Ryan Tandy [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
Merge openldap (2.5.13+dfsg-3) import into refs/heads/workingbranch
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Ryan Tandy [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
openldap (2.5.13+dfsg-3) unstable; urgency=medium
[ Ryan Tandy ]
* Disable flaky test test063-delta-multiprovider. Mitigates #
1010608.
[ Gioele Barabucci ]
* slapd.scripts-common: Avoid double-UTF8-encoding org name (Closes: #
1016185)
* d/slapd.scripts-common: Remove outdated `migrate_to_slapd_d_style`
* d/slapd.postinst: Remove test for ancient version
* slapd.scripts-common: Remove unused `normalize_ldif`
* d/slapd.scripts-common: Use sed instead of perl in `release_diagnostics`
[dgit import unpatched openldap 2.5.13+dfsg-3]
Ryan Tandy [Sat, 14 Jan 2023 00:29:59 +0000 (00:29 +0000)]
Import openldap_2.5.13+dfsg-3.debian.tar.xz
[dgit import tarball openldap 2.5.13+dfsg-3 openldap_2.5.13+dfsg-3.debian.tar.xz]
Ryan Tandy [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
Merge openldap (2.5.13+dfsg-2) import into refs/heads/workingbranch
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Ryan Tandy [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
openldap (2.5.13+dfsg-2) unstable; urgency=medium
* d/tests/smbk5pwd: Grant slapd access to /var/lib/heimdal-kdc. Fixes the
autopkgtest failure due to heimdal setting mode 700 on this directory.
(Closes: #
1020442)
* d/source/lintian-overrides: Add wildcards to make overrides compatible
with both older and newer versions of lintian.
* d/slapd-contrib.lintian-overrides: Remove unused
custom-library-search-path override now that krb5-config no longer sets
-rpath.
[dgit import unpatched openldap 2.5.13+dfsg-2]
Ryan Tandy [Sat, 24 Sep 2022 19:40:21 +0000 (20:40 +0100)]
Import openldap_2.5.13+dfsg-2.debian.tar.xz
[dgit import tarball openldap 2.5.13+dfsg-2 openldap_2.5.13+dfsg-2.debian.tar.xz]
Sergio Durigan Junior [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
Import openldap_2.5.13+dfsg.orig.tar.xz
[dgit import orig openldap_2.5.13+dfsg.orig.tar.xz]
Sergio Durigan Junior [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
Merge openldap (2.5.13+dfsg-1) import into refs/heads/workingbranch
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Sergio Durigan Junior [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
openldap (2.5.13+dfsg-1) unstable; urgency=medium
* d/rules: Remove get-orig-source, now unnecessary.
* Check PGP signature when running uscan.
* d/watch: Modernize watch file; use repacksuffix.
* d/copyright: Update according to DEP-5.
* d/control: Add myself to Uploaders.
* New upstream release.
[dgit import unpatched openldap 2.5.13+dfsg-1]
Sergio Durigan Junior [Sun, 18 Sep 2022 22:29:46 +0000 (23:29 +0100)]
Import openldap_2.5.13+dfsg-1.debian.tar.xz
[dgit import tarball openldap 2.5.13+dfsg-1 openldap_2.5.13+dfsg-1.debian.tar.xz]
Ryan Tandy [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
Merge openldap (2.5.12+dfsg-2) import into refs/heads/workingbranch
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Ryan Tandy [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
openldap (2.5.12+dfsg-2) unstable; urgency=medium
* Stop slapd explicitly in prerm as a workaround for #
1006147, which caused
dpkg-reconfigure to not restart the service, so the new configuration was
not applied. See also #994204. (Closes: #
1010971)
[dgit import unpatched openldap 2.5.12+dfsg-2]
Ryan Tandy [Mon, 23 May 2022 17:14:53 +0000 (18:14 +0100)]
Import openldap_2.5.12+dfsg-2.debian.tar.xz
[dgit import tarball openldap 2.5.12+dfsg-2 openldap_2.5.12+dfsg-2.debian.tar.xz]
Ryan Tandy [Thu, 5 May 2022 01:00:16 +0000 (02:00 +0100)]
Import openldap_2.5.12+dfsg.orig.tar.gz
[dgit import orig openldap_2.5.12+dfsg.orig.tar.gz]
Ryan Tandy [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
Merge openldap (2.5.11+dfsg-1) import into refs/heads/workingbranch
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Jan-Marek Glogowski [Tue, 18 May 2010 15:47:05 +0000 (17:47 +0200)]
Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load non-trivial Perl extensions that require symbols from back_perl.so itself.
