python3-libsss_nss_idmap-2.9.5-4.el9_5.1> M Mv ĉJ4!!%joLne)Ip-Bm5 ']g3f,releng@rockylinux.org p-Bm5 ']r-Q(2MΡ3l;-jo8]ȅ@+Q1`;xTn$3r1ʇ+P+ӳSdDPYf==CNPjrZO8t @!s Β!9g_jml3/trʧyW޹0AQ踂nbπHAOÎoT;<ӛSd840`sgGpJU ?gӿ N%;ڽWS?7(w LYdq2<-,Oe+n=.Qý t(Wsw 6}D~O3Co75m˟@JF ÎfD^W0>7_X=^ 3 \aXb()Hl# Zj@t"[Z `!'?z#sXC<+u?;ZW/y9 R\91$*B*%ػ917e758967df3fcc936efcb327a8b97a15a077ca740633995b2407d62f0c6153ab9fb7379cdaecc2e4434a06b33adbe2a8639a95L^h*c|KN>@/Y?/Id! + Q5= x    $ hx@(894: B*G*H*I*X*Y*Z+,[+4\+T]+d^+b,d-ne-sf-xl-{t-u-v-w.dx.ty. ...//Cpython3-libsss_nss_idmap2.9.54.el9_5.1Python3 bindings for libsss_nss_idmapThe python3-libsss_nss_idmap contains the bindings so that libsss_nss_idmap can be used by Python applications.g3cpb-4336eed3-9ce2-437a-92f7-7a87286ed453-b-ppc64le Rocky Linux 9.5Rocky Enterprise Software FoundationLGPLv3+Rocky Linux Build System (Peridot) Unspecifiedhttps://github.com/SSSD/sssd/linuxppc64le@ xAAg3dg3dg3dg3de0b6ebf2b1774d62fba6ce3db0946b91b95449637dee78eadcf227181ada04a0../../../../usr/lib64/python3.9/site-packages/pysss_nss_idmap.sorootrootrootrootrootrootrootrootsssd-2.9.5-4.el9_5.1.src.rpmpython-libsss_nss_idmappython3-libsss_nss_idmappython3-libsss_nss_idmap(ppc-64)python3.9-libsss_nss_idmap@@@@@@@@@@@    @libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcrypt.so.2()(64bit)libm.so.6()(64bit)libsss_nss_idmaplibsss_nss_idmap.so.0()(64bit)libsss_nss_idmap.so.0(SSS_NSS_IDMAP_0.0.1)(64bit)libsss_nss_idmap.so.0(SSS_NSS_IDMAP_0.2.0)(64bit)libsss_nss_idmap.so.0(SSS_NSS_IDMAP_0.3.0)(64bit)libsss_nss_idmap.so.0(SSS_NSS_IDMAP_0.5.0)(64bit)libsss_nss_idmap.so.0(SSS_NSS_IDMAP_0.7.0)(64bit)python(abi)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)rtld(GNU_HASH)2.9.5-4.el9_5.13.93.0.4-14.6.0-14.0-15.4.18-14.16.1.3ffffy_fE@f/f! @fg@e!@e@e@e)eReRe@d dd@ddu@doMdbc<@c]cdAlexey Tikhonov - 2.9.5-4.1Alexey Tikhonov - 2.9.5-4Alexey Tikhonov - 2.9.5-3Alexey Tikhonov - 2.9.5-2Alexey Tikhonov - 2.9.5-1Alexey Tikhonov - 2.9.4-7Alexey Tikhonov - 2.9.4-6Alexey Tikhonov - 2.9.4-5Alexey Tikhonov - 2.9.4-4Alexey Tikhonov - 2.9.4-3Alexey Tikhonov - 2.9.4-2Alexey Tikhonov - 2.9.4-1Alexey Tikhonov - 2.9.3-2Alexey Tikhonov - 2.9.3-1Alexey Tikhonov - 2.9.2-2Alexey Tikhonov - 2.9.2-1Alexey Tikhonov - 2.9.1-2Alexey Tikhonov - 2.9.1-1Alexey Tikhonov - 2.9.0-5Alexey Tikhonov - 2.9.0-4Alexey Tikhonov - 2.9.0-3Alexey Tikhonov - 2.9.0-1Alexey Tikhonov - 2.8.2-2Alexey Tikhonov - 2.8.2-1Alexey Tikhonov - 2.8.1-1- Resolves: RHEL-59876 - EL9/CentOS Stream 9 lost offline smart card authentication - Resolves: RHEL-50912 - possible regression of rhbz#2196521- Resolves: RHEL-49711 - SYSDB: remove index on dataExpireTimestamp - Resolves: RHEL-49811 - 2FA is being enforced after upgrading 2.9.1->2.9.4- Resolves: RHEL-40742 - passkey_child with wrong owner- Resolves: RHEL-40742 - passkey_child with wrong owner - Resolves: RHEL-41047 - sssd is skipping GPO evaluation with auto_private_groups - Resolves: RHEL-40570 - GPO access the wrong memory location- Resolves: RHEL-36586 - Rebase SSSD for RHEL 9.5 - Resolves: RHEL-27716 - SSSD fails to process AD groups with 'Global