<div dir="ltr">Congratulations! Very solid work here.<br></div><div class="gmail_extra"><br><div class="gmail_quote">On Sat, Mar 4, 2017 at 1:50 PM, Jakub Hrozek <span dir="ltr"><<a href="mailto:jhrozek@redhat.com" target="_blank">jhrozek@redhat.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">SSSD 1.15.1<br>
===========<br>
<br>
The SSSD team is proud to announce the release of version 1.15.1 of the<br>
System Security Services Daemon.<br>
<br>
This is the first release that is available from SSSD's new home<br>
at <a href="https://pagure.io/SSSD/sssd" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd</a> The tarball can be downloaded from<br>
<a href="https://releases.pagure.org/SSSD/sssd/" rel="noreferrer" target="_blank">https://releases.pagure.org/<wbr>SSSD/sssd/</a><br>
RPM packages will be made available for Fedora shortly.<br>
<br>
Feedback<br>
--------<br>
Please provide comments, bugs and other feedback via the sssd-devel or<br>
sssd-users mailing lists:<br>
<a href="https://lists.fedorahosted.org/mailman/listinfo/sssd-devel" rel="noreferrer" target="_blank">https://lists.fedorahosted.<wbr>org/mailman/listinfo/sssd-<wbr>devel</a><br>
<a href="https://lists.fedorahosted.org/mailman/listinfo/sssd-users" rel="noreferrer" target="_blank">https://lists.fedorahosted.<wbr>org/mailman/listinfo/sssd-<wbr>users</a><br>
<br>
Highlights<br>
----------<br>
* Several issues related to starting the SSSD services on-demand via<br>
socket activation were fixed. In particular, it is no longer possible<br>
to have a service started both by sssd and socket-activated. Another<br>
bug which might have caused the responder to start before SSSD started<br>
and cause issues especially on system startup was fixed.<br>
* A new 'files' provider was added. This provider mirrors the contents<br>
of '/etc/passwd' and '/etc/shadow' into the SSSD database. The purpose<br>
of this new provider is to make it possible to use SSSD's interfaces,<br>
such as the D-Bus interface for local users and enable leveraging the<br>
in-memory fast cache for local users as well, as a replacement for `nscd`.<br>
In future, we intend to extend the D-Bus interface to also provide setting<br>
and retrieving additional custom attributes for the files users.<br>
* SSSD now autogenerates a fallback configuration that enables the<br>
files domain if no SSSD configuration exists. This allows distributions<br>
to enable the 'sssd' service when the SSSD package is installed. Please<br>
note that SSSD must be build with the configuration option<br>
'--enable-files-domain' for this functionality to be enabled.<br>
* Support for public-key authentication with Kerberos (PKINIT) was<br>
added. This support will enable users who authenticate with a Smart Card<br>
to obtain a Kerberos ticket during authentication.<br>
<br>
Packaging Changes<br>
-----------------<br>
* The new files provider comes as a new shared library 'libsss_files.so'<br>
and a new manual page<br>
* A new helper binary called 'sssd_check_socket_activated_<wbr>responders'<br>
was added. This binary is used in the 'ExecStartPre' directive to check<br>
if the service that corresponds to socket about to be started was also<br>
started explicitly and abort the socket startup if it was.<br>
<br>
Documentation Changes<br>
---------------------<br>
* A new PAM module option 'prompt_always' was added. This option is<br>
related to fixing <a href="https://pagure.io/SSSD/sssd/issue/2984" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/2984</a> which<br>
changed the behaviour of the PAM module so that 'pam_sss' always<br>
uses an auth token that was on stack. The new 'prompt_always' option<br>
makes it possible to restore the previous behaviour.<br>
<br>
Tickets Fixed<br>
