diff options
author | V3n3RiX <venerix@koprulu.sector> | 2024-06-23 00:11:31 +0100 |
---|---|---|
committer | V3n3RiX <venerix@koprulu.sector> | 2024-06-23 00:11:31 +0100 |
commit | bff543bb632933380da922cbfc07c67157d72d42 (patch) | |
tree | df2e5eebc3dbd8e29153ab3a869b3be8d9be9f19 /sys-auth/sssd | |
parent | 491d0101c89d81dec507f28215b3cb094800d600 (diff) |
gentoo auto-resync : 23:06:2024 - 00:11:30
Diffstat (limited to 'sys-auth/sssd')
4 files changed, 0 insertions, 160 deletions
diff --git a/sys-auth/sssd/Manifest b/sys-auth/sssd/Manifest index 002a94c13d87..282b94f6164a 100644 --- a/sys-auth/sssd/Manifest +++ b/sys-auth/sssd/Manifest @@ -1,8 +1,5 @@ AUX sssd-2.8.2-krb5_pw_locked.patch 453 BLAKE2B 7aed1dd32f0743381b704444ac36dcffa76535d58cd39d307d370290b9b5ad634ef9b90f4d076c7b91b41113792b0d24cf04b63bcd1e1220aa3e790f9c9a23c0 SHA512 e3c210032d6f65ebffa14aa7c398ca929b7bb17d9aa9ef30c2a1522311bc0bf278214d008d7dbac47e8565245b35e00f7143f5c7d0d24f99d64a92486ec50e45 -AUX sssd-2.9.1-BUILD-Accept-krb5-1.21-for-building-the-PAC-plugin.patch 1104 BLAKE2B ef4f781ed437183147bc9fb657d830e510fbde21b92a0edc577ae407ac6384e5a5b936bc4b065ad6c7676180b0d3e84c9e0df3894744a10bd282874d04f88f05 SHA512 8f0d4bb5ed403c122d392cf98c7a37d9ecd8eb63b7dc190d5349747ff656c5618b42c0b0b64db1c6a51847e80cf007e96f1ce2d295407c32848861aab2bb1103 -AUX sssd-2.9.1-certmap-fix-partial-string-comparison.patch 3182 BLAKE2B 1e4a41d82fcf7654d5f8ec6f1c41e47b28f05faefd3e14cf5861c198d1efbae8b87ec0e3a5a9eef037b7a69ad59b8291e8238a81d18a1fda14afcbd49f06471e SHA512 ed2ba0f0cdc2aea524f73d1aa73ae14a7c535b12e511c29042c23c34a801b004ed19609c351ea587254fa9c18e1ad527fb77cc997b8e7d82704da17c503c87a9 AUX sssd-2.9.1-conditional-python-install.patch 533 BLAKE2B ce076e4e00bd1b3e8a18427fde385b6a65fbbc65f28a542f575d3b77b8e7d277ebc829a7d43fdbced51475b69553de4fd6e564d52d06c6a83edcae7fa8a2a53a SHA512 4348577c16ab96717e0b92dcae00e955e76e9be6c58a6f6c4435f2315c8393336396e7a0ccdd05f50b97233a956ef674fd64589780500159748ac47c65edb623 -AUX sssd-2.9.1-sssct-allow-cert-show-and-cert-eval-rule-as-non-root.patch 2137 BLAKE2B 58207d28ab800ae880aa7df1ac90055a9750bef31dcdef2a1152c0108797f82419aa3d26b6ab645e52449cff507f946e750ed261cf767b7181217dd979160bec SHA512 ca2794f7484b1b845184acbcb68dfa09dc582e0f6bd9a15b6c9929027414eb6a7fac7b77ba83585c12924dc9c70c3875e43dd6a71d4f83bc7aabef2506685f54 AUX sssd.conf 124 BLAKE2B b6f9c016a014510f97b036d23d5f50e1e13085220fe82b0e6ef7a3ceeb114e59af935f39e66e4ad60a46f43983930e5d381b16b0ed31ba4349abe38c4b509367 SHA512 f16908c44b213edbf6b0c6e8d49df92e8c06fc623279037074fe51e49b8aca7dc18f5ed83f71909fc8209df80dfc150583edb1687f88e61588bdf9d1fbf6ed5a DIST sssd-2.9.4.tar.gz 7982544 BLAKE2B 6ed23787f1c029abc89f2bbe516787ddbe2fa39f052b75b965972b0a3532c66076f16b775258c5ee6f4ac9ef63bd6ab5bad1a3b660bcac135b3af460d0f14748 SHA512 9546cf074628f32137b16ca0c763988785271124244b645d1e786762e8578f10d983793a29bffcc004b064452fe8d465476a3041688d2f3c11c2751fb5bec3e2 DIST sssd-2.9.5.tar.gz 8001964 BLAKE2B e9c839e58fbeac9e8cba83b726f075c5db6ce85059546d745672c222b594f4aa26ad103f0eb3a8ff9e2b364c3502fb93c639fe9e621fefd6fecd2319f5cb499a SHA512 d219f12ffc75af233f0e4ffc62c0442acc6da3cd94ed4eab7102a78821af5257c8e4ba0d06b2c99c08e06502f8d0d0bcc80540d63823dbe0f52eb0432ae7e14d diff --git a/sys-auth/sssd/files/sssd-2.9.1-BUILD-Accept-krb5-1.21-for-building-the-PAC-plugin.patch b/sys-auth/sssd/files/sssd-2.9.1-BUILD-Accept-krb5-1.21-for-building-the-PAC-plugin.patch