Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 23 Oct 2020 09:44:44 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 241347] security/sssd: Update to 1.16.4
Message-ID:  <bug-241347-7788-ptNgY76HYK@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-241347-7788@https.bugs.freebsd.org/bugzilla/>
References:  <bug-241347-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D241347

--- Comment #28 from Richard Frewin <Richard@FrewinIT.uk> ---
Created attachment 218997
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D218997&action=
=3Dedit
Patch to update security/sssd to 1.16.5

Here's another ugly hack of a patch.

In 1.16.5 up-stream SSSD introduced some Linux specific footling around to
check that NSS symbols have been loaded.  FreeBSD has NSS still integrated =
in
libc (and doesn't have libnss_files.so.2 and friends), so this patch basica=
lly
NOOP's those checks.

Again this patch seems to apply against ports/head (sssd 1.11.7_22), builds=
 in
poudriere and runs on my 12.1-R AMD64 test box.  SSSD seems to function
correctly for the very limited tests I've done getting data from LDAP.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-241347-7788-ptNgY76HYK>