groups is required
  * Remove code duplication in Hello PIN auth
  * Fix Device authentication failed after enrollment
  * Update the base64urlsafedata version
  * Update README.md with Matrix contact info
  * Version 0.4.0
- Update to version 0.3.4+git.0.01d099f:
  * Version 0.3.4
  * Only remove cached user if it doesn't exist
  * Use existing user token at refresh
  * Always use the spn of the user for nss requests
  * Generate a fake user token to please SSH
  * Fix aad-tool to handle MFA
  * Fix lib_crypto version
  * Fix user dropping from NSS
- Himmelblau requires libopenssl-3 for PRT messages.
- Update to version 0.3.3+git.0.c2197d7:
  * Correct the debug messages for Hello skip
  * Version 0.3.3
  * Allow disabling Hello PIN auth for enrolled users
  * Add an option for disabling Windows Hello
  * Remove the TODO doc from stable branch
  * config: Remove comments about experimental policy enforement
- Update to version 0.3.2+git.0.de9f5b5:
  * Version 0.3.2
  * Fix Hello PIN Authentication error, no nonce
- Update to version 0.3.1+git.0.359a8d0:
  * Add github workflows for the 0.3.x branch
  * Fallback to SFA first if MFA fails Browse files
  * deps(rust): update libnss requirement from 0.6.0 to 0.7.0
  * deps(rust): update webauthn-rs-proto requirement from 0.4.8 to 0.5.0
  * Fix deadlock caused by client write lock
  * Add rid idmapping (replacing existing idmap)
  * Additional debug for Hello auth
  * Make proto Cargo.toml a physical file
  * Push the clippy arg count limit a little higher
  * Version 0.3.0
  * Windows Hello PIN implementation
  * deps(rust): update hostname requirement from ^0.3.1 to ^0.4.0
  * Enable actions on stable branches
  * Prevent dependabot from updating opentelemetry
  * Revert "deps(rust): update opentelemetry requirement from 0.20.0 to 0.22.0 (#93)"
  * deps(rust): update reqwest requirement from ^0.11.18 to ^0.12.2 (#95)
  * deps(rust): update lru requirement from ^0.8.0 to ^0.12.3 (#94)
  * deps(rust): update opentelemetry requirement from 0.20.0 to 0.22.0 (#93)
  * deps(rust): update num_enum requirement from ^0.5.11 to ^0.7.2 (#92)
  * deps(rust): update tonic requirement from 0.10.2 to 0.11.0 (#91)
  * Use the Kanidm MFA patches
  * deps(rust): update libnss requirement from 0.5.0 to 0.6.0 (#90)
  * deps(rust): update tracing-opentelemetry requirement (#89)
  * deps(rust): update rusqlite requirement from ^0.28.0 to ^0.31.0 (#88)
  * deps(rust): update clap requirement from ^3.2 to ^4.5 (#87)
  * deps(rust): update kanidm-hsm-crypto requirement from ^0.1.6 to ^0.2.0 (#86)
  * Update dependabot.yml
  * Add missing db dependency on sketching
  * Set the workspace resolver version to 2
  * Init the kanidm submodule during workflows
  * Ignore clippy blocks_in_conditions warning in daemon
  * Add build/clippy/dependabot_automerge workflows
  * deps(rust): update opentelemetry-otlp requirement from 0.13.0 to 0.15.0
  * deps(rust): update opentelemetry_sdk requirement from 0.20.0 to 0.22.1
  * deps(rust): update base64 requirement from ^0.21.5 to ^0.22.0
  * deps(rust): update notify-debouncer-full requirement from 0.1 to 0.3
  * deps(rust): update systemd-journal-logger requirement
  * Create dependabot.yml
  * Add MFA capabilities
  * Update to the latest Kanidm reqs
  * Always force MFA when enrolling the device
  * Update to latest msal
- Himmelblau provides the features found in aad-auth packages from
  other distros.
- Update to version 0.2.0+git.4.904b915:
  * Update to latest msal
  * Version 0.2.0
  * Himmelblau now authenticates only to configured domains
  * Remove reference to python-msal dep in README
  * Use the external MSAL crate for auth
  * Rename msal in prep for external msal crate
  * msal: Remove python msal bindings
  * msal: Rust msal
  * Point Cargo.toml to new project home
  * config: Write domain join to server specific config
  * idprovider: Invalidate cached user if PRT req fails
  * idprovider: Pass the keystore to the auth function
  * Update daemon from kanidm
  * test: Add a pause to ensure tasks daemon sees himmelblau
  * Update kanidm submodule
  * config: Include domain sections in configured domains
  * msal: Add acquire_token_by_refresh_token
  * enrollment: Authentication fixes
  * tests: Create the hsm-pin directory
  * idprovider: Add domain join debug
  * cargo: Use relative paths and remove most symlinks
  * idprovider: Allow group search when device is authenticated
  * msal: Move the application reqs from misc to msal::application
  * msal: Move user reqs from misc to msal::user
  * Remove duplicates from allow_groups during enrollment
  * Remove device enrollment from TODO
  * Implement Device enrollment
  * enrollment: Add the nonce service request
  * enrollment: Add enrollment service discovery
  * Implement ConfidentialClientApplication for enrollment
  * daemon: Fix inverted logic on cache dir check
  * nss: Use upstream nss package
  * idprovider: Provider auth needs to point to just the host
  * config: Consistently use the config file provided to the daemon
  * cargo: Use relative paths and remove most symlinks
  * clippy: Add kanidm's clippy config
  * config: Only check for tenant_id, authority, graph if necessary
  * Update README.md
  * Update version to 0.1.2
  * config: Fix typos in the config file
  * Make most params to acquire_token_interactive optional
  * Config can take defaults
  * cli: Add missing cli opt file
  * cli: Improve aad-tool options and interface
  * Update README.md
  * tests: Fix tasks daemon name typo
  * Remove MFA from TODO
- Update to version 0.1.1+git.10.4aa76b7:
  * daemon: Fix inverted logic on cache dir check
  * nss: Use upstream nss package
  * idprovider: Provider auth needs to point to just the host
  * config: Consistently use the config file provided to the daemon
  * cargo: Use relative paths and remove most symlinks
  * clippy: Add kanidm's clippy config
  * config: Only check for tenant_id, authority, graph if necessary
  * Correct the cargo version
- Update to version 0.1.1+git.0.6d2f645:
  * config: Remove comments about experimental policy enforement
  * config: Fix typos in the config file
- Reduce size of expanded scriptlets by reducing %service_* calls
- Wrap descriptions
- Update to version 0.1.0+git.2.2391ac0:
  * Update version to 0.1.0
  * Update the README
  * idprovider: Fix mixed case auth failure
  * daemon: Port daemon changes from kanidm
  * provider: Skip provider init on silent auth and offline
  * daemon: Run himmelblaud as non-root dynamic user
- Update to version 0.0.4+git.50.112df77:
  * Always match DAG where present
  * Prohibit authentication with changing IDs
- Update to version 0.0.4+git.42.d641c8b:
  * Run cargo fmt and cargo clippy
  * Implement DeviceAuthorizationGrant for MFA
  * test: Initialize the pam_allow_groups with users
  * Use new pam state machine in himmelblau
  * Remove the non-functional device enrollment
  * TODO: New details regarding MS auth cache
  * daemon: Implement pam allow groups
  * Code rearrangement
- Update to version 0.0.4+git.30.26c26e7:
  * aad-tool: Disable enrollment by default
  * provider: Fetch GECOS from old token on silent acquire
  * msal: Add bindings for device auth flow