-------------<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3112" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3112</a> - When sssd.conf is missing, create one with id_provider=files<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3220" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3220</a> - Improve successful Dynamic DNS update log messages<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3227" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3227</a> - sssd doesn't update PTR records if A/PTR zones are configured as non-secure and secure<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3230" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3230</a> - Use the same logic for matching GC results in initgroups and user lookups<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3260" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3260</a> - handle default_domain_suffix for ssh requests with default_domain_suffix<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3262" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3262</a> - Implement a files provider to mirror the contents of /etc/passwd and /etc/groups<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3270" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3270</a> - [RFE] Add PKINIT support to SSSD Kerberos proivder<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3298" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3298</a> - Socket activation of SSSD doesn't work and leads to chaos<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3299" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3299</a> - SSSD does not start if using only the local provider and services line is empty<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3300" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3300</a> - Avoid running two instances of the same service<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3309" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3309</a> - Coverity warns about an unused value in IPA sudo code<br>
* <a href="https://pagure.io/SSSD/sssd/issue/3313" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/3313</a> - cache_req should use an negative cache entry for UPN based lookups<br>
* <a href="https://pagure.io/SSSD/sssd/issue/2984" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/2984</a> - Don't prompt for password if there is already one on the stack<br>
* <a href="https://pagure.io/SSSD/sssd/issue/1126" rel="noreferrer" target="_blank">https://pagure.io/SSSD/sssd/<wbr>issue/1126</a> - Reuse cache_req() in responder code<br>
<br>
Detailed Changelog<br>
------------------<br>
* Fabiano Fidêncio (11):<br>
<br>
* IFP: Update ifp_iface_generated.c<br>
* MONITOR: Wrap up sending sd_notify "ready" into a new function<br>
* MONITOR: Don't timeout if using local provider + socket-activated responders<br>
* MONITOR: Don't return an error in case we fail to register a service<br>
* SYSTEMD: Add "After=sssd.service" to the responders' sockets units<br>
* SYSTEMD: Avoid starting a responder socket in case SSSD is not started<br>
* SYSTEMD: Don't mix up responders' socket and monitor activation<br>
* SYSTEMD: Force responders to refuse manual start<br>
* CACHE_REQ: Add cache_req_data_set_bypass_<wbr>cache()<br>
* PAM: Use cache_req to perform initgroups lookups<br>
* TESTS: Adapt pam-srv-tests to deal with cache_req related changes<br>
<br>
* Jakub Hrozek (42):<br>
<br>
* Updating the version to track the 1.15.1 release<br>
* AD: Use ad_domain to match forest root domain, not the configured domain from sssd.conf<br>
* SUDO: Only store lowercased attribute value once<br>
* NEGCACHE: Add API to reset all users and groups<br>
* NSS: Add sbus interface to clear memory cache<br>
* UTIL: Add a new domain state called DOM_INCONSISTENT<br>
* RESPONDER: Add a responder sbus interface to set domain state<br>
* RESPONDER: A sbus interface to reset negatively cached users and groups<br>
* DP: Add internal DP interface to set domain state<br>
* DP: Add internal interface to reset negative cache from DP<br>
* DP: Add internal interface to invalidate memory cache from DP<br>
* RESPONDER: Use the NEED_CHECK_DOMAIN macro<br>
* RESPONDER: Include the files provider in NEEDS_CHECK_PROVIDER<br>
* RESPONDER: Contact inconsistent domains<br>
* UTIL: Add a generic inotify module<br>
* CONFDB: Re-enable the files provider<br>
* FILES: Add the files provider<br>
* CONFDB: Make pwfield configurable per-domain<br>
* CONFDB: The files domain defaults to "x" as pwfield<br>
* MAN: Document the pwfield configuration option<br>
* TESTS: move helper fixtures to back up and restore a file to a utility module<br>
* TESTS: add a helper module with shared NSS constants<br>
* TESTS: Add a module to call nss_sss's getpw* from tests<br>
* TESTS: Add a module to call nss_sss's getgr* from tests<br>
