Name: | slapi-nis |
---|---|
Version: | 0.56.0 |
Release: | 4.el7 |
Architecture: | aarch64 |
Group: | System Environment/Daemons |
Size: | 559398 |
License: | GPLv2 |
RPM: | slapi-nis-0.56.0-4.el7.aarch64.rpm |
Source RPM: | slapi-nis-0.56.0-4.el7.src.rpm |
Build Date: | Thu May 03 2018 |
Build Host: | ca-buildarm01.us.oracle.com |
Vendor: | Oracle America |
URL: | http://slapi-nis.fedorahosted.org/ |
Summary: | NIS Server and Schema Compatibility plugins for Directory Server |
Description: | This package provides two plugins for Red Hat and 389 Directory Server. The NIS Server plugin allows the directory server to act as a NIS server for clients, dynamically generating and updating NIS maps according to its configuration and the contents of the DIT, and serving the results to clients using the NIS protocol as if it were an ordinary NIS server. The Schema Compatibility plugin allows the directory server to provide an alternate view of entries stored in part of the DIT, optionally adding, dropping, or renaming attribute values, and optionally retrieving values for attributes from multiple entries in the tree. |
- Fixed: UPN-based search for AD users does not match an entry in slapi-nis map cache - Resolves: #1361123 - Fixed: slapi-nis plugin modifies DS data - Resolves: #1360245
- Fix double free in SSSD 1.14+ support - Resolves: #1353549
- Fix reported coverity issues - Make sure slapi-nis continue to work with SSSD 1.14 when default domain is defined - Resolves: #1292148
- New upstream release: - support updating passwords for the users from the primary tree - populate map cache in a separate thread to avoid blocking the DS - Resolves: #1292148
- Reworked priming thread shutdown support - Resolves: #1327197
- Wait for priming thread to finish before shutdown - Resolves: #1327197
- Resolves: #1138797 - Resolves: #1301300
- delay sending responses from compat tree after map cache search - Resolves: #1273587 - fix processing of ID views - Resolves: #1277576, #1265465
- Don't lookup groups in SSSD for memberUid without @domain - Resolves: #1243823
- Fix CVE-2015-0283 for RHEL 7.2 - Resolves: #1202996