  * Add debug for local user ignore
  * provider: Only retry auth if we're sure group read was requested
  * provider: Provide user token refresh
  * provider: Cause unix_group_get to respond with BadRequest
  * provider: Implement provider_authenticate
- Update to version 0.0.4+git.9.a7c5ac2:
  * osc breaks with workspace errors using symlinks
  * gp: Disable MDM policies by default
- Update to version 0.0.4+git.3.b500f1f:
  * Update serde version
  * Update version to 0.0.4
  * Only build necessary bits of kanidm proto
  * Add cache operations to daemon and aad-tool
  * tests: Include local cache of rust deps
  * cache: Use the kanidm cache backend
- Update to version 0.0.3+git.10.761b4d2:
  * gp: Apply chromium policies
  * gp: Implement Group Policy object listing
  * test: Fix build test failure
  * tests: Return the correct error code from tests
  * test: Separate project build from docker build
  * tests: Deploy config when testing
- Update to version 0.0.3+git.3.f0883b1:
  * nss: Fix misaligned pointer dereference errors
  * Fix code links
- Update to version 0.0.3+git.1.e6847eb:
  * Revert "nss: Use kanidm nss code"
  * Update lib versions to match package version
  * Shallow clone kanidm for pam/nss
  * tests: Fix tar recursion
- Update to version 0.0.2+git.22.1c3ce4b:
  * Remove symlinks and just point to kanidm sources
  * nss: Use kanidm nss code
  * Add submodule commands to main Makefile
  * pam: Use kanidm pam code, glue into himmelblau
  * TODO: Only auth to configured domains
- Update to version 0.0.2+git.15.d42b114:
  * aad-tool: Enroll via the daemon
  * config: Add func for requesting configured socket path
  * aad-tool: Improve enroll options
- Update to version 0.0.2+git.11.91df240:
  * daemon: Add a systemd service
  * daemon: Don't request group read scope if using Intune
  * TODO: Mention the work needed for the cache
  * README: Include homedir creation instructions
  * daemon: If auth fails, indicate the user
- Update to version 0.0.2+git.6.de1afd6:
  * test: Ensure invalid users aren't cached
  * test: Skip getent group tests failing due to nss issue
  * tests: Add nss tests
  * tests: Test pam auth
  * msal: Allow fetching auth url
- Update to version 0.0.2+git.0.5bfbedd:
  * cache: Make the cache persistent
  * TODO: Cannot fudge an initial nss request
  * Use tracing for debug instead of log
  * aad-tool: Fix some build warnings
  * aad-tool: Add TODO comments regarding enrollment issues
  * aad-tool: Always use interactive enrollment
  * fix readme
  * aad-tool: Save the device_id after enrollment
  * aad-tool: Cannot enroll in Intune Portal directly
  * aad-tool: Parse the enrollment response
  * aad-tool: Add a enroll command for Azure AD device
  * memcache: Only append existing group member if missing
  * himmelblaud: Fix login when Intune errors on group read
  * memcache: Create a memcache for user and group caching
  * TODO: Group memberships
  * TODO: NSS requests via GET reqs
  * config: Include default for authority_host
  * config: Specify constants for defaults
  * Cleanup the build depencencies
  * TODO: Fix the headings
  * TODO: Add major reqs section
  * Cause the odc provider to supply the authority_host
  * TODO: Use tracing module
  * Include offline logon in todo list
  * Add a TODO list
  * Discover the tenant_id in the same manner as Intune
  * himmelblaud: Debug for unknown user/group
  * himmelblaud: Fix failure to cache user
  * himmelblaud: Pam Allowed and Sessions stubs
  * himmelblaud: Implement NssGroupByGid and NssAccountByUid
  * himmelblaud: Implement group lookups
  * Include the gecos in the mem cache
  * Use config for shell, homedir, uid range, tenant
  * Improve Developer Readme
  * config: Config should not default app_id
  * Remove invalid comment
  * himmelblaud: Return with failure without tenant_id
  * config: Move the config to unix_common module
  * himmelblaud: Make the socket path configurable
  * himmelblaud: Use Intune portal when app_id unset
- Update to version 0.0.1+git.15.f9a024e:
  * Generate unix uid/gid
  * himmelblaud: Stubs for NssGroupByName and NssGroups
  * himmelblaud: Fix auth failure error message
  * himmelblaud: Open socket with permissions for users to read/write
  * msal: Fix nssaccountbyname lookup
  * himmelblaud: Improve logging
  * Include systemd journal logging
  * msal: Fix failure parsing user token dict
  * Implement simple NssAccountByName
  * Implement basic NssAccounts request
  * pam: Fix unused variable warning
  * himmelblaud: Rewrite the daemon in Rust
  * msal: Add a simple rust binding to python msal
  * Remove the python daemon in favor of Rust
- Update to version 0.0.1+git.0.56eb9f0:
  * himmelblaud: Implement nss lookups in the daemon
  * himmelblaud: Allow anyone to r/w the socket
  * himmelblaud: Implement simple nss getpwent name
  * pam: Remove account allowed and being session impl
  * unix_common: UID and GID need not match
  * himmelblaud: Improve the debug output
  * himmelblaud: Remove stdout debug since logging to journald
  * himmelblaud: Log to the systemd journal
  * nss: Add the nss module
  * Improve directory structure

OBS-URL: https://build.opensuse.org/package/show/network:idm/himmelblau?expand=0&rev=70
2025-08-07 15:57:55 +00:00

1175 lines
48 KiB
Plaintext

-------------------------------------------------------------------
Thu Aug 07 14:29:19 UTC 2025 - david.mulder@suse.com
- Update to version 1.2.0+git.0.6befefc:
* Version 1.2.0
* Fix Kerberos credential cache permissions; (bsc#1247735), (CVE-2025-54882)
* Set file owner and group before writing its content
* Ensure alias domains match when checking Intune device id
* Debian 12 doesn't support ConditionPathExists and notify-reload
* Write scripts policy to a readable directory
* Apply Intune policies right after enrollment
* Add more debug instrumentation
* Provide device_id to Intune enrollment if not cached
* Ensure nss cache directory is created during install
* Remove /var/cache/himmelblaud access from tasks daemon
* Resolve daemon startup absolute path warnings
* Version 1.1.0
* Delay Intune enrollment on Device Auth fail
* Do not leak the Intune IW service token in the logs
-------------------------------------------------------------------
Wed Jul 30 20:32:04 UTC 2025 - david.mulder@suse.com
- Update to version 1.0.0+git.0.d01709b:
* Fix policy application
* Add remaining Linux password compliance policies
* Add custom compliance enforcement
* deps(rust): bump the all-cargo-updates group with 3 updates
* deps(rust): bump the all-cargo-updates group with 5 updates
* Add SLE15SP7 build target
* Add RHEL 10 build target
* Fix Intermittent auth issue AADSTSError 16000
* Remove old utf8proc dependency
* Add `fedora42` build target
* Handle PRT expiration and tie to offline auth
* Correctly delete the Hello keys on bad pin count
* Add ability to disable Hello PIN per-service
* Update NixOS support to 25.05
* Handle disabled device by attempting re-enrollment
* Always attempt confidential client creds for aad-tool
* Include HSM option defs in himmelblau.conf man page
* Update flake.nix
* Improve the aad-tool cache-clear command
* Add `mfaSshWorkaroundFlag` configuration option to Nix Flake.