deleted file mode 100644 index c849fe76b446..000000000000 --- a/sys-auth/sssd/files/sssd-2.9.1-BUILD-Accept-krb5-1.21-for-building-the-PAC-plugin.patch +++ /dev/null @@ -1,31 +0,0 @@ -From 74d0f4538deb766592079b1abca0d949d6dea105 Mon Sep 17 00:00:00 2001 -From: Alexey Tikhonov <atikhono@redhat.com> -Date: Thu, 15 Jun 2023 12:05:03 +0200 -Subject: [PATCH 1/1] BUILD: Accept krb5 1.21 for building the PAC plugin -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -Reviewed-by: Alejandro López <allopez@redhat.com> -Reviewed-by: Sumit Bose <sbose@redhat.com> ---- - src/external/pac_responder.m4 | 3 ++- - 1 file changed, 2 insertions(+), 1 deletion(-) - -diff --git a/src/external/pac_responder.m4 b/src/external/pac_responder.m4 -index 3cbe3c9cfba03b59e26a8c5c2d73446eead2acea..90727185b574411bddd928f8d87efdc87076eba4 100644 ---- a/src/external/pac_responder.m4 -+++ b/src/external/pac_responder.m4 -@@ -22,7 +22,8 @@ then - Kerberos\ 5\ release\ 1.17* | \ - Kerberos\ 5\ release\ 1.18* | \ - Kerberos\ 5\ release\ 1.19* | \ -- Kerberos\ 5\ release\ 1.20*) -+ Kerberos\ 5\ release\ 1.20* | \ -+ Kerberos\ 5\ release\ 1.21*) - krb5_version_ok=yes - AC_MSG_RESULT([yes]) - ;; --- -2.41.0 - diff --git a/sys-auth/sssd/files/sssd-2.9.1-certmap-fix-partial-string-comparison.patch b/sys-auth/sssd/files/sssd-2.9.1-certmap-fix-partial-string-comparison.patch deleted file mode 100644 index 258940bab38e..000000000000 --- a/sys-auth/sssd/files/sssd-2.9.1-certmap-fix-partial-string-comparison.patch +++ /dev/null @@ -1,87 +0,0 @@ -From 11afa7a6ef7e15f1e98c7145ad5c80bbdfc520e2 Mon Sep 17 00:00:00 2001 -From: Sumit Bose <sbose@redhat.com> -Date: Tue, 4 Jul 2023 19:06:27 +0200 -Subject: [PATCH 3/3] certmap: fix partial string comparison -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -If the formatting option of the certificate digest/hash function -contained and additional specifier separated with a '_' the comparison -of the provided digest name and the available ones was incomplete, the -last character was ignored and the comparison was successful if even if -there was only a partial match. - -Resolves: https://github.com/SSSD/sssd/issues/6802 - -Reviewed-by: Alejandro López <allopez@redhat.com> -Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> -(cherry picked from commit 0817ca3b366f51510705ab77d7900c0b65b7d2fc) ---- - src/lib/certmap/sss_certmap_ldap_mapping.c | 9 ++++++++- - src/tests/cmocka/test_certmap.c | 22 ++++++++++++++++++++++ - 2 files changed, 30 insertions(+), 1 deletion(-) - -diff --git a/src/lib/certmap/sss_certmap_ldap_mapping.c b/src/lib/certmap/sss_certmap_ldap_mapping.c -index 2f16837a1..354b0310b 100644 ---- a/src/lib/certmap/sss_certmap_ldap_mapping.c -+++ b/src/lib/certmap/sss_certmap_ldap_mapping.c -@@ -228,14 +228,21 @@ int check_digest_conversion(const char *inp, const char **digest_list, - bool colon = false; - bool reverse = false; - char *c; -+ size_t len = 0; - - sep = strchr(inp, '_'); -+ if (sep != NULL) { -+ len = sep - inp; -+ } - - for (d = 0; digest_list[d] != NULL; d++) { - if (sep == NULL) { - cmp = strcasecmp(digest_list[d], inp); - } else { -- cmp = strncasecmp(digest_list[d], inp, (sep - inp -1)); -+ if (strlen(digest_list[d]) != len) { -+ continue; -+ } -+ cmp = strncasecmp(digest_list[d], inp, len); - } - - if (cmp == 0) { -diff --git a/src/tests/cmocka/test_certmap.c b/src/tests/cmocka/test_certmap.c -index da312beaf..a15984d60 100644 ---- a/src/tests/cmocka/test_certmap.c -+++ b/src/tests/cmocka/test_certmap.c -@@ -2183,6 +2183,28 @@ static void test_sss_certmap_ldapu1_cert(void **state) - assert_non_null(ctx); - assert_null(ctx->prio_list); - -+ /* cert!sha */ -+ ret = sss_certmap_add_rule(ctx, 91, -+ "KRB5:<ISSUER>.