Debian Patches

Status for openldap/2.5.18+dfsg-3

Patch Description Author Forwarded Bugs Origin Last update
debian-version Replace upstream version with Debian version in version strings Ryan Tandy <ryan@nardis.ca> not-needed
man-slapd Patch the slapd man page to not refer to a header file that isn't
installed with the slapd package and to reference the correct path
for slapd.

Debian-specific.
no
slapi-errorlog-file The slapi error log file defaults to /var/errors given our setting
of --localstatedir. Move it to /var/log/slapi-errors instead.

Debian-specific.
no
ldapi-socket-place Move the ldapi socket to /var/run/slapd from /var/run, since /var/run
is only writable by root and slapd runs as openldap.

Debian-specific.
no
wrong-database-location Move the default slapd database location to /var/lib/ldap instead of
/var/openldap-data.

Debian-specific.
no
index-files-created-as-root Document in the man page that slapindex should be run as the same user
as slapd, and print a warning if it's run as root (since Debian defaults
to running slapd as openldap).

Not suitable for upstream in this form. This patch needs to be reworked
to check the BerkeleyDB database ownership and only warn if running as
root with a database that's not owned by root.

Upstream ITS #5356 filed requesting better handling of this. Current
upstream discussion leans towards putting the check into the database
backend and aborting if slapd is run as a different user than the database
owner, which is an even better fix.
no
sasl-default-path Add /etc/ldap/sasl2 to the SASL configuration search path.

Not submitted upstream. Somewhat Debian-specific and probably not of
interest upstream.
no
getaddrinfo-is-threadsafe OpenLDAP upstream conservatively assumes that certain resolver functions
(getaddrinfo, getnameinfo, res_query, dn_expand) are not re-entrant; but we
know that the glibc implementations of these functions are thread-safe, so
we should bypass the use of this mutex. This fixes a locking problem when
an application uses libldap and libnss-ldap is also used for hosts
resolution.

Closes Debian bug #340601.

Not suitable for forwarding upstream; might be made suitable by adding a
configure-time check for glibc and disabling the mutex only on known
thread-safe implementations.
Steve Langasek <vorlon@debian.org> no
do-not-second-guess-sonames Rip out code that second-guesses the libsasl soname / Debian shlibs. If
cyrus sasl upstream is breaking the ABI, this needs to be fixed upstream
there, not kludged around upstream here!

Debian bug #546885

Upstream ITS #6302 filed.
no
contrib-makefiles no
ldap-conf-tls-cacertdir no
add-tlscacert-option-to-ldap-conf no
fix-build-top-mk no
switch-to-lt_dlopenadvise-to-get-RTLD_GLOBAL-set.diff Switch to lt_dlopenadvise() so back_perl can be opened with RTLD_GLOBAL. Open all modules with RTLD_GLOBAL, needed so that back_perl can load
non-trivial Perl extensions that require symbols from back_perl.so itself.
Jan-Marek Glogowski <jan-marek.glogowski@muenchen.de> no debian 2010-05-18
set-maintainer-name no
64-bit-time-t-compat.patch handle sizeof(time_t) > sizeof(long) in format strings 64-bit time_t means that on some architectures, time_t is now larger than
a long, and making some references in format strings incorrect. To avoid
truncation or other size mismatch issues, always cast to a long long and
read using %lld.
.
Fixes an assertion failure detected during build-time tests on armhf:
slapd: ../../../../../servers/slapd/overlays/dds.c:422: dds_op_add: Assertion `bv.bv_len < sizeof( ttlbuf )' failed.

===================================================================
Steve Langasek <steve.langasek@canonical.com> no 2024-03-11
ITS-10221-Remove-extraneous-quote.patch [PATCH] ITS#10221 - Remove extraneous quote Quanah Gibson-Mount <quanah@openldap.org> no 2024-06-03
ITS-10253-Fix-incompatible-pointer-type.patch ITS#10253 Fix incompatible pointer type Ryan Tandy <ryan@nardis.ca> yes debian upstream 2024-08-21

All known versions for source package 'openldap'

Links