* Add the ability to remove confidential client creds
* If bad PIN count is exceeded, delete the Hello key
* deps(rust): bump the all-cargo-updates group with 4 updates
* Add instructions for creating developer builds
* Fix GDM3 first time login password prompt
* Default HsmType should be soft
* Add himmelblaud to tss group for TPM startup
* Enforce strict order for the systemd units
* Update libhimmelblau and compact_jwt
* Fix builds w/tpm
* aad-tool Authentication flow improvements
* Filter out irrelevant debug in aad-tool
* Create a unified login experience for aad-tool
* Utilize confidential creds for aad-tool enumerate
* himmelblau should get posix attributes w/out delegate user access
* Always use the Object Id for mapping Group to GID
* Update enhancement-request.md for SPI donations
* Update bug_report.md with SPI donation
* deps(rust): bump the all-cargo-updates group with 4 updates
* Update build requires in README.md
* Enforce strict order for the systemd units
* Update FUNDING.yml with SPI Paypal donation button
* Don't break from tasks loop when policies fail
* Enroll in Intune as soon as it is enabled
* Implement `decoupled hello` behavior
* Cache encrypted PRT to disk for offline login SSO
* Update to latest hsm-crypto
* Enable tpm functionality
* Allow altering the password and PIN prompt messages
* Ensure Hello PIN lockout happens when online
* Cache the build target output to improve build times
* Easier build selection w/ Makefile
* Revert mistaken removal from Makefile
* Make the user wait longer with each incorrect PIN
* Make the bad PIN count configurable
* Improve aad-tool manpage
* aad-tool fails if the user has FIDO2 enabled
* Offline auth permits authentication with invalid Hello PIN
* PIN complexity to match Windows
* Update to latest SSSD idmap code
* Add aad-tool options for setting posix attrs
* Add scopes and redirect uris aad-tool application create
* Add aad-tool commands for managaging extension attrs
* deps(rust): bump the all-cargo-updates group with 4 updates
* cargo clippy
* cargo fmt
* Utilize the sidtoname call for object id mapping
* Add commands for listing/creating App registrations
* Potential fix for code scanning alert no. 2: Workflow does not contain permissions
* Potential fix for code scanning alert no. 4: Workflow does not contain permissions
* Potential fix for code scanning alert: Workflow does not contain permissions
* Never write the app_id to the server config
* Disable passwordless Fido by default
* Stop using deprecated `users` crate
* When group membership lookup fails, use cached groups
* deps(rust): bump the all-cargo-updates group across 1 directory with 11 updates
* deps(rust): bump the all-cargo-updates group with 4 updates
* aad-tool command for enumerating users and groups
* Name-Based Group Matching in `pam_allow_groups` Leads to Potential Security Bypass
* Add the configure-pam option to aad-tool man page
* Add static idmap cache for on-prem to cloud migration
* Update bug_report.md with request for himmelblau.conf
* deps(rust): bump the all-cargo-updates group with 2 updates
* Update crates in a group
* Update crate bumps
* Utilize new Intune compliance enforcement via libhimmelblau
* Correct the README regarding Intune policy compliance
* Disable Chromium policy
* Re-enable Intune policy and add scripts and compliance policies
* himmelblau.conf alias `domain` as `domains`
* Support Fido auth in pam passwd
* Add TAP support to himmelblaud and pam passwd
* Mixed case names should properly identify Hello Key
* Update linux-entra-sso to latest version
* Fix group lookup for Entra Id group name
* Fix mixed case name lookup from PRT cache
* Crate updates
* Fix tasks daemon debug output
* Remove write locks where unecessary
* Fix deadlock in nss
* systemd notify fixes
* Console
* Address Feedback
* Order services before gdb/nss-user-target
* deps(rust): bump rpassword from 7.3.1 to 7.4.0
* deps(rust): bump tokio from 1.44.2 to 1.45.0
* deps(rust): bump sha2 from 0.10.8 to 0.10.9
* deps(rust): bump systemd-journal-logger from 2.2.0 to 2.2.2
* deps(rust): bump clap from 4.5.31 to 4.5.38
* Update notify-debouncer-full
* Update opentelemetry
* Update dependencies
* deps(rust): bump time from 0.3.39 to 0.3.41
* Replace source filter that blacklists files with filter that whitelists files.
* Mark himmelblau.conf as config in rpm
* Update README.md
* Ensure only the base URL is printed to log
* If unix_user_get fails, wait, and try again
* Supplying a PRT cookie to SSO doesn't require network
* Don't send a password prompt if the network is down
* Auth via MFA if Hello PIN fails 3 times
* Improve Hello PIN failed auth error
* Fix rocky9 build
* deps(rust): bump anyhow from 1.0.96 to 1.0.98
* deps(rust): bump libc from 0.2.170 to 0.2.172
* deps(rust): bump cc from 1.2.16 to 1.2.19
* Update README.md
* deps(rust): bump tokio from 1.43.0 to 1.44.2
* deps(rust): bump openssl from 0.10.71 to 0.10.72 in the cargo group
* deps(rust): bump reqwest from 0.12.12 to 0.12.15
* Update libhimmelblau in Cargo.lock
* Fix nss and offline checks for domain aliases
* Report error when MS Authenticator denies authorization
* Bail out of invalid offline auth
* Handle AADSTS errors from BeginAuth response
* Never dump failed reqwests to the log
* Update sccache-action version to use new cache service
* Permit daemon to start when network is down
* Add an nss cache for when daemon is down
* Additional pam info cues
* Proceed with Hello auth even with net down
* Indicate to the user what the password and PIN are
* Ensure pam messages are seen
* Display the minimum PIN length during Hello setup
* PAM should loop, not die on error
* Ensure prompt msg remains for confirmation
* Update bug_report.md
* Ignore demands for setting up MS Authenticator
* Login fails if Entra is configured to recommend MS authenticator
* Add pam configure command to aad-tool
* Update README.md with pam passwd instructions
* aad-tool authtest needs to map names
* Update demo video in README.md
* Sign RPM packages
* Ensure the pam module is installed correctly for SLE
* Improve pam error handling and messaging
* Only push cachix builds for stable releases
* Terminate linux-entra-sso when browser terminates
* On deb, push pam config after install
* Increase priority of deb PAM passwd for Himmelblau
* Improve offline state handling
* Specify request for Entra Id password in PAM
* QR Greeter also supports gnome-shell 47
* Fix profile photo loading
* Clarify pam_allow_groups in himmelblau.conf man page
* Don't hide debug for pam_allow_groups miss
* Handle failures in passwordless auth
* build all root packages
* split config options that can be defined per-domain from those which are global only
* configure cachix signing and upload in ci
* deps(rust): bump serde_json from 1.0.138 to 1.0.140
* deps(rust): bump serde from 1.0.218 to 1.0.219
* deps(rust): bump time from 0.3.37 to 0.3.39
* deps(rust): bump bytes from 1.10.0 to 1.10.1
* deps(rust): bump pkg-config from 0.3.31 to 0.3.32
* Entra Id is case insensitive, cache lookup must match
* deps(rust): bump ring from 0.17.9 to 0.17.13 in the cargo group
* Support CompanionAppsNotification mfa method
* QR code for gnome-shell greeter
* Allow tasks to start if AccountsService dir missing
* Remove invalid python dependency from sso package
* Fixes https://github.com/himmelblau-idm/himmelblau/issues/397
* Clear server config when clearing cache
* Update version in the Cargo.lock
* deps(rust): bump async-trait from 0.1.86 to 0.1.87
* deps(rust): bump chrono from 0.4.39 to 0.4.40
* Fix himmelblau.conf man page cn_name_mapping entry
* deps(rust): bump pem from 3.0.4 to 3.0.5
* deps(rust): bump serde from 1.0.217 to 1.0.218
* Version 1.0.0
* deps(rust): bump cc from 1.2.15 to 1.2.16
* Update workflow versions
-------------------------------------------------------------------
Mon Jul 28 18:53:09 UTC 2025 - david.mulder@suse.com
- Update to version 0.9.21+git.0.6963ee0:
* Fix authentication when passkeys are enabled
* Version 0.9.20
* Fix Intermittent auth issue AADSTSError 16000
* Version 0.9.19
* Disable cookies
* Version 0.9.18
* Cache the build target output to improve build times
* Easier build selection w/ Makefile
* Never write the app_id to the server config
-------------------------------------------------------------------
Thu Jun 26 17:04:51 UTC 2025 - david.mulder@suse.com
- Update to version 0.9.17+git.0.4a97692:
* Version 0.9.17
* Offline auth permits authentication with invalid Hello PIN; (CVE-2025-53013).
