Big win for many: Local files and fallback... I've socialized. Thank you! 

Regards, 

David Sirrine
Principal Technical Account Manager, Public Sector
Strategic Customer Engagement
804-343-6037 (Office)
804-212-7510 (Cell)

On Mon, Mar 6, 2017 at 2:13 PM, Ellen Newlands <enewland@redhat.com> wrote:
Congratulations!  Very solid work here.

On Sat, Mar 4, 2017 at 1:50 PM, Jakub Hrozek <jhrozek@redhat.com> wrote:
SSSD 1.15.1
===========

The SSSD team is proud to announce the release of version 1.15.1 of the
System Security Services Daemon.

This is the first release that is available from SSSD's new home
at https://pagure.io/SSSD/sssd The tarball can be downloaded from
https://releases.pagure.org/SSSD/sssd/
RPM packages will be made available for Fedora shortly.

Feedback
--------
Please provide comments, bugs and other feedback via the sssd-devel or
sssd-users mailing lists:
    https://lists.fedorahosted.org/mailman/listinfo/sssd-devel
    https://lists.fedorahosted.org/mailman/listinfo/sssd-users

Highlights
----------
 * Several issues related to starting the SSSD services on-demand via
   socket activation were fixed. In particular, it is no longer possible
   to have a service started both by sssd and socket-activated. Another
   bug which might have caused the responder to start before SSSD started
   and cause issues especially on system startup was fixed.
 * A new 'files' provider was added. This provider mirrors the contents
   of '/etc/passwd' and '/etc/shadow' into the SSSD database. The purpose
   of this new provider is to make it possible to use SSSD's interfaces,
   such as the D-Bus interface for local users and enable leveraging the
   in-memory fast cache for local users as well, as a replacement for `nscd`.
   In future, we intend to extend the D-Bus interface to also provide setting
   and retrieving additional custom attributes for the files users.
 * SSSD now autogenerates a fallback configuration that enables the
   files domain if no SSSD configuration exists. This allows distributions
   to enable the 'sssd' service when the SSSD package is installed. Please
   note that SSSD must be build with the configuration option
   '--enable-files-domain' for this functionality to be enabled.
 * Support for public-key authentication with Kerberos (PKINIT) was
   added. This support will enable users who authenticate with a Smart Card
   to obtain a Kerberos ticket during authentication.

Packaging Changes
-----------------
 * The new files provider comes as a new shared library 'libsss_files.so'
   and a new manual page
 * A new helper binary called 'sssd_check_socket_activated_responders'
   was added. This binary is used in the 'ExecStartPre' directive to check
   if the service that corresponds to socket about to be started was also
   started explicitly and abort the socket startup if it was.

Documentation Changes
---------------------
 * A new PAM module option 'prompt_always' was added. This option is
   related to fixing https://pagure.io/SSSD/sssd/issue/2984 which
   changed the behaviour of the PAM module so that 'pam_sss' always
   uses an auth token that was on stack. The new 'prompt_always' option
   makes it possible to restore the previous behaviour.

Tickets Fixed
-------------
 * https://pagure.io/SSSD/sssd/issue/3112 - When sssd.conf is missing, create one with id_provider=files
 * https://pagure.io/SSSD/sssd/issue/3220 - Improve successful Dynamic DNS update log messages
 * https://pagure.io/SSSD/sssd/issue/3227 - sssd doesn't update PTR records if A/PTR zones are configured as non-secure and secure
 * https://pagure.io/SSSD/sssd/issue/3230 - Use the same logic for matching GC results in initgroups and user lookups
 * https://pagure.io/SSSD/sssd/issue/3260 - handle default_domain_suffix for ssh requests with default_domain_suffix
 * https://pagure.io/SSSD/sssd/issue/3262 - Implement a files provider to mirror the contents of /etc/passwd and /etc/groups
 * https://pagure.io/SSSD/sssd/issue/3270 - [RFE] Add PKINIT support to SSSD Kerberos proivder
 * https://pagure.io/SSSD/sssd/issue/3298 - Socket activation of SSSD doesn't work and leads to chaos
 * https://pagure.io/SSSD/sssd/issue/3299 - SSSD does not start if using only the local provider and services line is empty
 * https://pagure.io/SSSD/sssd/issue/3300 - Avoid running two instances of the same service
 * https://pagure.io/SSSD/sssd/issue/3309 - Coverity warns about an unused value in IPA sudo code
 * https://pagure.io/SSSD/sssd/issue/3313 - cache_req should use an negative cache entry for UPN based lookups
 * https://pagure.io/SSSD/sssd/issue/2984 - Don't prompt for password if there is already one on the stack
 * https://pagure.io/SSSD/sssd/issue/1126 - Reuse cache_req() in responder code

Detailed Changelog
------------------
 * Fabiano Fidêncio (11):

   * IFP: Update ifp_iface_generated.c
   * MONITOR: Wrap up sending sd_notify "ready" into a new function
   * MONITOR: Don't timeout if using local provider + socket-activated responders
   * MONITOR: Don't return an error in case we fail to register a service
   * SYSTEMD: Add "After=sssd.service" to the responders' sockets units
   * SYSTEMD: Avoid starting a responder socket in case SSSD is not started
   * SYSTEMD: Don't mix up responders' socket and monitor activation
   * SYSTEMD: Force responders to refuse manual start
   * CACHE_REQ: Add cache_req_data_set_bypass_cache()
   * PAM: Use cache_req to perform initgroups lookups
   * TESTS: Adapt pam-srv-tests to deal with cache_req related changes

