Ryan Tandy [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
Merge openldap (2.5.12+dfsg-2) import into refs/heads/workingbranch
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Ryan Tandy [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
openldap (2.5.12+dfsg-2) unstable; urgency=medium
* Stop slapd explicitly in prerm as a workaround for #
1006147, which caused
dpkg-reconfigure to not restart the service, so the new configuration was
not applied. See also #994204. (Closes: #
1010971)
[dgit import unpatched openldap 2.5.12+dfsg-2]
Ryan Tandy [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
Import openldap_2.5.12+dfsg-2.debian.tar.xz
[dgit import tarball openldap 2.5.12+dfsg-2 openldap_2.5.12+dfsg-2.debian.tar.xz]
Ryan Tandy [Thu, 5 May 2022 01:00:16 +0000 (02:00 +0100)]
Import openldap_2.5.12+dfsg.orig.tar.gz
[dgit import orig openldap_2.5.12+dfsg.orig.tar.gz]
Ryan Tandy [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
Merge openldap (2.5.11+dfsg-1) import into refs/heads/workingbranch
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Ryan Tandy [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
openldap (2.5.11+dfsg-1) unstable; urgency=medium
* Upload to unstable.
[dgit import unpatched openldap 2.5.11+dfsg-1]
Ryan Tandy [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
Import openldap_2.5.11+dfsg-1.debian.tar.xz
[dgit import tarball openldap 2.5.11+dfsg-1 openldap_2.5.11+dfsg-1.debian.tar.xz]
Ryan Tandy [Mon, 24 Jan 2022 01:16:05 +0000 (01:16 +0000)]
Import openldap_2.5.11+dfsg.orig.tar.gz
[dgit import orig openldap_2.5.11+dfsg.orig.tar.gz]
Ryan Tandy [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
Merge openldap (2.4.59+dfsg-1) import into refs/heads/workingbranch
Quanah Gibson-Mount [Thu, 9 Apr 2020 23:38:01 +0000 (23:38 +0000)]
[PATCH] ITS#9177 - Finish updating migration to latest autoconf and related build tools
Gbp-Pq: Name ITS-9177-Finish-updating-migration-to-latest-autocon.patch
Ondřej Kuzník [Wed, 24 May 2017 15:12:48 +0000 (16:12 +0100)]
[PATCH] Fix warnings issued by autoconf 2.68+
Gbp-Pq: Name Fix-warnings-issued-by-autoconf-2.68.patch
Ryan Tandy [Sun, 22 Sep 2019 03:08:30 +0000 (03:08 +0000)]
[PATCH] ITS#9086 Add debug logging for more GnuTLS errors
Gbp-Pq: Name ITS-9086-Add-debug-logging-for-more-GnuTLS-errors.patch
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
ITS6035-olcauthzregex-needs-restart
Gbp-Pq: Name ITS6035-olcauthzregex-needs-restart.patch
Steve Langasek [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
don't second-guess BDB ABI
Bug-Debian: http://bugs.debian.org/651333
Forwarded: not-needed
OpenLDAP upstream conservatively assumes that any change to the version
number of libdb can result in an API-breaking change that could impact
the database. In Debian, we know that such changes require bumping the
library soname and changing the package name, and demand such rigor from
our package maintainers even when upstreams don't deliver; so any such
check in the source code works against the packaging system by forcing
database upgrades when we know none are required. Disable this check
so we rely on the packaging system to do its job.
Gbp-Pq: Name no-bdb-ABI-second-guessing
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
lastbind-makefile-manpage
Gbp-Pq: Name lastbind-makefile-manpage
Peter Marschall [Sun, 26 Jul 2015 13:04:26 +0000 (15:04 +0200)]
[PATCH] contrib/smbk5pwd: add man page, install it too
Add a manual page slapo-smbk5pwd.5 and update smbk5pwd's Makefile to
install the new manual page.