* Cargo fmt
* Don't neglect to sign the rpm packages
-------------------------------------------------------------------
Tue Jun 17 21:16:41 UTC 2025 - david.mulder@suse.com
- Update to version 0.9.16+git.0.aac2205:
* Disable passwordless Fido by default
* Stop using deprecated `users` crate
* Version 0.9.16
* When group membership lookup fails, use cached groups
* Just report whether some passwordless type is available
* Version 0.9.15
* Name-Based Group Matching in `pam_allow_groups` Leads to Potential Security Bypass
* Version 0.9.14
* Support Fido auth in pam passwd
* Add TAP support to himmelblaud and pam passwd
* Mixed case names should properly identify Hello Key
* Remove write locks where unecessary
* Fix group lookup for Entra Id group name
* Version 0.9.13
* Fix mixed case name lookup from PRT cache
-------------------------------------------------------------------
Tue May 20 07:19:23 UTC 2025 - david.mulder@suse.com
- Update to version 0.9.12+git.0.99b5ca6:
* Version 0.9.12
* Fix deadlock in nss
* systemd notify fixes
-------------------------------------------------------------------
Tue Apr 29 18:49:53 UTC 2025 - david.mulder@suse.com
- Update to version 0.9.11+git.0.04ef9c8:
* Ensure only the base URL is printed to log
* Version 0.9.11
* Supplying a PRT cookie to SSO doesn't require network
* Improve Hello PIN failed auth error
* Fix rocky9 build
* Fix nss and offline checks for domain aliases
* Report error when MS Authenticator denies authorization
* Bail out of invalid offline auth
* Handle AADSTS errors from BeginAuth response
* Never dump failed reqwests to the log
* Update sccache-action version to use new cache service
* Permit daemon to start when network is down
* Version 0.9.10
* Add an nss cache for when daemon is down
* Additional pam info cues
* Proceed with Hello auth even with net down
* Indicate to the user what the password and PIN are
* Specify request for Entra Id password in PAM
* Ensure pam messages are seen
* Display the minimum PIN length during Hello setup
* PAM should loop, not die on error
* Ensure prompt msg remains for confirmation
-------------------------------------------------------------------
Tue Apr 15 14:15:15 UTC 2025 - david.mulder@suse.com
- Update to version 0.9.9+git.0.5425b98:
* Version 0.9.9
* Ignore demands for setting up MS Authenticator
-------------------------------------------------------------------
Thu Mar 20 19:30:25 UTC 2025 - david.mulder@suse.com
- Update to version 0.9.8+git.0.3f20b1b:
* configure cachix signing and upload in ci
* Version 0.9.8
* Improve pam error handling and messaging
* Version 0.9.7
* Terminate linux-entra-sso when browser terminates
* On deb, push pam config after install
* Increase priority of deb PAM passwd for Himmelblau
* Improve offline state handling
* QR Greeter also supports gnome-shell 47
* Version 0.9.6
* Fix profile photo loading
* Clarify pam_allow_groups in himmelblau.conf man page
* Don't hide debug for pam_allow_groups miss
* Version 0.9.5
* Handle failures in passwordless auth
-------------------------------------------------------------------
Tue Mar 11 20:06:05 UTC 2025 - david.mulder@suse.com
- Update to version 0.9.4+git.0.9909238:
* Version 0.9.4
* bump ring from 0.17.9 to 0.17.13
* Entra Id is case insensitive, cache lookup must match
* Support CompanionAppsNotification mfa method
* Version 0.9.2
* QR code for gnome-shell greeter
* Allow tasks to start if AccountsService dir missing
* Remove invalid python dependency from sso package
* Version 0.9.1
* himmelblaud-tasks stops due to missing dir
* Clear server config when clearing cache
* Fix himmelblau.conf man page cn_name_mapping entry
* Update workflow versions
* Document the requirements for app_id
* Properly handle aad error from auth code req
* Provide a group gid fallback for rfc2307 id map
* Remove option defs from the default debian himmelblau.conf
* Ensure tasks daemon creates files w/ correct gid
* Isolate the name mapping so it only happens if enabled
* Default to request group info via Edge browser
* Avoid modifying the cache entries
* Utilize systemd notify to avoid tasks started fail
* Ubuntu PAM module configuration to change PIN
* Resolve migration error `real_gidnumber` missing
* deps(rust): bump libc from 0.2.169 to 0.2.170
* deps(rust): bump clap_complete from 4.5.45 to 4.5.46
* Fix some clippy warnings
* Cause tasks daemon to honor configured debug
* Fetch user profile photo via tasks daemon
* deps(rust): bump clap from 4.5.30 to 4.5.31
* deps(rust): bump anyhow from 1.0.95 to 1.0.96
* deps(rust): bump cc from 1.2.14 to 1.2.15
* Add apparmor whitelisting for nss mapping cache
* Dramatically improve debug logging
* Move the NixOS CI to a different workflow (w/out main)
* Add a sample himmelblau.conf in docs
* Resolve missed auth code redirect
* Implement mapped name caching in NSS
* Add script on-behalf-of flow for logon scripts
* Update Cargo.lock deps
* Update installation instructions in the README
* Donation requests in the issue templates
* Update README.md with contribute badge
* Update README.md with contributions statement
* Create FUNDING.yml
* Update README.md
* fix failing test expecting /bin/echo to be available
* add nixos ci tests
* Use sd_notify to signal service readiness, prevent startup failures
* Add build command to Makefile
* Update documentation
* Add NixOS Module
* enable build with nix
* Implement logon name script mapping
* deps(rust): update libnss requirement from 0.8.0 to 0.9.0
* Only the himmelblau-sso package should conflict with intune-portal
* deps(rust): update gethostname requirement from 0.5.0 to 1.0.0
* deps(rust): update lru requirement from ^0.12.3 to ^0.13.0
* deps(rust): update rand requirement from ^0.8.5 to ^0.9.0
* Fetch the group extension attrs with the group object
* Ensure access token has the GroupMember.Read.All scope
* Replace the unix attribute option with a rfc2307 idmap
* Map the extended attr gidNumber to primary group
* Permit configuration of an Application for group fetching
* Use posix attributes synchronized from on-prem AD
* Fix debug option in himmelblau.conf
* Add a span around server initialisation for correct log coalescing
* Fix GOA crash when krb5.conf doesn't include /etc/krb5.conf.d
* Fix libutf8proc dependency issue on Ubuntu 22.04
* Fix Credentials leaking in the debug log
* deps(rust): update rusqlite requirement from ^0.32.0 to ^0.33.0 (#345)
* Decrease CI build time
* Fix CI failure caused by package revision
* Support password changes when demanded
* Update README.md
* Entra Id no longer permits SFA enrollment
* Rewrite the sso code in Rust
* Add profile photo fetching
* Version 0.9.0
-------------------------------------------------------------------
Mon Jan 27 15:29:44 UTC 2025 - david.mulder@suse.com
- Update to version 0.8.3+git.5.1510f5a:
* Decrease CI build time
* Fix CI failure caused by package revision
* Version 0.8.4
* Fix libutf8proc dependency issue on Ubuntu 22.04
* Version 0.8.3
* Fix Credentials leaking in the debug log
-------------------------------------------------------------------
Fri Jan 17 15:58:08 UTC 2025 - david.mulder@suse.com
- Update to version 0.8.2+git.0.553c632:
* Version 0.8.2
* Entra Id no longer permits SFA enrollment
* Remove SSO python dependencies
* Version 0.8.1
* Rewrite the sso code in Rust
-------------------------------------------------------------------