*", -+ "LDAP:rule91={cert!sha}", NULL); -+ assert_int_equal(ret, EINVAL); -+ -+ ret = sss_certmap_add_rule(ctx, 91, -+ "KRB5:<ISSUER>.*", -+ "LDAPU1:rule91={cert!sha}", NULL); -+ assert_int_equal(ret, EINVAL); -+ -+ /* cert!sha_u */ -+ ret = sss_certmap_add_rule(ctx, 90, -+ "KRB5:<ISSUER>.*", -+ "LDAP:rule90={cert!sha_u}", NULL); -+ assert_int_equal(ret, EINVAL); -+ -+ ret = sss_certmap_add_rule(ctx, 99, -+ "KRB5:<ISSUER>.*", -+ "LDAPU1:rule90={cert!sha_u}", NULL); -+ assert_int_equal(ret, EINVAL); -+ - /* cert!sha555 */ - ret = sss_certmap_add_rule(ctx, 89, - "KRB5:<ISSUER>.*", --- -2.38.1 - diff --git a/sys-auth/sssd/files/sssd-2.9.1-sssct-allow-cert-show-and-cert-eval-rule-as-non-root.patch b/sys-auth/sssd/files/sssd-2.9.1-sssct-allow-cert-show-and-cert-eval-rule-as-non-root.patch deleted file mode 100644 index 3a724363382b..000000000000 --- a/sys-auth/sssd/files/sssd-2.9.1-sssct-allow-cert-show-and-cert-eval-rule-as-non-root.patch +++ /dev/null @@ -1,39 +0,0 @@ -From 15d7d34b20219e2fd45c43881088f5d542e9603e Mon Sep 17 00:00:00 2001 -From: Sumit Bose <sbose@redhat.com> -Date: Tue, 4 Jul 2023 18:56:35 +0200 -Subject: [PATCH 2/3] sssct: allow cert-show and cert-eval-rule as non-root -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -The cert-show and cert-eval-rule sub-commands do not need root access and -do not require SSSD to be configured on the host. - -Resolves: https://github.com/SSSD/sssd/issues/6802 - -Reviewed-by: Alejandro López <allopez@redhat.com> -Reviewed-by: Alexey Tikhonov <atikhono@redhat.com> -(cherry picked from commit 8466f0e4d0c6cd2b98d2789970847b9adc01d7d4) ---- - src/tools/sssctl/sssctl.c | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/src/tools/sssctl/sssctl.c b/src/tools/sssctl/sssctl.c -index 855260aed..04c41aa9a 100644 ---- a/src/tools/sssctl/sssctl.c -+++ b/src/tools/sssctl/sssctl.c -@@ -340,9 +340,9 @@ int main(int argc, const char **argv) - SSS_TOOL_COMMAND_FLAGS("config-check", "Perform static analysis of SSSD configuration", 0, sssctl_config_check, SSS_TOOL_FLAG_SKIP_CMD_INIT), - #endif - SSS_TOOL_DELIMITER("Certificate related tools:"), -- SSS_TOOL_COMMAND("cert-show", "Print information about the certificate", 0, sssctl_cert_show), -+ SSS_TOOL_COMMAND_FLAGS("cert-show", "Print information about the certificate", 0, sssctl_cert_show, SSS_TOOL_FLAG_SKIP_CMD_INIT|SSS_TOOL_FLAG_SKIP_ROOT_CHECK), - SSS_TOOL_COMMAND("cert-map", "Show users mapped to the certificate", 0, sssctl_cert_map), -- SSS_TOOL_COMMAND("cert-eval-rule", "Check mapping and matching rule with a certificate", 0, sssctl_cert_eval_rule), -+ SSS_TOOL_COMMAND_FLAGS("cert-eval-rule", "Check mapping and matching rule with a certificate", 0, sssctl_cert_eval_rule, SSS_TOOL_FLAG_SKIP_CMD_INIT|SSS_TOOL_FLAG_SKIP_ROOT_CHECK), - #ifdef BUILD_PASSKEY - SSS_TOOL_DELIMITER("Passkey related tools:"), - SSS_TOOL_COMMAND_FLAGS("passkey-register", "Perform passkey registration", 0, sssctl_passkey_register, SSS_TOOL_FLAG_SKIP_CMD_INIT|SSS_TOOL_FLAG_SKIP_ROOT_CHECK), --- -2.38.1 - |