Bug-Debian: http://bugs.debian.org/327585
Gbp-Pq: Name switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
fix-build-top-mk
Gbp-Pq: Name fix-build-top-mk
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
add-tlscacert-option-to-ldap-conf
Gbp-Pq: Name add-tlscacert-option-to-ldap-conf
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
ldap-conf-tls-cacertdir
Gbp-Pq: Name ldap-conf-tls-cacertdir
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
contrib-makefiles
Gbp-Pq: Name contrib-makefiles
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
do-not-second-guess-sonames
Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!
Debian bug #546885
Upstream ITS #6302 filed.
Gbp-Pq: Name do-not-second-guess-sonames
Steve Langasek [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
getaddrinfo-is-threadsafe
OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.
Closes Debian bug #340601.
Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Gbp-Pq: Name getaddrinfo-is-threadsafe
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
sasl-default-path
Add /etc/ldap/sasl2 to the SASL configuration search path.
Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
Gbp-Pq: Name sasl-default-path
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
index-files-created-as-root
Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).
Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.
Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
Gbp-Pq: Name index-files-created-as-root
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
wrong-database-location
Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.
Debian-specific.
Gbp-Pq: Name wrong-database-location
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
ldapi-socket-place
Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.
Debian-specific.
Gbp-Pq: Name ldapi-socket-place
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
slapi-errorlog-file
The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.
Debian-specific.
Gbp-Pq: Name slapi-errorlog-file
Debian OpenLDAP Maintainers [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
man-slapd
Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.
Debian-specific.
Gbp-Pq: Name man-slapd
Ryan Tandy [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
Replace upstream version with Debian version in version strings
Forwarded: not-needed
Gbp-Pq: Name debian-version
Ryan Tandy [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
openldap (2.5.11+dfsg-1) unstable; urgency=medium
* Upload to unstable.
[dgit import unpatched openldap 2.5.11+dfsg-1]
Ryan Tandy [Sat, 12 Mar 2022 03:38:02 +0000 (03:38 +0000)]
Import openldap_2.5.11+dfsg-1.debian.tar.xz
[dgit import tarball openldap 2.5.11+dfsg-1 openldap_2.5.11+dfsg-1.debian.tar.xz]
Ryan Tandy [Mon, 24 Jan 2022 01:16:05 +0000 (01:16 +0000)]
Import openldap_2.5.11+dfsg.orig.tar.gz
[dgit import orig openldap_2.5.11+dfsg.orig.tar.gz]
Ryan Tandy [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
Merge openldap (2.4.59+dfsg-1) import into refs/heads/workingbranch
Quanah Gibson-Mount [Thu, 9 Apr 2020 23:38:01 +0000 (23:38 +0000)]
[PATCH] ITS#9177 - Finish updating migration to latest autoconf and related build tools
Gbp-Pq: Name ITS-9177-Finish-updating-migration-to-latest-autocon.patch
Ondřej Kuzník [Wed, 24 May 2017 15:12:48 +0000 (16:12 +0100)]
[PATCH] Fix warnings issued by autoconf 2.68+
Gbp-Pq: Name Fix-warnings-issued-by-autoconf-2.68.patch
Ryan Tandy [Sun, 22 Sep 2019 03:08:30 +0000 (03:08 +0000)]
[PATCH] ITS#9086 Add debug logging for more GnuTLS errors
Gbp-Pq: Name ITS-9086-Add-debug-logging-for-more-GnuTLS-errors.patch
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
set-maintainer-name
Gbp-Pq: Name set-maintainer-name
Debian OpenLDAP Maintainers [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
ITS6035-olcauthzregex-needs-restart
Gbp-Pq: Name ITS6035-olcauthzregex-needs-restart.patch
Steve Langasek [Fri, 27 Aug 2021 16:42:31 +0000 (17:42 +0100)]
don't second-guess BDB ABI
Bug-Debian: http://bugs.debian.org/651333
Forwarded: not-needed
OpenLDAP upstream conservatively assumes that any change to the version
number of libdb can result in an API-breaking change that could impact
the database. In Debian, we know that such changes require bumping the
library soname and changing the package name, and demand such rigor from
our package maintainers even when upstreams don't deliver; so any such
check in the source code works against the packaging system by forcing
database upgrades when we know none are required. Disable this check
so we rely on the packaging system to do its job.
Gbp-Pq: Name no-bdb-ABI-second-guessing