Thu Dec 19 22:26:54 UTC 2024 - david.mulder@suse.com
- Update to version 0.8.0+git.0.249ba5f:
* Branch version stable-0.8.x
* Passwordless auth doesn't provide polling numbers
* Resolve deadlock introduced by Fido auth
* Implement NGC Passwordless authentication
* Remove unused commit checklist
* deps(rust): update bindgen requirement from 0.70.1 to 0.71.1
* Update libhimmelblau version
* Custom domains matching
* Fix IdmapError to indicate the failure
* Fix Fedora build dependencies
* Add Fido MFA
* Add Debian 12 packaging
* Disable SELinux labeling on build container volume mounts
* Update github CI dependencies
* Implement Hello Pin changes via PAM
* Formatting fix
* Utilize HimmelblauConfig directly in pam and nss
* Add config parsing unit tests
* Fix incorrect default domain
* Fix config hsm type Tpm error
* Include multi-domain important info in himmelblau.conf man
* Update to the latest libhimmelblau
* Add DAG flow as a fallback for MFA
* Fix CVE-2024-11738: rustls network-reachable panic in `Acceptor::accept`
* Update README.md with build requires
* Enable module for utf8proc-devel in Rocky8
* Remove the org.samba.himmelblau dbus service
* Fix missing dependency utf8proc_NFKC_Casefold
* The tasks daemon needs /etc/groups write access
* Revert "Fix Ubuntu PAM fallback to password prompt"
* Fix Ubuntu PAM fallback to password prompt
* Increase the cache timeout to 5 minutes
* Always fetch and cache the graph url
* Package Siemens Linux Entra SSO for Himmelblau
* Add Kerberos CCache support
* Update the tasks daemon man page
* Add a himmelblau.conf man page, and package the man pages
* Add SLE15SP6 packaging
* Add Fedora 41 packaging
* Add Fedora Rawhide packaging
* Provide enhancement request template
* Create an issue template
* Hello support depends on openssl3
* Fix sshd rpm depends
* Resolve RPM dependencies automatically
* Revert "deps(rust): update notify-debouncer-full requirement from 0.3 to 0.4"
* Add openSUSE Tumbleweed packaging
* Fix RPM packaging placement of systemd files
* Remove the failed attempt at debian packaging
* Add stable-0.7.x to CI workflows
* Version 0.8.0
-------------------------------------------------------------------
Thu Dec 12 15:14:46 UTC 2024 - david.mulder@suse.com
- Update to version 0.7.13+git.0.d790d31:
* Version 0.7.13
* Fix Fedora build dependencies
* Version 0.7.12
* Add Debian 12 packaging
* Update github CI dependencies
* Version 0.7.11
* Implement Hello Pin changes via PAM
* Utilize HimmelblauConfig directly in pam and nss
* Version 0.7.10
* Add config parsing unit tests
* Fix incorrect default domain
* Fix config hsm type Tpm error
* Include multi-domain important info in himmelblau.conf man
-------------------------------------------------------------------
Thu Dec 05 14:18:37 UTC 2024 - david.mulder@suse.com
- Update to version 0.7.9+git.0.93655d2:
* Version 0.7.9
* Update to the latest libhimmelblau
* Version 0.7.8
* Add a himmelblau.conf man page, and package the man pages
* Add DAG flow as a fallback for MFA
-------------------------------------------------------------------
Mon Dec 02 16:43:42 UTC 2024 - david.mulder@suse.com
- Update to version 0.7.7+git.0.b48d0bb:
* Version 0.7.7
* Fix CVE-2024-11738: rustls network-reachable panic in `Acceptor::accept`
(bsc#1233949).
* Version 0.7.6
* Enable module for utf8proc-devel in Rocky8
-------------------------------------------------------------------
Mon Nov 25 19:55:22 UTC 2024 - david.mulder@suse.com
- Update to version 0.7.5+git.0.8f421b0:
* Version 0.7.5
* Remove the org.samba.himmelblau dbus service
-------------------------------------------------------------------
Mon Nov 25 17:26:11 UTC 2024 - david.mulder@suse.com
- Update to version 0.7.4+git.0.d1291c6:
* Version 0.7.4
* Fix missing dependency utf8proc_NFKC_Casefold
* Package Siemens Linux Entra SSO for Himmelblau
* Add SLE15SP6 packaging
* Add Fedora 41 packaging
* Add Fedora Rawhide packaging
* The tasks daemon needs /etc/groups write access
* Version 0.7.3
* Increase the cache timeout to 5 minutes
* Always fetch and cache the graph url
-------------------------------------------------------------------
Mon Nov 25 14:45:36 UTC 2024 - david.mulder@suse.com
- Update to version 0.7.2+git.0.c76ac0e:
* Version 0.7.2
* Hello support depends on openssl3
* Version 0.7.1
* Fix sshd rpm depends
* Resolve RPM dependencies automatically
* Revert "deps(rust): update notify-debouncer-full requirement from 0.3 to 0.4"
* Add openSUSE Tumbleweed packaging
* Fix RPM packaging placement of systemd files
* Remove the failed attempt at debian packaging
* Add stable-0.7.x to CI workflows
* deps(rust): update utoipa requirement from 4.0.0 to 4.2.0
* deps(rust): update hashbrown requirement from 0.14.0 to 0.15.1
* Remove missing feature causing warnings
* deps(rust): update notify-debouncer-full requirement from 0.3 to 0.4
* Specify scopes when making an SSO request
* Implement logon script for ensuring compliance
* Option for adding Entra Id users to local groups
* Configure EL sshd with ChallengeResponseAuthentication yes
* Add rocky 8 packaging
* Add RPM packaging for EL9
* Modify Ubuntu defaults to fix snaps
* Resolve Libreoffice fails to start on Ubuntu
* Minor formatting fix
* Revert RwLock -> Arc<Mutex> change in idmap
* Ignore broker scopes requests for now
* Ensure every file specifies the proper license
* postinst should not fail on patch or apparmor update
* Install pam module to additional location via make
* Add sshd config to the Makefile
* Don't use sudo in postinst/postrm scripts for deb
* PAM should be placed first in the stack
* Add the libutf8proc-dev dep for deb
* Match the object ID of the fake user and group
* Make it possible to stop the broker service
* Move sshd config into it's own debian package
* Allow the graph to start w/out network
* Add hello_pin_min_length conf option
* Don't attempt SFA fallback if AADSTSError
* Have libhimmelblau handle the DAG fallback
* Add a warning to user that SSH needs restarted
* Ensure local users are ignored when CN mapping
* Ensure DAG is rejected if lifetime expires
* Rework the poll logic to resolve timeout issues
* Add a sshd soft depends for the deb package
* CN name mapping in PAM and NSS
* Make CN an optional home directory attribute
* Remove the sssd build dependencies
* Configuration patches for himmelblau on Debian
* Simplify PAM get_item_string calls
* Bug in pam which needs defended against
* Fix deb build by adding Broker service file
* Install Ubuntu unix-chkpwd apparmor deps
* Ensure make install places pam_himmelblau correctly
* Add Ubuntu pam-config for pam_himmelblau
* Never return Err(PAM_SUCCESS) from get_user
* Never return the Pam result from get_user()
* Revert "Speed up nss requests w/out auth attempt"
* Speed up nss requests w/out auth attempt
* Fix some broker responses
* Fixes for the dbus broker
* Attempt to fix the cargo version in launchpad build
* Makefile typo fixes
* Version 0.7.0
* Add libdbus-1-dev dep
* Improve the README installation instructions
* Add `make install` command
* Improve Debian/Ubuntu install instructions
* Fix tag push permissions for tag-version workflow
* Add a version check script
* Remove the rustc dependency, breaking rustup
* Add a debug option to the config
* DBus requires that the service file match the name
* Add a pam option for the OpenSSH 2876 workaround