* TESTS: Add files provider integration tests<br>
* MONITOR: Remove checks for sssd.conf changes<br>
* MONITOR: Use the common inotify code to watch resolv.conf<br>
* MAN: Add documentation for the files provider<br>
* EXAMPLES: Do not point to id_provider=local<br>
* SBUS: Document how to free the result of sbus_create_message<br>
* FILES: Fix reallocation logic<br>
* TESTS: Remove unused import<br>
* DOC: Deprecate README, add README.md<br>
* MONITOR: Enable an implicit files domain if one is not configured<br>
* TESTS: Enable the files domain for all integration tests<br>
* TESTS: Test the files domain autoconfiguration<br>
* CONFDB: Refactor reading the config file<br>
* CONFDB: If no configuration file is provided, create a fallback configuration<br>
* UTIL: Store UPN suffixes when creating a new subdomain<br>
* SYSDB: When searching for UPNs, search either the whole DB or only the given domain<br>
* CACHE_REQ: Only search the given domain when looking up entries by UPN<br>
* Updating translations for the 1.15.1 release<br>
<br>
* Justin Stephenson (5):<br>
<br>
* FAILOVER: Improve port status log messages<br>
* SUDO: Add skip_entry boolean to sudo conversions<br>
* TESTS: Add to IPA DN test<br>
* DYNDNS: Update PTR record after non-fatal error<br>
* DYNDNS: Correct debug log message of realm<br>
<br>
* Lukas Slebodnik (13):<br>
<br>
* BUILD: Fix linking of test_wbc_calls<br>
* Suppres implicit-fallthrough from gcc 7<br>
* pam_sss: Suppress warning format-truncation<br>
* TOOLS: Fix warning format-truncation<br>
* sssctl: Fix warning may be used uninitialized<br>
* ldap_child: Fix use after free<br>
* SYSTEMD: Update journald drop-in file<br>
* Partially revert "CONFIG: Use default config when none provided"<br>
* BUILD: Fix linking of test_sdap_initgr<br>
* intg: Fix python3 issues<br>
* FILES: Remove unnecessary check<br>
* Update link to commit template<br>
* Use pagure links as a reference to upstream<br>
<br>
* Pavel Březina (17):<br>
<br>
* SBUS: remove unused symbols<br>
* SBUS: use sss_ptr_hash for opath table<br>
* SBUS: use sss_ptr_hash for nodes table<br>
* SBUS: use sss_ptr_hash for signals table<br>
* ssh: fix number of output certificates<br>
* ssh: do not create again fq name<br>
* sss_parse_inp_send: provide default_domain as parameter<br>
* cache_req: add ability to not use default domain suffix<br>
* cache_req: search user by name with attrs<br>
* cache_req: add api to create ldb_result from message<br>
* cache_req: move dp request to plugin<br>
* cache_req: add host by name search<br>
* ssh: rewrite ssh responder to use cache_req<br>
* ssh: fix typo<br>
* cache_req: always go to dp first when looking up host<br>
* NSS: Rename the interface to invalidate memory cache initgroup records for consistency<br>
* CONFDB: The files provider always enumerates<br>
<br>
* Petr Čech (5):<br>
<br>
* LDAP: Better logging message<br>
* SYSDB: Removing of sysdb_try_to_find_expected_dn(<wbr>)<br>
* TEST: create_multidom_test_ctx() extending<br>
* TESTS: Tests for sdap_search_initgr_user_in_<wbr>batch<br>
* IPA_SUDO: Unused value fix<br>
<br>
* Sumit Bose (17):<br>
<br>
* sdap_extend_map: make sure memory can be freed<br>
* check_duplicate: check name member before using it<br>
* pam_sss: check conversation callback<br>
* PAM: store user object in the preq context<br>
* PAM: fix memory leak in pam_sss<br>
* PAM: use sentinel error code in PAM tests<br>
* utils: new error codes<br>
* LDAP/proxy: tell frontend that Smartcard auth is not supported<br>
* authtok: enhance support for Smartcard auth blobs<br>
* PAM: forward Smartcard credentials to backends<br>
* p11: return name of PKCS#11 module and key id to pam_sss<br>
* pam: enhance Smartcard authentication token<br>
* KRB5: allow pkinit pre-authentication<br>
* authtok: fix tests on big-endian<br>
* pam: use authtok from PAM stack if available<br>
* cache_req: use own namespace for UPNs<br>
* PAM: Improve debugging on smartcard creds forward<br>
<br>
______________________________<wbr>_________________<br>
Freeipa-interest mailing list<br>
<a href="mailto:Freeipa-interest@redhat.com">Freeipa-interest@redhat.com</a><br>
<a href="https://www.redhat.com/mailman/listinfo/freeipa-interest" rel="noreferrer" target="_blank">https://www.redhat.com/<wbr>mailman/listinfo/freeipa-<wbr>interest</a></blockquote></div><br></div>