Hello community,

here is the log from the commit of package sssd for openSUSE:Factory checked in 
at 2017-01-31 12:35:14
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sssd (Old)
 and      /work/SRC/openSUSE:Factory/.sssd.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sssd"

Changes:
--------
--- /work/SRC/openSUSE:Factory/sssd/sssd.changes        2016-12-16 
11:52:53.272081914 +0100
+++ /work/SRC/openSUSE:Factory/.sssd.new/sssd.changes   2017-02-03 
20:02:25.896960014 +0100
@@ -1,0 +2,34 @@
+Wed Jan 25 19:25:09 UTC 2017 - [email protected]
+
+- Removed 0001-krb5-1.15-build-fix.patch obsoleted by upstream update
+- Update to new upstream release 1.15.0
+  * SSSD now allows the responders to be activated by the systemd service
+    manager and exit when idle. This means the services line in sssd.conf is
+    optional and the responders can be started on-demand, simplifying the sssd
+    configuration. Please note that this change is backwards-compatible and
+    the responders listed explicitly in sssd.conf's services line are managed
+    by sssd in the same manner as in previous releases. Please refer to man
+    sssd.conf(5) for more information
+  * The sudo provider is no longer disabled for configurations that do not
+    explicitly include the sudo responder in the services list. In order to
+    disable the sudo-related back end code that executes the periodic LDAP
+    queries, set the sudo_provider to none explicitly
+  * The watchdog signal handler no longer uses signal-unsafe functions. This
+    bug was causing a deadlock in case the watchdog was about to kill a
+    stuck process
+  * A bug that prevented TLS to be set up correctly on systems where libldap
+    links with GnuTLS was fixed
+  * The functionality to alter SSSD configuration through the D-Bus interface
+    provided by the IFP responder was removed. This functionality was not used 
to
+    the best of our knowledge, had no tests and prevented the InfoPipe 
responder
+    from running as a non-privileged user.
+  * A bug that prevented statically-linked applications from using libnss_sss
+    was fixed by removing dependency on -lpthreads from the libnss_sss library
+    (please see https://sourceware.org/bugzilla/show_bug.cgi?id=20500 for
+    an example on why linking with -lpthread from an NSS modules is 
problematic)
+  * Previously, SSSD did not ignore GPOs that were missing the
+    gPCFunctionalityVersion attribute and failed the whole GPO
+    processing. Starting with this version, the GPOs without the
+    gPCFunctionalityVersion are skipped.
+
+-------------------------------------------------------------------

Old:
----
  0001-krb5-1.15-build-fix.patch
  sssd-1.14.2.tar.gz
  sssd-1.14.2.tar.gz.asc

New:
----
  sssd-1.15.0.tar.gz
  sssd-1.15.0.tar.gz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sssd.spec ++++++
--- /var/tmp/diff_new_pack.Uby7md/_old  2017-02-03 20:02:26.688848552 +0100
+++ /var/tmp/diff_new_pack.Uby7md/_new  2017-02-03 20:02:26.692847989 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           sssd
-Version:        1.14.2
+Version:        1.15.0
 Release:        0
 Summary:        System Security Services Daemon
 License:        GPL-3.0+ and LGPL-3.0+
@@ -32,9 +32,6 @@
 Source5:        %name.keyring
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 
-# see https://build.opensuse.org/request/show/443977
-Patch1:         0001-krb5-1.15-build-fix.patch
-
 %define servicename    sssd
 %define sssdstatedir   %_localstatedir/lib/sss
 %define dbpath         %sssdstatedir/db
@@ -381,7 +378,6 @@
 
 %prep
 %setup -q
-%patch -P 1 -p1
 
 %build
 %if 0%{?suse_version} < 1210
@@ -571,7 +567,6 @@
 %dir %_libexecdir/sssd/
 %_libexecdir/sssd/sssd_ifp
 %dir %_libdir/sssd/
-%_libdir/sssd/libsss_config.so
 %_mandir/man5/sssd-ifp.5*
 %dir %_mandir/??/
 %dir %_mandir/??/man5/

++++++ sssd-1.14.2.tar.gz -> sssd-1.15.0.tar.gz ++++++
++++ 196074 lines of diff (skipped)


Reply via email to