This patch is derived from the corresponding patch upstreamed in ITS#8205
Gbp-Pq: Name smbk5pwd-makefile-manpage
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
libldap-symbol-versions
Add symbol versioning to the public LDAP libraries. This is required for
library transitions, such as the current transition from 2.1 to 2.4,
since programs will sometimes have both libraries loaded by different
dependency chains during the transition.
Not yet contributed upstream.
Upstream ITS #5365 filed requesting symbol versioning for libldap and
libber.
Gbp-Pq: Name libldap-symbol-versions
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
evolution-ntlm
Patch from evolution-exchange (2.10.3). The ldap_ntlm_bind function is
actually called by evolution-data-server, checked at version 1.12.2.
Without this patch, the Exchange addressbook integration uses simple binds
with cleartext passwords.
Russ checked with openldap-software for upstream's opinion on this patch
on 2007-12-21. Upstream had never received it as a patch submission and
given that it's apparently only for older Exchange servers that can't do
SASL and DIGEST-MD5, it's not very appealing.
Bug#457374 filed against evolution-data-server asking if this support is
still required on 2007-12-21.
Gbp-Pq: Name evolution-ntlm
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Ryan Tandy [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
openldap (2.4.59+dfsg-1) unstable; urgency=medium
* New upstream release.
* Fix FTBFS with autoconf 2.71 (Closes: #993032):
- Backport upstream changes to support Autoconf 2.69 instead of simply
disabling automake in debian/rules. Fixes FTBFS due to autoreconf
thinking files required by Automake are missing, even though Automake is
not actually used.
- Stop running autoreconf in contrib/ldapc++ since we don't build it.
- Drop custom config.{guess,sub} handling. dh_update_autotools_config does
the right thing for us.
* Update Standards-Version to 4.6.0; no changes required.
* Add a superficial autopkgtest for smbk5pwd.
* Stop disabling test060-mt-hot on ppc64el. The underlying kernel bug
(#866122) is fixed in all relevant suites by now.
[dgit import unpatched openldap 2.4.59+dfsg-1]
Ryan Tandy [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
Import openldap_2.4.59+dfsg.orig.tar.gz
[dgit import orig openldap_2.4.59+dfsg.orig.tar.gz]
Ryan Tandy [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
Import openldap_2.4.59+dfsg-1.debian.tar.xz
[dgit import tarball openldap 2.4.59+dfsg-1 openldap_2.4.59+dfsg-1.debian.tar.xz]
Ryan Tandy [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
Merge openldap (2.4.57+dfsg-3) import into refs/heads/workingbranch
Howard Chu [Sat, 6 Feb 2021 20:52:06 +0000 (20:52 +0000)]
[PATCH] ITS#9454 fix issuerAndThisUpdateCheck
Gbp-Pq: Name ITS-9454-fix-issuerAndThisUpdateCheck.patch
Ryan Tandy [Sun, 22 Sep 2019 03:08:30 +0000 (03:08 +0000)]
[PATCH] ITS#9086 Add debug logging for more GnuTLS errors
Gbp-Pq: Name ITS-9086-Add-debug-logging-for-more-GnuTLS-errors.patch
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
ITS6035-olcauthzregex-needs-restart
Gbp-Pq: Name ITS6035-olcauthzregex-needs-restart.patch
Steve Langasek [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
don't second-guess BDB ABI
Bug-Debian: http://bugs.debian.org/651333
Forwarded: not-needed
OpenLDAP upstream conservatively assumes that any change to the version
number of libdb can result in an API-breaking change that could impact
the database. In Debian, we know that such changes require bumping the
library soname and changing the package name, and demand such rigor from
our package maintainers even when upstreams don't deliver; so any such
check in the source code works against the packaging system by forcing
database upgrades when we know none are required. Disable this check
so we rely on the packaging system to do its job.
