Resolves: rhbz#1952922 - Rebase SSSD for RHEL 9-Beta
Resolves: rhbz#1938876 - review of important potential issues detected by static analyzers in sssd-2.4.1-1.el9 Resolves: rhbz#1942277 - Wrong default debug level of sssd tools
This commit is contained in:
parent
8420c052fa
commit
7f0c855c8f
1
.gitignore
vendored
1
.gitignore
vendored
@ -91,3 +91,4 @@ sssd-1.2.91.tar.gz
|
|||||||
/sssd-2.4.0.tar.gz
|
/sssd-2.4.0.tar.gz
|
||||||
/sssd-2.4.1.tar.gz
|
/sssd-2.4.1.tar.gz
|
||||||
/sssd-2.4.2.tar.gz
|
/sssd-2.4.2.tar.gz
|
||||||
|
/sssd-2.5.1.tar.gz
|
||||||
|
@ -1,23 +0,0 @@
|
|||||||
From 2a512fdf57055a2ce4ae02256dfabb5b74d2abd6 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Alexey Tikhonov <atikhono@redhat.com>
|
|
||||||
Date: Mon, 22 Mar 2021 15:18:57 +0100
|
|
||||||
Subject: [PATCH] systemd configs: add CAP_DAC_OVERRIDE for ifp in certain case
|
|
||||||
|
|
||||||
Commit fd7ce7b3de9647eb6de75c3dd3974b44d860078e missed ifp.
|
|
||||||
|
|
||||||
Reviewed-by: Sumit Bose <sbose@redhat.com>
|
|
||||||
---
|
|
||||||
src/sysv/systemd/sssd-ifp.service.in | 2 +-
|
|
||||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/sysv/systemd/sssd-ifp.service.in b/src/sysv/systemd/sssd-ifp.service.in
|
|
||||||
index 551c6711cf..9095da3534 100644
|
|
||||||
--- a/src/sysv/systemd/sssd-ifp.service.in
|
|
||||||
+++ b/src/sysv/systemd/sssd-ifp.service.in
|
|
||||||
@@ -10,5 +10,5 @@ EnvironmentFile=-@environment_file@
|
|
||||||
Type=dbus
|
|
||||||
BusName=org.freedesktop.sssd.infopipe
|
|
||||||
ExecStart=@ifp_exec_cmd@ ${DEBUG_LOGGER}
|
|
||||||
-CapabilityBoundingSet=CAP_IPC_LOCK CAP_CHOWN CAP_DAC_READ_SEARCH CAP_FOWNER CAP_SETGID CAP_SETUID
|
|
||||||
+CapabilityBoundingSet= @additional_caps@ CAP_IPC_LOCK CAP_CHOWN CAP_DAC_READ_SEARCH CAP_FOWNER CAP_SETGID CAP_SETUID
|
|
||||||
@ifp_restart@
|
|
2
sources
2
sources
@ -1 +1 @@
|
|||||||
SHA512 (sssd-2.4.2.tar.gz) = 871435cd82db38eef36988bae84a6d28220839ee16b600c3dab17523c18b295e65ff62e86c095ea67e652be661248b45720a5106e01179190ff3852b1c0e7a33
|
SHA512 (sssd-2.5.1.tar.gz) = 7441df3b5f1cc1eadb0c6853b048d780ecb36761876aaeb26b9a2d87729211d3ceeae01085dc3ec4fd1c5328f951c8abe854b1d01d91fae25466f930fe16e44a
|
||||||
|
11
sssd.spec
11
sssd.spec
@ -26,8 +26,8 @@
|
|||||||
%global samba_package_version %(rpm -q samba-devel --queryformat %{version}-%{release})
|
%global samba_package_version %(rpm -q samba-devel --queryformat %{version}-%{release})
|
||||||
|
|
||||||
Name: sssd
|
Name: sssd
|
||||||
Version: 2.4.2
|
Version: 2.5.1
|
||||||
Release: 6%{?dist}
|
Release: 1%{?dist}
|
||||||
Summary: System Security Services Daemon
|
Summary: System Security Services Daemon
|
||||||
License: GPLv3+
|
License: GPLv3+
|
||||||
URL: https://github.com/SSSD/sssd/
|
URL: https://github.com/SSSD/sssd/
|
||||||
@ -35,8 +35,6 @@ Source0: https://github.com/SSSD/sssd/releases/download/2.4.2/sssd-2.4.2.tar.gz
|
|||||||
|
|
||||||
### Patches ###
|
### Patches ###
|
||||||
|
|
||||||
Patch0001: 0001-systemd-configs-add-CAP_DAC_OVERRIDE-for-ifp-in-certain-case.patch
|
|
||||||
|
|
||||||
### Dependencies ###
|
### Dependencies ###
|
||||||
|
|
||||||
Requires: sssd-ad = %{version}-%{release}
|
Requires: sssd-ad = %{version}-%{release}
|
||||||
@ -1015,6 +1013,11 @@ fi
|
|||||||
%systemd_postun_with_restart sssd.service
|
%systemd_postun_with_restart sssd.service
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jun 14 2021 Alexey Tikhonov <atikhono@redhat.com> - 2.5.1-1
|
||||||
|
- Resolves: rhbz#1952922 - Rebase SSSD for RHEL 9-Beta
|
||||||
|
- Resolves: rhbz#1938876 - review of important potential issues detected by static analyzers in sssd-2.4.1-1.el9
|
||||||
|
- Resolves: rhbz#1942277 - Wrong default debug level of sssd tools
|
||||||
|
|
||||||
* Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 2.4.2-4
|
* Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 2.4.2-4
|
||||||
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
|
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user