From owner-freebsd-ports-bugs@freebsd.org Mon Jun 24 05:50:05 2019 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 44C6915C34EC for ; Mon, 24 Jun 2019 05:50:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id D0BDA86F6B for ; Mon, 24 Jun 2019 05:50:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 9114C15C34EB; Mon, 24 Jun 2019 05:50:04 +0000 (UTC) Delivered-To: ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6C3FC15C34EA for ; Mon, 24 Jun 2019 05:50:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F282F86F69 for ; Mon, 24 Jun 2019 05:50:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 36EDA1C14E for ; Mon, 24 Jun 2019 05:50:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x5O5o3WH091767 for ; Mon, 24 Jun 2019 05:50:03 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x5O5o3YC091766 for ports-bugs@FreeBSD.org; Mon, 24 Jun 2019 05:50:03 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 238465] security/sssd: Update port to new version Date: Mon, 24 Jun 2019 05:50:01 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: jcfyecrayz@liamekaens.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 24 Jun 2019 05:50:05 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D238465 --- Comment #6 from John Hein --- Created attachment 205304 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D205304&action= =3Dedit [patch] update to 1.13.4 Here's the update to 1.13.4 - on the current long term maintenance series of sssd. I didn't obsolete the 1.12.5 patch since that can still be applied f= or testing if you want to incrementally update from 1.11.7. But I think it's reasonable to commit the change from 1.11.7 to 1.13.4 and skip over 1.12.5.= =20 See previous comments regarding other versions (2.x). If you are an sssd user, please do run-time testing with this patch. Changes from the 1.12.5 patch include: - Set an option for python2 or python3. If both are installed and detected, it would require a more complicated plist. Instead add a radio option for either python2 or python3 (or neither), which defaults to python3 (matching the current ports default). - Disable PAC responder if SMB is off. It is part if Microsoft Active Directory [1] and needs samba. If you happen to have samba installed, but the SMB option off, sssd's configure will detect samba and try to build the PAC responder which will trigger stage-qa warnings. - Handle build errors for pysss.c (when building with python support [2]): In file included from src/python/pysss.c:27: In file included from ./src/util/util.h:51: ./src/util/util_errors.h:130:26: error: unknown type name 'errno_t' - plist updates. [1] For more info on PAC (Privilege Attribute Certificate): https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-pac/166d806= 4-c863-41e1-9c23-edaaa5f36962 https://jhrozek.wordpress.com/category/sssd/ [2] patch from bug filed upstream - https://pagure.io/SSSD/sssd/issue/4027 As with the 1.12.5 patch, if you want to build with SMB on, this still needs samba to be built without the bundled ldb, as in: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230705#c8 --=20 You are receiving this mail because: You are the assignee for the bug.=