Gbp-Pq: Name no-bdb-ABI-second-guessing
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
lastbind-makefile-manpage
Gbp-Pq: Name lastbind-makefile-manpage
Peter Marschall [Sun, 26 Jul 2015 13:04:26 +0000 (15:04 +0200)]
[PATCH] contrib/smbk5pwd: add man page, install it too
Add a manual page slapo-smbk5pwd.5 and update smbk5pwd's Makefile to
install the new manual page.
This patch is derived from the corresponding patch upstreamed in ITS#8205
Gbp-Pq: Name smbk5pwd-makefile-manpage
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
libldap-symbol-versions
Add symbol versioning to the public LDAP libraries. This is required for
library transitions, such as the current transition from 2.1 to 2.4,
since programs will sometimes have both libraries loaded by different
dependency chains during the transition.
Not yet contributed upstream.
Upstream ITS #5365 filed requesting symbol versioning for libldap and
libber.
Gbp-Pq: Name libldap-symbol-versions
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
evolution-ntlm
Patch from evolution-exchange (2.10.3). The ldap_ntlm_bind function is
actually called by evolution-data-server, checked at version 1.12.2.
Without this patch, the Exchange addressbook integration uses simple binds
with cleartext passwords.
Russ checked with openldap-software for upstream's opinion on this patch
on 2007-12-21. Upstream had never received it as a patch submission and
given that it's apparently only for older Exchange servers that can't do
SASL and DIGEST-MD5, it's not very appealing.
Bug#457374 filed against evolution-data-server asking if this support is
still required on 2007-12-21.
Gbp-Pq: Name evolution-ntlm
Debian OpenLDAP Maintainers [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Ryan Tandy [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
openldap (2.4.57+dfsg-3) unstable; urgency=medium
* Link smbk5pwd with -lkrb5. (Closes: #988565)
[dgit import unpatched openldap 2.4.57+dfsg-3]
Ryan Tandy [Sat, 15 May 2021 23:03:34 +0000 (00:03 +0100)]
Import openldap_2.4.57+dfsg-3.debian.tar.xz
[dgit import tarball openldap 2.4.57+dfsg-3 openldap_2.4.57+dfsg-3.debian.tar.xz]
Ryan Tandy [Sun, 14 Feb 2021 17:26:41 +0000 (17:26 +0000)]
Merge openldap (2.4.57+dfsg-2) import into refs/heads/workingbranch
Howard Chu [Sat, 6 Feb 2021 20:52:06 +0000 (20:52 +0000)]
[PATCH] ITS#9454 fix issuerAndThisUpdateCheck
Gbp-Pq: Name ITS-9454-fix-issuerAndThisUpdateCheck.patch
Ryan Tandy [Sun, 22 Sep 2019 03:08:30 +0000 (03:08 +0000)]
[PATCH] ITS#9086 Add debug logging for more GnuTLS errors
Gbp-Pq: Name ITS-9086-Add-debug-logging-for-more-GnuTLS-errors.patch
Debian OpenLDAP Maintainers [Sun, 14 Feb 2021 17:26:41 +0000 (17:26 +0000)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Debian OpenLDAP Maintainers [Sun, 14 Feb 2021 17:26:41 +0000 (17:26 +0000)]
ITS6035-olcauthzregex-needs-restart
Gbp-Pq: Name ITS6035-olcauthzregex-needs-restart.patch
Steve Langasek [Sun, 14 Feb 2021 17:26:41 +0000 (17:26 +0000)]
don't second-guess BDB ABI
Bug-Debian: http://bugs.debian.org/651333
Forwarded: not-needed
OpenLDAP upstream conservatively assumes that any change to the version
number of libdb can result in an API-breaking change that could impact
the database. In Debian, we know that such changes require bumping the
library soname and changing the package name, and demand such rigor from
our package maintainers even when upstreams don't deliver; so any such
check in the source code works against the packaging system by forcing
database upgrades when we know none are required. Disable this check
so we rely on the packaging system to do its job.
Gbp-Pq: Name no-bdb-ABI-second-guessing
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Sun, 14 Feb 2021 17:26:41 +0000 (17:26 +0000)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk