On Tue, Jul 25, 2017 at 12:50:20PM +0200, Lukas Slebodnik wrote:
> On (25/07/17 12:30), Jakub Hrozek wrote:
> >On Tue, Jul 25, 2017 at 12:02:06PM +0200, Lukas Slebodnik wrote:
> >> On (25/07/17 11:10), Jakub Hrozek wrote:
> >> >On Tue, Jul 25, 2017 at 08:39:59AM +0200, Lukas Slebodnik wrote:
> >> >> On (24/07/17 18:34), Jakub Hrozek wrote:
> >> >> >Hi,
> >> >> >
> >> >> >I would really like to release 1.15.3 soon (like, today, at worst
> >> >> >tomorrow if we can't merge PR #328 and #331 today). The release notes
> >> >> >are here:
> >> >> >    https://pagure.io/fork/jhrozek/SSSD/docs
> >> >> >
> >> >> >You can either clone the repo and run 'make html' or, for your
> >> >> >convenience, I'm pasting the RST-formatted release notes below:
> >> >> >
> >> >> >SSSD 1.15.3
> >> >> >===========
> >> >> >
> >> >> >Highlights
> >> >> >----------
> >> >> >
> >> >> >New Features
> >> >> >^^^^^^^^^^^^
> >> >> > * In a setup where an IPA domain trusts an Active Directory domain,
> >> >> >   it is now possible to `define the domain resolution order
> >> >> >   <http://www.freeipa.org/page/Releases/4.5.0#AD_User_Short_Names>`_.
> >> >> >   Starting with this version, SSSD is able to read and honor the 
> >> >> > domain
> >> >> >   resolution order, providing a way to resolve Active Directory users 
> >> >> > by
> >> >> >   just their short name.  SSSD also supports a new option
> >> >> >   ``domain_resolution_order`` applicable in the ``[sssd]`` section
> >> >> >   that allows to configure short names for AD users in setup with
> >> >> >   ``id_provider=ad`` or in a setup with an older IPA server that 
> >> >> > doesn't
> >> >> >   support the ``ipa config-mod --domain-resolution-order``
> >> >> >   configuration option. Also, it is now possible to use
> >> >> >   ``use_fully_qualified_names=False`` in a subdomain configuration, 
> >> >> > but
> >> >> >   please note that the user and group output from trusted domains will
> >> >> >   always be qualified to avoid conflicts.
> >> >> >
> >> >> >   * Design page - `Shortnames in trusted domains 
> >> >> > <https://docs.pagure.org/SSSD.sssd/design_pages/shortnames.html>`_
> >> >> >
> >> >> > * SSSD ships with a new service called KCM. This service acts as a
> >> >> >   storage for Kerberos tickets when ``libkrb5`` is configured to use
> >> >> >   ``KCM:`` in ``krb5.conf``. Compared to other Kerberos credential
> >> >> >   cache types, KCM is better suited for containerized environments and
> >> >> >   because the credential caches are managed by a stateful daemon, in
> >> >> >   future releases will also allow to renew tickets acquired outside 
> >> >> > SSSD
> >> >> >   (e.g. with ``kinit``) or provide notifications about ticket changes.
> >> >> >
> >> >> 
> >> >> Maybe we can mention that it is an optional feature and can be disabled
> >> >> at configure time if users does not want additional build/runtime time
> >> >> dependencies.
> >> >
> >> >Done
> >> >
> >> >> 
> >> >> 
> >> >> >   * Design page - `KCM server for SSSD 
> >> >> > <https://docs.pagure.org/SSSD.sssd/design_pages/kcm.html>`_
> >> >> >
> >> >> >   * `NOTE`: There are several known issues in the ``KCM`` responder 
> >> >> > that
> >> >> >     will be handled in the next release such as
> >> >> >     `issues with very large tickets 
> >> >> > <https://pagure.io/SSSD/sssd/issue/3386>`_
> >> >> >     or `tracking the SELinux label of the peer 
> >> >> > <https://pagure.io/SSSD/sssd/issue/3434>`_
> >> >> >
> >> 
> >> I have two ideas here.
> >> 
> >> BTW, I've just realized that we might mention known crash(which might be a
> >> corner case) https://bugzilla.redhat.com/show_bug.cgi?id=1446302#c26
> >> And also clone it to upstream :-)
> >
> >Well, did we reproduce the crash after fixing the NSS/NSPR teardown?
> >
> 
> Backtrace is different then in NSS/NSPR teardown.
> 
> >I also wonder if just tagging all issues that are KCM-related in trac
> >with a single tag and saying 'known issues can be found at
> >http://blabla"; would be better?
> >
> 
> That might be confusing if we triage some ticket to future releases.
> Because basically all bugs are known issues. We might mention just
> most important ones. But on the other hand it was not very simple to reproduce
> it. So we needn't mention it.
> 
> >> 
> >> We might also mention that root will not directly see users credentials;
> >> which is a difference comparing to kernel keyring or FILE.
> >> https://pagure.io/SSSD/sssd/issue/3376
> >> But root can use "su user -c /usr/bin/klist"
> >
> >We can, but I wonder if (because this is not going to chage) it would be
> >more useful to say in general that there are some differences compared
> >to Heimdal that are described in the manual page..
> 
> I had an impression that we will introduce an option to allow it.
> https://pagure.io/SSSD/sssd/issue/3376/#comment-438541

Yes, but the default will never change. But we can do both -- change the
release notes (done) and then later amend the manpage by fixing
https://pagure.io/SSSD/sssd/issue/3455
_______________________________________________
sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org

Reply via email to