* Update to the latest libhimmelblau
-------------------------------------------------------------------
Tue Oct 22 16:22:21 UTC 2024 - david.mulder@suse.com
- Update to version 0.6.14+git.0.bbda0b6:
* Version 0.6.14
* postinst should not fail on patch or apparmor update
* Version 0.6.13
* Don't use sudo in postinst/postrm scripts for deb
* Version 0.6.12
* PAM should be placed first in the stack
* Match the object ID of the fake user and group
* Version 0.6.11
* Move sshd config into it's own debian package
* Version 0.6.10
* Allow the graph to start w/out network
* Add hello_pin_min_length conf option
* Version 0.6.9
* Don't attempt SFA fallback if AADSTSError
* Have libhimmelblau handle the DAG fallback
* Add a warning to user that SSH needs restarted
* Version 0.6.8
* Ensure local users are ignored when CN mapping
* Ensure DAG is rejected if lifetime expires
* Version 0.6.7
* Rework the poll logic to resolve timeout issues
* Version 0.6.6
* Add a sshd soft depends for the deb package
* CN name mapping in PAM and NSS
* Version 0.6.5
* Make CN an optional home directory attribute
* Version 0.6.4
* Add Ubuntu pam-config for pam_himmelblau
* Configuration patches for himmelblau on Debian
* Version 0.6.3
* Bug in pam which needs defended against
* Version 0.6.2
* Never return the Pam result from get_user()
* Correct installation directory of the deb pam module
* Makefile typo fixes
* Add libdbus-1-dev dep
* Version 0.6.1
* Debian build requires libdbus-1-dev
-------------------------------------------------------------------
Wed Oct 02 20:29:43 UTC 2024 - david.mulder@suse.com
- Update to version 0.6.0+git.0.b8dae18:
* Attempt to fix the cargo version in launchpad build
* Add branch stable-0.6.x to the workflows
* Install the pam module to the proper location
* Update README.md
* Add a debug option to the config
* Add a pam option for the OpenSSH 2876 workaround
* Update to the latest libhimmelblau
* Authorize all users when pam_allow_groups is empty
* Fix clippy warnings
* Fix pam echo not displayed via ssh
* Fix pam failure to register Pin following mfa poll
* Fork from kanidm
* Version 0.6.0
* Add cargo deb build
* Version 0.5.3
* Improve the README installation instructions
* Add `make install` command
* Improve Debian/Ubuntu install instructions
* Fix tag push permissions for tag-version workflow
* Version 0.5.2
* Add a version check script
* Version 0.5.1
* Remove the rustc dependency, breaking rustup
* Added Debian packaging workflow and files
-------------------------------------------------------------------
Thu Sep 12 00:22:33 UTC 2024 - William Brown <william.brown@suse.com>
- explicitly depend on cargo to pull in latest compiler revision
-------------------------------------------------------------------
Wed Sep 04 14:16:35 UTC 2024 - david.mulder@suse.com
- Update to version 0.5.0+git.0.22f84f0:
* Update workflows for 0.5.x
* Update Debian dependencies in README.md
* Compilation fails on Ubuntu, missing ldb header
* Fix base32 with kandim updates
* deps(rust): update base32 requirement from ^0.4.0 to ^0.5.0
* deps(rust): update scim_proto requirement from ^0.2.1 to ^1.3.2
* deps(rust): update bindgen requirement from 0.69.4 to 0.70.1
* Fix CI failures caused by cargo 1.80.1
* Update to libhimmelblau version 0.2.9
* deps(rust): update rusqlite requirement from ^0.31.0 to ^0.32.0
* deps(rust): update tonic requirement from 0.11.0 to 0.12.0
* update libnss requirement from 0.7.0 to 0.8.0
* Switch to using libhimmelblau
* himmelblaud stops working after suspend
* Update required packages for tumbleweed
* Disable the SFA fallback by default
* Fix ConsolidatedTelephony MFA method
* Use the group ID for the name if no display name
* Use latest msal with MFA fixes
* PhoneAppNotification is not a cred request algorithm
* The polling_interval is in milliseconds, not seconds
* OneWaySMS is additionally a valid OTP
* Relicensing as GPL3, as SSSD source inclusion requires
* Utilize the graph code in msal
* config: Remove comments about experimental policy enforement
* Remove the experimental policy code from the id provider
* Fix a refresh token leak in debug from msal
* Correct README details
* Always normalize idmap upn inputs
* Add video links to the README
* Minor updates to the Contributing section
* Add a Installation section to the README
* Add the new SSSD idmap build deps to the README
* Add a section about donations
* Include the Samba Technical matrix channel
* Add github workflows for the 0.4.x branch
* Version 0.5.0 bump for main
-------------------------------------------------------------------
Mon Jul 15 15:07:32 UTC 2024 - david.mulder@suse.com
- Update to version 0.4.3+git.2.6379abc:
* Specifically use msal 0.2.6
* Version 0.4.3
* update libnss requirement from 0.7.0 to 0.8.0
* himmelblaud stops working after suspend
* Version 0.4.2
* Fix ConsolidatedTelephony MFA method
-------------------------------------------------------------------
Wed May 29 19:35:33 UTC 2024 - david.mulder@suse.com
- Update to version 0.4.1+git.0.41dd0dc:
* Version 0.4.1
* Use latest msal with MFA fixes
* PhoneAppNotification is not a cred request algorithm
* The polling_interval is in milliseconds, not seconds
* OneWaySMS is additionally a valid OTP
* Relicensing as GPL3, as SSSD source inclusion requires
-------------------------------------------------------------------
Wed May 22 22:10:10 UTC 2024 - david.mulder@suse.com
- Update to version 0.4.0+git.4.63e3704:
* Fix a refresh token leak in debug from msal
-------------------------------------------------------------------
Wed May 22 14:28:10 UTC 2024 - david.mulder@suse.com
- Update to version 0.4.0+git.2.7b57f5e:
* Always normalize idmap upn inputs
-------------------------------------------------------------------
Mon May 20 19:23:30 UTC 2024 - david.mulder@suse.com
- Update to version 0.4.0+git.0.69b64fe:
* Add github workflows for the 0.4.x branch
* Do not append to pam_allow_groups automatically
* Pam Allow Groups must be specified by Object ID
* Request the correct resource and permissions
* Improve error output on group lookup failure
* When faking a uuid for NSS, use a random uuid
* Fix clippy warning about inefficient use of clone()
* Remove the initial uid hack, use name mapping
* Don't stop an MR based on a clippy warning
* Update Kanidm tracking
* Modify CI workflows to handle idmap build
* Add CI job for cargo test
* Test the new and legacy idmapping
* Ensure duplicate providers are not started
* Use the SSSD Idmap code in Himmelblau
* Specify in conf that pam_allow_groups is required
* Remove code duplication in Hello PIN auth
* Fix Device authentication failed after enrollment
* Update the base64urlsafedata version
* Update README.md with Matrix contact info
* Version 0.4.0
-------------------------------------------------------------------
Wed May 15 15:19:43 UTC 2024 - david.mulder@suse.com
- Update to version 0.3.4+git.0.01d099f:
* Version 0.3.4
* Only remove cached user if it doesn't exist
* Use existing user token at refresh
* Always use the spn of the user for nss requests
* Generate a fake user token to please SSH
* Fix aad-tool to handle MFA
* Fix lib_crypto version
* Fix user dropping from NSS
-------------------------------------------------------------------
Fri May 10 18:59:23 UTC 2024 - david.mulder@suse.com
- Himmelblau requires libopenssl-3 for PRT messages.