 * Jakub Hrozek (42):

   * Updating the version to track the 1.15.1 release
   * AD: Use ad_domain to match forest root domain, not the configured domain from sssd.conf
   * SUDO: Only store lowercased attribute value once
   * NEGCACHE: Add API to reset all users and groups
   * NSS: Add sbus interface to clear memory cache
   * UTIL: Add a new domain state called DOM_INCONSISTENT
   * RESPONDER: Add a responder sbus interface to set domain state
   * RESPONDER: A sbus interface to reset negatively cached users and groups
   * DP: Add internal DP interface to set domain state
   * DP: Add internal interface to reset negative cache from DP
   * DP: Add internal interface to invalidate memory cache from DP
   * RESPONDER: Use the NEED_CHECK_DOMAIN macro
   * RESPONDER: Include the files provider in NEEDS_CHECK_PROVIDER
   * RESPONDER: Contact inconsistent domains
   * UTIL: Add a generic inotify module
   * CONFDB: Re-enable the files provider
   * FILES: Add the files provider
   * CONFDB: Make pwfield configurable per-domain
   * CONFDB: The files domain defaults to "x" as pwfield
   * MAN: Document the pwfield configuration option
   * TESTS: move helper fixtures to back up and restore a file to a utility module
   * TESTS: add a helper module with shared NSS constants
   * TESTS: Add a module to call nss_sss's getpw* from tests
   * TESTS: Add a module to call nss_sss's getgr* from tests
   * TESTS: Add files provider integration tests
   * MONITOR: Remove checks for sssd.conf changes
   * MONITOR: Use the common inotify code to watch resolv.conf
   * MAN: Add documentation for the files provider
   * EXAMPLES: Do not point to id_provider=local
   * SBUS: Document how to free the result of sbus_create_message
   * FILES: Fix reallocation logic
   * TESTS: Remove unused import
   * DOC: Deprecate README, add README.md
   * MONITOR: Enable an implicit files domain if one is not configured
   * TESTS: Enable the files domain for all integration tests
   * TESTS: Test the files domain autoconfiguration
   * CONFDB: Refactor reading the config file
   * CONFDB: If no configuration file is provided, create a fallback configuration
   * UTIL: Store UPN suffixes when creating a new subdomain
   * SYSDB: When searching for UPNs, search either the whole DB or only the given domain
   * CACHE_REQ: Only search the given domain when looking up entries by UPN
   * Updating translations for the 1.15.1 release

 * Justin Stephenson (5):

   * FAILOVER: Improve port status log messages
   * SUDO: Add skip_entry boolean to sudo conversions
   * TESTS: Add to IPA DN test
   * DYNDNS: Update PTR record after non-fatal error
   * DYNDNS: Correct debug log message of realm

 * Lukas Slebodnik (13):

   * BUILD: Fix linking of test_wbc_calls
   * Suppres implicit-fallthrough from gcc 7
   * pam_sss: Suppress warning format-truncation
   * TOOLS: Fix warning format-truncation
   * sssctl: Fix warning may be used uninitialized
   * ldap_child: Fix use after free
   * SYSTEMD: Update journald drop-in file
   * Partially revert "CONFIG: Use default config when none provided"
   * BUILD: Fix linking of test_sdap_initgr
   * intg: Fix python3 issues
   * FILES: Remove unnecessary check
   * Update link to commit template
   * Use pagure links as a reference to upstream

 * Pavel Březina (17):

   * SBUS: remove unused symbols
   * SBUS: use sss_ptr_hash for opath table
   * SBUS: use sss_ptr_hash for nodes table
   * SBUS: use sss_ptr_hash for signals table
   * ssh: fix number of output certificates
   * ssh: do not create again fq name
   * sss_parse_inp_send: provide default_domain as parameter
   * cache_req: add ability to not use default domain suffix
   * cache_req: search user by name with attrs
   * cache_req: add api to create ldb_result from message
   * cache_req: move dp request to plugin
   * cache_req: add host by name search
   * ssh: rewrite ssh responder to use cache_req
   * ssh: fix typo
   * cache_req: always go to dp first when looking up host
   * NSS: Rename the interface to invalidate memory cache initgroup records for consistency
   * CONFDB: The files provider always enumerates

 * Petr Čech (5):

   * LDAP: Better logging message
   * SYSDB: Removing of sysdb_try_to_find_expected_dn()
   * TEST: create_multidom_test_ctx() extending
   * TESTS: Tests for sdap_search_initgr_user_in_batch
   * IPA_SUDO: Unused value fix

 * Sumit Bose (17):

   * sdap_extend_map: make sure memory can be freed
   * check_duplicate: check name member before using it
   * pam_sss: check conversation callback
   * PAM: store user object in the preq context
   * PAM: fix memory leak in pam_sss
   * PAM: use sentinel error code in PAM tests
   * utils: new error codes
   * LDAP/proxy: tell frontend that Smartcard auth is not supported
   * authtok: enhance support for Smartcard auth blobs
   * PAM: forward Smartcard credentials to backends
   * p11: return name of PKCS#11 module and key id to pam_sss
   * pam: enhance Smartcard authentication token
   * KRB5: allow pkinit pre-authentication
   * authtok: fix tests on big-endian
   * pam: use authtok from PAM stack if available
   * cache_req: use own namespace for UPNs
   * PAM: Improve debugging on smartcard creds forward

_______________________________________________
Freeipa-interest mailing list
Freeipa-interest@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-interest


_______________________________________________
Freeipa-interest mailing list
Freeipa-interest@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-interest