Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 17 Mar 2020 14:13:06 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 241347] security/sssd: Update to 1.16.4
Message-ID:  <bug-241347-7788-Q2MFhFM55D@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-241347-7788@https.bugs.freebsd.org/bugzilla/>
References:  <bug-241347-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D241347

--- Comment #19 from Rick <vrwmiller@gmail.com> ---
(In reply to Phillip R. Jaenke from comment #17)

My testing has proven successful. Successful in that sssd is handling
authentication/authorization as expected.

Testing was done with the following make.conf settings after applying your
BINARY_ALIAS patch. The port still failed to build until the attached krb5
patch was applied to add krb5 v1.18 support. The security/sssd ldb depend, =
as
you indicated, must be 1.5.

WITH_GSSAPI=3DYES
WANT_OPENLDAP_SASL=3DYES
BUILD_ALL_PYTHON_FLAVORS=3DYES
DEFAULT_VERSIONS+=3D python=3D3.6 python3=3D3.6 samba=3D410

.if ${.CURDIR:M*/security/sssd*}
OPTIONS_FILE_SET+=3DSMB
.endif

.if ${.CURDIR:M*/net/samba4*}
OPTIONS_FILE_UNSET+=3DAD_DC QUOTAS
SAMBA4_BUNDLED_LDB=3Dno
.endif

I'd like these patches committed also. It would prevent jumping through the=
se
hoops every time this port is built.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-241347-7788-Q2MFhFM55D>