-------------------------------------------------------------------
Thu May 09 19:34:59 UTC 2024 - david.mulder@suse.com
- Update to version 0.3.3+git.0.c2197d7:
* Correct the debug messages for Hello skip
* Version 0.3.3
* Allow disabling Hello PIN auth for enrolled users
* Add an option for disabling Windows Hello
* Remove the TODO doc from stable branch
* config: Remove comments about experimental policy enforement
-------------------------------------------------------------------
Tue May 07 18:19:29 UTC 2024 - david.mulder@suse.com
- Update to version 0.3.2+git.0.de9f5b5:
* Version 0.3.2
* Fix Hello PIN Authentication error, no nonce
-------------------------------------------------------------------
Mon Apr 29 19:43:17 UTC 2024 - david.mulder@suse.com
- Update to version 0.3.1+git.0.359a8d0:
* Add github workflows for the 0.3.x branch
* Fallback to SFA first if MFA fails Browse files
* deps(rust): update libnss requirement from 0.6.0 to 0.7.0
* deps(rust): update webauthn-rs-proto requirement from 0.4.8 to 0.5.0
* Fix deadlock caused by client write lock
* Add rid idmapping (replacing existing idmap)
* Additional debug for Hello auth
* Make proto Cargo.toml a physical file
* Push the clippy arg count limit a little higher
* Version 0.3.0
* Windows Hello PIN implementation
* deps(rust): update hostname requirement from ^0.3.1 to ^0.4.0
* Enable actions on stable branches
* Prevent dependabot from updating opentelemetry
* Revert "deps(rust): update opentelemetry requirement from 0.20.0 to 0.22.0 (#93)"
* deps(rust): update reqwest requirement from ^0.11.18 to ^0.12.2 (#95)
* deps(rust): update lru requirement from ^0.8.0 to ^0.12.3 (#94)
* deps(rust): update opentelemetry requirement from 0.20.0 to 0.22.0 (#93)
* deps(rust): update num_enum requirement from ^0.5.11 to ^0.7.2 (#92)
* deps(rust): update tonic requirement from 0.10.2 to 0.11.0 (#91)
* Use the Kanidm MFA patches
* deps(rust): update libnss requirement from 0.5.0 to 0.6.0 (#90)
* deps(rust): update tracing-opentelemetry requirement (#89)
* deps(rust): update rusqlite requirement from ^0.28.0 to ^0.31.0 (#88)
* deps(rust): update clap requirement from ^3.2 to ^4.5 (#87)
* deps(rust): update kanidm-hsm-crypto requirement from ^0.1.6 to ^0.2.0 (#86)
* Update dependabot.yml
* Add missing db dependency on sketching
* Set the workspace resolver version to 2
* Init the kanidm submodule during workflows
* Ignore clippy blocks_in_conditions warning in daemon
* Add build/clippy/dependabot_automerge workflows
* deps(rust): update opentelemetry-otlp requirement from 0.13.0 to 0.15.0
* deps(rust): update opentelemetry_sdk requirement from 0.20.0 to 0.22.1
* deps(rust): update base64 requirement from ^0.21.5 to ^0.22.0
* deps(rust): update notify-debouncer-full requirement from 0.1 to 0.3
* deps(rust): update systemd-journal-logger requirement
* Create dependabot.yml
* Add MFA capabilities
* Update to the latest Kanidm reqs
* Always force MFA when enrolling the device
* Update to latest msal
-------------------------------------------------------------------
Thu Feb 29 20:14:08 UTC 2024 - dmulder@suse.com
- Himmelblau provides the features found in aad-auth packages from
other distros.
-------------------------------------------------------------------
Tue Feb 20 21:07:56 UTC 2024 - dmulder@suse.com
- Update to version 0.2.0+git.4.904b915:
* Update to latest msal
* Version 0.2.0
* Himmelblau now authenticates only to configured domains
* Remove reference to python-msal dep in README
* Use the external MSAL crate for auth
* Rename msal in prep for external msal crate
* msal: Remove python msal bindings
* msal: Rust msal
* Point Cargo.toml to new project home
* config: Write domain join to server specific config
* idprovider: Invalidate cached user if PRT req fails
* idprovider: Pass the keystore to the auth function
* Update daemon from kanidm
* test: Add a pause to ensure tasks daemon sees himmelblau
* Update kanidm submodule
* config: Include domain sections in configured domains
* msal: Add acquire_token_by_refresh_token
* enrollment: Authentication fixes
* tests: Create the hsm-pin directory
* idprovider: Add domain join debug
* cargo: Use relative paths and remove most symlinks
* idprovider: Allow group search when device is authenticated
* msal: Move the application reqs from misc to msal::application
* msal: Move user reqs from misc to msal::user
* Remove duplicates from allow_groups during enrollment
* Remove device enrollment from TODO
* Implement Device enrollment
* enrollment: Add the nonce service request
* enrollment: Add enrollment service discovery
* Implement ConfidentialClientApplication for enrollment
* daemon: Fix inverted logic on cache dir check
* nss: Use upstream nss package
* idprovider: Provider auth needs to point to just the host
* config: Consistently use the config file provided to the daemon
* cargo: Use relative paths and remove most symlinks
* clippy: Add kanidm's clippy config
* config: Only check for tenant_id, authority, graph if necessary
* Update README.md
* Update version to 0.1.2
* config: Fix typos in the config file
* Make most params to acquire_token_interactive optional
* Config can take defaults
* cli: Add missing cli opt file
* cli: Improve aad-tool options and interface
* Update README.md
* tests: Fix tasks daemon name typo
* Remove MFA from TODO
-------------------------------------------------------------------
Fri Dec 22 18:07:18 UTC 2023 - dmulder@suse.com
- Update to version 0.1.1+git.10.4aa76b7:
* daemon: Fix inverted logic on cache dir check
* nss: Use upstream nss package
* idprovider: Provider auth needs to point to just the host
* config: Consistently use the config file provided to the daemon
* cargo: Use relative paths and remove most symlinks
* clippy: Add kanidm's clippy config
* config: Only check for tenant_id, authority, graph if necessary
* Correct the cargo version
-------------------------------------------------------------------
Mon Nov 13 19:12:05 UTC 2023 - dmulder@suse.com
- Update to version 0.1.1+git.0.6d2f645:
* config: Remove comments about experimental policy enforement
* config: Fix typos in the config file
-------------------------------------------------------------------
Tue Sep 26 13:22:40 UTC 2023 - Jan Engelhardt <jengelh@inai.de>
- Reduce size of expanded scriptlets by reducing %service_* calls
- Wrap descriptions
-------------------------------------------------------------------
Thu Sep 14 17:16:34 UTC 2023 - david.mulder@suse.com
- Update to version 0.1.0+git.2.2391ac0:
* Update version to 0.1.0
* Update the README
* idprovider: Fix mixed case auth failure
* daemon: Port daemon changes from kanidm
* provider: Skip provider init on silent auth and offline
* daemon: Run himmelblaud as non-root dynamic user
-------------------------------------------------------------------
Tue Sep 12 21:12:46 UTC 2023 - david.mulder@suse.com
- Update to version 0.0.4+git.50.112df77:
* Always match DAG where present
* Prohibit authentication with changing IDs
-------------------------------------------------------------------