Scope' correctly causing incomplete group-membership on RHEL if cache is empty - Resolves: RHEL-17659 - [RfE] SSSD Failover Enhancements - Resolves: RHEL-35781 - Passkey errors when handling multiple altSecurityIdentities values - Resolves: RHEL-30142 - sssd_pac is crashing - Resolves: RHEL-22206 - Errors in krb5_child.log every time a user authenticates - Pre-authentication failed: No pkinit_anchors supplied - Resolves: RHEL-32595 - Excessive "Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest - Resolves: RHEL-28666 - sssctl config-check is reporting false positive error msg - Resolves: RHEL-29454 - NULL dereference in inotify handling - Resolves: RHEL-1654 - Improve documentation for allowing e-mail address as username- Relates: RHEL-33645 - Rebase Samba to the latest 4.20.x release- Resolves: RHEL-27209 - Race condition during authorization leads to GPO policies functioning inconsistently [rhel-9.4.0]- Resolves: RHEL-28161 - Passkey cannot fall back to password- Resolves: RHEL-28161 - Passkey cannot fall back to password- Resolves: RHEL-22340 - socket leak - Resolves: RHEL-28161 - Passkey cannot fall back to password- Resolves: RHEL-12503 - AD users are unable to log in due to case sensitivity of user because the domain is found as an alias to the email address. - Resolves: RHEL-22288 - ssh pubkey stored in ldap/AD no longer works to authenticate via sssd - Resolves: RHEL-22194 - gdm smartcard login fails with sssd-2.9.3 in case of multiple identities- Resolves: RHEL-2632 - Rebase SSSD for RHEL 9.4 - Resolves: RHEL-18395 - latest sssd breaks logging in via XDMCP for LDAP/Kerberos users - Resolves: RHEL-17498 - New sssd.conf seems not to be backwards compatible (wrt SmartCard auth of local users using 'files provider') [rhel-9] - Resolves: RHEL-21079 - SSSD GPO lacks group resolution on hosts [rhel-9] - Resolves: RHEL-19211 - Excessive logging to sssd_nss and sssd_be in multi-domain AD forest [rhel-9]- Resolves: RHEL-2632 - Rebase SSSD for RHEL 9.4- Resolves: RHEL-2632 - Rebase SSSD for RHEL 9.4 - Resolves: RHEL-14427 - Expected cn in RDN, got uid - Resolves: RHEL-12229 - HANA validation on RHEL 9.2 issue possibly related to libc/nss_sss behaviour - Resolves: RHEL-3925 - SSSD goes offline when, while reading a single user, misses a required attribute (i.e. SID) - Resolves: RHEL-2319 - Passkey authentication for centrally managed users - Resolves: RHEL-4146 - Incorrect handling of reverse IPv6 update results in update failure - Resolves: RHEL-4971 - sssd-kcm does not appear to expire Kerberos tickets (RFE: sssd_kcm should have the option to automatically delete the expired tickets)- Resolves: RHEL-2319 - Passkey authentication for centrally managed users- Resolves: RHEL-2632 - Rebase SSSD for RHEL 9.4 - Resolves: RHEL-2319 - Passkey authentication for centrally managed users - Resolves: rhbz#2234829 - SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working) - Resolves: rhbz#2236119 - dbus and crond getting terminated with SIGBUS in sss_client code- Resolves: rhbz#2218858 - [sssd] SSSD enters failed state after heavy load in the system- Resolves: rhbz#2167837 - Rebase SSSD for RHEL 9.3 - Resolves: rhbz#2196816 - [RHEL9] [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed' - Resolves: rhbz#2162552 - sssd client caches old data after removing netgroup member on IDM - Resolves: rhbz#2189542 - [sssd] RHEL 9.3 Tier 0 Localization - Resolves: rhbz#2133854 - [RHEL9] In some cases when `sdap_add_incomplete_groups()` is called with `ignore_group_members = true`, groups should be treated as complete - Resolves: rhbz#1765354 - [RFE] - Show password expiration warning when IdM users login with SSH keys- Related: rhbz#2190415 - Rebase Samba to the latest 4.18.x release Rebuild against rebased Samba libs.- Related: rhbz#2190415 - Rebase Samba to the latest 4.18.x release Rebuild against rebased Samba libs.- Resolves: rhbz#2167837 - Rebase SSSD for RHEL 9.3- Resolves: rhbz#2167837 - Rebase SSSD for RHEL 9.3 - Resolves: rhbz#1765354 - [RFE] - Show password expiration warning when IdM users login with SSH keys - Resolves: rhbz#1913839 - filter_groups doesn't filter GID from 'id' output: AD + 'ldap_id_mapping = True' corner case - Resolves: rhbz#2100789 - [Improvement] sssctl config-check command does not show an error when we don't have id_provider in the domain section - Resolves: rhbz#2152177 - [RFE] Add support for ldapi:// URLs - Resolves: rhbz#2164852 - man page entry should make clear that a nested group needs a name - Resolves: rhbz#2166627 - Improvement: sss_client: add 'getsidbyusername()' and 'getsidbygroupname()' and corresponding python bindings - Resolves: rhbz#2166943 - kinit switches KCM away from the newly issued ticket - Resolves: rhbz#2167728 - [sssd] Auth fails if client cannot speak to forest root domain (ldap_sasl_interactive_bind_s failed)- Resolves: rhbz#2160001 - Reference to 'sssd-ldap-attributes' man page is missing in 'sssd-ldap', etc man pages - Resolves: rhbz#2143159 - automount killed by SIGSEGV- Resolves: rhbz#2127510 - Rebase SSSD for RHEL 9.2 - Resolves: rhbz#1608496 - sssd failing to register dynamic DNS addresses against an AD server due to unnecessary DNS search - Resolves: rhbz#2110091 - SSSD doesn't handle changes in 'resolv.conf' properly (when started right before network service) - Resolves: rhbz#2136791 - Lower the severity of the log message for SSSD so that it is not shown at the default debug level. - Resolves: rhbz#2139684 - [sssd] RHEL 9.2 Tier 0 Localization - Resolves: rhbz#2139837 - Analyzer: Optimize and remove duplicate messages in verbose list - Resolves: rhbz#2142794 - SSSD: `sssctl analyze` command shouldn't require 'root' privileged - Resolves: rhbz#2144893 - changing password with ldap_password_policy = shadow does not take effect immediately - Resolves: rhbz#2148737 - UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around- Resolves: rhbz#2127510 - Rebase SSSD for RHEL 9.2 - Resolves: rhbz#1507035 - [RFE] SSSD does not support to change the user’s password when option ldap_pwd_policy equals to shadow in sssd.conf file - Resolves: rhbz#1766490 - Use negative cache better and domain checks for lookup by SIDs - Resolves: rhbz#1964121 - RFE: Add an option to sssd config to convert home directories to lowercase (or add a new template for the 'override_homedir' option) - Resolves: rhbz#2074307 - reduce debug level in case well_known_sid_to_name() fails - Resolves: rhbz#2096031 - SSSD: sdap_handle_id_collision_for_incomplete_groups debug message missing a new line - Resolves: rhbz#2103325 - Supported AD group types should be explained in the docs - Resolves: rhbz#2111388 - authenticating against external IdP services okta (native app) with OAuth client secret failed - Resolves: rhbz#2115171 - SSSD: duplicate dns_resolver_* option in man sssd.conf - Resolves: rhbz#2127492 - sssd timezone issues sudonotafter - Resolves: rhbz#2128840 - [RFE] provide dbus method to find users by attr - Resolves: rhbz#2128883 - Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) - Resolves: rhbz#2136791 - Lower the severity of the log message for SSSD so that it is not shown at the default debug level. - Resolves: rhbz#2139837 - Analyzer: Optimize and remove duplicate messages in verbose listpython-libsss_nss_idmappython39-libsss_nss_idmap2.9.5-4.el9_5.12.9.5-4.el9_5.12.9.5-4.el9_5.12.9.5-4.el9_5.1@2.9.5-4.el9_5.12.9.5-4.el9_5.1.build-idbf67a1cac9929d682ec0613e532b4b1025fd89f2pysss_nss_idmap.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/bf//usr/lib64/python3.9/site-packages/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mcpu=power9 -mtune=power9 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19ppc64le-redhat-linux-gnudirectoryELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=bf67a1cac9929d682ec0613e532b4b1025fd89f2, stripped OR RR RR RRRRRRRutf-88a9909bc020787695a49a96c67d898d28b76d013500b45482cc9cdfaeb076bfd76f98231cd9458c73573fe84d53277611312c8a17178cfabb3beae935aae8fb9?(/hM=Ne/C.,NPv 9f9W F*+jdk~#Eݛ1h4F"kkYX: *:ʘB-nky=cL,Zڊ\WPSv6K[sܞjm{[+{- bp,_Yt_MVkm[AO]o<XPcv]5l|z[qozAk} ˾b$NxvlܦBOxeA :B11(9@;#{eœ@SU \AF]GPw>8l 8@EU)C `*E`\rZT$HvdJZ6LNKKONIT;i O/(jzכc-6&pqP6sEhx3{vʢ/>xvqYz;?ph F92,q)DdOj83Y.HӪMSzLo/c)F:-b:~UaFf7({|+Y4:P`).gkM܅4'*˞U'T^mR~m-:]-iw#fGGե@0(?P`d2,TVJ Ġ6Ug4|C}^9*=A%*/////,Nܳόnō1FRt3)T zLH7 C!Ԍu5]@ݾ([fIVw|лdBc4.g{x\ucz@(b O (Ԗ! @ޞ=6u^('_C (Y`s*ױc7;x.NþAEh 3\D籲+$4 HK.5sd=`C!Udb[U׎1uaB$Ab<>nUC!W)nWC!UƩ\H$8D6B 1Vr&V=Sqc=B2 L&A|7z/n"Mf`M̴yMn pnF ?GԸ+-T7UݞV=]sW 111lTZe_Y]):{{@=zmԛB*Zq|;WFkZ[jzzWkN@J׻ίi˨4n:5z^mnsɤvhNj}4wqe^)+RpZauEJj\9ql69:vֺR9%a-0-OY R6ƈ`t!zYb ""(r,iH} f lh)S1#yYHtLDi( $[03ʈd@Ta0A,̘م gрʥxG-ZG9#Rm+3mp[%9ymr`˘L9X! @,P?ѡf|$e?Di+] d"B;@P MS+MN 0 /f(4P4Δ,/}$*G_WN:e#]. ` OEl#p6 >ZܽrC#R5`y]ya K[ D-U\PWjGMf( 4x"u(YFDd7;QehBHDJՎ JH$DBH.b╄MX Ϩ#!̈Ȉ&Ifc&1$$6Y O S2T8`tCay ;F"{<Fz'Kvb@ل؝ƳDL#h_.=O_U=/9Jo|,:HckS!BTIQP똞hNԑssy`1xiSK7s~c o?6.Ȇ~=b  ؂ISUH14(HP@5Աٷ/\3BM9`K+J!mI$ex {f&!$VU.Bp tfa uqO3H8jQAsHS#h=GL'D]Z Yk9x<9ػ;~ʥI-GhJE%%WW |6` UOLJ~w-/|ue1:N{ ^KӒ a>^E0+羒iyҭەyw(59k e2@.`n`EP֚ oC}rާ3IY܌[_rgʇ'_|I] E|Gۉc1욯%)|\I_c)u\vǞۇoFwL U#G-yӫWG5BwTXQ囋@8.o5@B-x )ϟ`jΏC_ouFf<$O8p`)X,p\<ƒ_o7zx/'MvZz]a _,b-ky3o7 "57 a) WǦx? ;aߧ>hL|=fDGwpmc|u|+!8O]6i%8+KJ:/XsĺJ{\^R9_v{ubkO,b׾lO)'g .ڷ.2] Sc6asqN;]ǟϸh?P\אPǜOp_=2oo[WY+WonɷFM!gdُ&0֬[Y4UϦq7C2\쀅!,ٯG!/уSi[z]kjQb,ݶ_v3"