Fri Sep 08 14:16:20 UTC 2023 - david.mulder@suse.com
- Update to version 0.0.4+git.42.d641c8b:
* Run cargo fmt and cargo clippy
* Implement DeviceAuthorizationGrant for MFA
* test: Initialize the pam_allow_groups with users
* Use new pam state machine in himmelblau
* Remove the non-functional device enrollment
* TODO: New details regarding MS auth cache
* daemon: Implement pam allow groups
* Code rearrangement
-------------------------------------------------------------------
Thu Aug 10 14:55:54 UTC 2023 - dmulder@suse.com
- Update to version 0.0.4+git.30.26c26e7:
* aad-tool: Disable enrollment by default
* provider: Fetch GECOS from old token on silent acquire
* msal: Add bindings for device auth flow
* Add debug for local user ignore
* provider: Only retry auth if we're sure group read was requested
* provider: Provide user token refresh
* provider: Cause unix_group_get to respond with BadRequest
* provider: Implement provider_authenticate
-------------------------------------------------------------------
Tue Aug 08 19:29:40 UTC 2023 - dmulder@suse.com
- Update to version 0.0.4+git.9.a7c5ac2:
* osc breaks with workspace errors using symlinks
* gp: Disable MDM policies by default
-------------------------------------------------------------------
Mon Aug 07 20:31:52 UTC 2023 - dmulder@suse.com
- Update to version 0.0.4+git.3.b500f1f:
* Update serde version
* Update version to 0.0.4
* Only build necessary bits of kanidm proto
* Add cache operations to daemon and aad-tool
* tests: Include local cache of rust deps
* cache: Use the kanidm cache backend
-------------------------------------------------------------------
Mon Jul 31 21:16:59 UTC 2023 - dmulder@suse.com
- Update to version 0.0.3+git.10.761b4d2:
* gp: Apply chromium policies
* gp: Implement Group Policy object listing
* test: Fix build test failure
* tests: Return the correct error code from tests
* test: Separate project build from docker build
* tests: Deploy config when testing
-------------------------------------------------------------------
Tue Jul 18 18:54:07 UTC 2023 - dmulder@suse.com
- Update to version 0.0.3+git.3.f0883b1:
* nss: Fix misaligned pointer dereference errors
* Fix code links
-------------------------------------------------------------------
Mon Jul 17 19:43:26 UTC 2023 - dmulder@suse.com
- Update to version 0.0.3+git.1.e6847eb:
* Revert "nss: Use kanidm nss code"
* Update lib versions to match package version
* Shallow clone kanidm for pam/nss
* tests: Fix tar recursion
-------------------------------------------------------------------
Fri Jul 14 17:23:46 UTC 2023 - dmulder@suse.com
- Update to version 0.0.2+git.22.1c3ce4b:
* Remove symlinks and just point to kanidm sources
* nss: Use kanidm nss code
* Add submodule commands to main Makefile
* pam: Use kanidm pam code, glue into himmelblau
* TODO: Only auth to configured domains
-------------------------------------------------------------------
Mon Jul 10 21:19:19 UTC 2023 - dmulder@suse.com
- Update to version 0.0.2+git.15.d42b114:
* aad-tool: Enroll via the daemon
* config: Add func for requesting configured socket path
* aad-tool: Improve enroll options
-------------------------------------------------------------------
Mon Jul 10 19:23:50 UTC 2023 - dmulder@suse.com
- Update to version 0.0.2+git.11.91df240:
* daemon: Add a systemd service
* daemon: Don't request group read scope if using Intune
* TODO: Mention the work needed for the cache
* README: Include homedir creation instructions
* daemon: If auth fails, indicate the user
-------------------------------------------------------------------
Fri Jul 07 16:18:10 UTC 2023 - dmulder@suse.com
- Update to version 0.0.2+git.6.de1afd6:
* test: Ensure invalid users aren't cached
* test: Skip getent group tests failing due to nss issue
* tests: Add nss tests
* tests: Test pam auth
* msal: Allow fetching auth url
-------------------------------------------------------------------
Wed Jun 28 16:55:26 UTC 2023 - dmulder@suse.com
- Update to version 0.0.2+git.0.5bfbedd:
* cache: Make the cache persistent
* TODO: Cannot fudge an initial nss request
* Use tracing for debug instead of log
* aad-tool: Fix some build warnings
* aad-tool: Add TODO comments regarding enrollment issues
* aad-tool: Always use interactive enrollment
* fix readme
* aad-tool: Save the device_id after enrollment
* aad-tool: Cannot enroll in Intune Portal directly
* aad-tool: Parse the enrollment response
* aad-tool: Add a enroll command for Azure AD device
* memcache: Only append existing group member if missing
* himmelblaud: Fix login when Intune errors on group read
* memcache: Create a memcache for user and group caching
* TODO: Group memberships
* TODO: NSS requests via GET reqs
* config: Include default for authority_host
* config: Specify constants for defaults
* Cleanup the build depencencies
* TODO: Fix the headings
* TODO: Add major reqs section
* Cause the odc provider to supply the authority_host
* TODO: Use tracing module
* Include offline logon in todo list
* Add a TODO list
* Discover the tenant_id in the same manner as Intune
* himmelblaud: Debug for unknown user/group
* himmelblaud: Fix failure to cache user
* himmelblaud: Pam Allowed and Sessions stubs
* himmelblaud: Implement NssGroupByGid and NssAccountByUid
* himmelblaud: Implement group lookups
* Include the gecos in the mem cache
* Use config for shell, homedir, uid range, tenant
* Improve Developer Readme
* config: Config should not default app_id
* Remove invalid comment
* himmelblaud: Return with failure without tenant_id
* config: Move the config to unix_common module
* himmelblaud: Make the socket path configurable
* himmelblaud: Use Intune portal when app_id unset
-------------------------------------------------------------------
Fri Jun 02 21:16:00 UTC 2023 - dmulder@suse.com
- Update to version 0.0.1+git.15.f9a024e:
* Generate unix uid/gid
* himmelblaud: Stubs for NssGroupByName and NssGroups
* himmelblaud: Fix auth failure error message
* himmelblaud: Open socket with permissions for users to read/write
* msal: Fix nssaccountbyname lookup
* himmelblaud: Improve logging
* Include systemd journal logging
* msal: Fix failure parsing user token dict
* Implement simple NssAccountByName
* Implement basic NssAccounts request
* pam: Fix unused variable warning
* himmelblaud: Rewrite the daemon in Rust
* msal: Add a simple rust binding to python msal
* Remove the python daemon in favor of Rust
-------------------------------------------------------------------
Fri May 26 20:48:17 UTC 2023 - dmulder@suse.com
- Update to version 0.0.1+git.0.56eb9f0:
* himmelblaud: Implement nss lookups in the daemon
* himmelblaud: Allow anyone to r/w the socket
* himmelblaud: Implement simple nss getpwent name
* pam: Remove account allowed and being session impl
* unix_common: UID and GID need not match
* himmelblaud: Improve the debug output
* himmelblaud: Remove stdout debug since logging to journald
* himmelblaud: Log to the systemd journal
* nss: Add the nss module
* Improve directory structure