<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/ipapython, branch views</title>
<subtitle>FreeIPA project</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/'/>
<entry>
<title>Use certmonger D-Bus API instead of messing with its files.</title>
<updated>2014-09-05T08:51:42+00:00</updated>
<author>
<name>David Kupka</name>
<email>dkupka@redhat.com</email>
</author>
<published>2014-09-03T07:07:16+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=6d94cdf250c470bf77a0e769ea30a90fa5815b81'/>
<id>6d94cdf250c470bf77a0e769ea30a90fa5815b81</id>
<content type='text'>
FreeIPA certmonger module changed to use D-Bus to communicate with certmonger.
Using the D-Bus API should be more stable and supported way of using cermonger than
tampering with its files.

&gt;=certmonger-0.75.13 is needed for this to work.

https://fedorahosted.org/freeipa/ticket/4280

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
FreeIPA certmonger module changed to use D-Bus to communicate with certmonger.
Using the D-Bus API should be more stable and supported way of using cermonger than
tampering with its files.

&gt;=certmonger-0.75.13 is needed for this to work.

https://fedorahosted.org/freeipa/ticket/4280

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add a KRA to IPA</title>
<updated>2014-08-22T07:59:31+00:00</updated>
<author>
<name>Ade Lee</name>
<email>alee@redhat.com</email>
</author>
<published>2014-03-18T15:23:30+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=a25fe00c62117cb11a1e75fbcc4960a0cfa72aab'/>
<id>a25fe00c62117cb11a1e75fbcc4960a0cfa72aab</id>
<content type='text'>
This patch adds the capability of installing a Dogtag KRA
to an IPA instance.  With this patch,  a KRA is NOT configured
by default when ipa-server-install is run.  Rather, the command
ipa-kra-install must be executed on an instance on which a Dogtag
CA has already been configured.

The KRA shares the same tomcat instance and DS instance as the
Dogtag CA.  Moreover, the same admin user/agent (and agent cert) can
be used for both subsystems.  Certmonger is also confgured to
monitor the new subsystem certificates.

To create a clone KRA, simply execute ipa-kra-install &lt;replica_file&gt;
on a replica on which a Dogtag CA has already been replicated.
ipa-kra-install will use the security domain to detect whether the
system being installed is a replica, and will error out if a needed
replica file is not provided.

The install scripts have been refactored somewhat to minimize
duplication of code.  A new base class dogtagintance.py has
been introduced containing code that is common to KRA and CA
installs.  This will become very useful when we add more PKI
subsystems.

The KRA will install its database as a subtree of o=ipaca,
specifically o=ipakra,o=ipaca.  This means that replication
agreements created to replicate CA data will also replicate KRA
data.  No new replication agreements are required.

Added dogtag plugin for KRA.  This is an initial commit providing
the basic vault functionality needed for vault.  This plugin will
likely be modified as we create the code to call some of these
functions.

Part of the work for: https://fedorahosted.org/freeipa/ticket/3872

The uninstallation option in ipa-kra-install is temporarily disabled.

Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
Reviewed-By: Petr Viktorin &lt;pviktori@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This patch adds the capability of installing a Dogtag KRA
to an IPA instance.  With this patch,  a KRA is NOT configured
by default when ipa-server-install is run.  Rather, the command
ipa-kra-install must be executed on an instance on which a Dogtag
CA has already been configured.

The KRA shares the same tomcat instance and DS instance as the
Dogtag CA.  Moreover, the same admin user/agent (and agent cert) can
be used for both subsystems.  Certmonger is also confgured to
monitor the new subsystem certificates.

To create a clone KRA, simply execute ipa-kra-install &lt;replica_file&gt;
on a replica on which a Dogtag CA has already been replicated.
ipa-kra-install will use the security domain to detect whether the
system being installed is a replica, and will error out if a needed
replica file is not provided.

The install scripts have been refactored somewhat to minimize
duplication of code.  A new base class dogtagintance.py has
been introduced containing code that is common to KRA and CA
installs.  This will become very useful when we add more PKI
subsystems.

The KRA will install its database as a subtree of o=ipaca,
specifically o=ipakra,o=ipaca.  This means that replication
agreements created to replicate CA data will also replicate KRA
data.  No new replication agreements are required.

Added dogtag plugin for KRA.  This is an initial commit providing
the basic vault functionality needed for vault.  This plugin will
likely be modified as we create the code to call some of these
functions.

Part of the work for: https://fedorahosted.org/freeipa/ticket/3872

The uninstallation option in ipa-kra-install is temporarily disabled.

Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
Reviewed-By: Petr Viktorin &lt;pviktori@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Enable NSS PKIX certificate path discovery and validation for Dogtag.</title>
<updated>2014-07-30T14:04:21+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2014-07-17T09:47:26+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=044c5c833a83a541f97785279acfe8e113035b3d'/>
<id>044c5c833a83a541f97785279acfe8e113035b3d</id>
<content type='text'>
Part of https://fedorahosted.org/freeipa/ticket/3737

Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Part of https://fedorahosted.org/freeipa/ticket/3737

Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Provide additional functions to ipapython.certmonger.</title>
<updated>2014-07-30T14:04:21+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2014-03-12T10:35:10+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=2109d6611bafe75f352eb35cfc7b04f2fb113ce3'/>
<id>2109d6611bafe75f352eb35cfc7b04f2fb113ce3</id>
<content type='text'>
Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-ldap-updater: make possible to use LDAPI with autobind in case of hardened LDAP configuration</title>
<updated>2014-07-04T06:13:23+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2014-07-02T13:30:18+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=a9fe37e0664079ad2da7b0d9b9b7c7e244a25bf9'/>
<id>a9fe37e0664079ad2da7b0d9b9b7c7e244a25bf9</id>
<content type='text'>
When nsslapd-minssf is greater than 0, running as root
  ipa-ldap-updater [-l]
will fail even if we force use of autobind for root over LDAPI.

The reason for this is that schema updater doesn't get ldapi flag passed and
attempts to connect to LDAP port instead and for hardened configurations
using simple bind over LDAP is not enough.

Additionally, report properly previously unhandled LDAP exceptions.
https://fedorahosted.org/freeipa/ticket/3468

Reviewed-By: Petr Spacek &lt;pspacek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When nsslapd-minssf is greater than 0, running as root
  ipa-ldap-updater [-l]
will fail even if we force use of autobind for root over LDAPI.

The reason for this is that schema updater doesn't get ldapi flag passed and
attempts to connect to LDAP port instead and for hardened configurations
using simple bind over LDAP is not enough.

Additionally, report properly previously unhandled LDAP exceptions.
https://fedorahosted.org/freeipa/ticket/3468

Reviewed-By: Petr Spacek &lt;pspacek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Clear NSS session cache when socket is closed</title>
<updated>2014-07-02T14:31:50+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2014-07-02T12:40:45+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=c4b63dc48a4ab6d4a9b7e824dba23a806fd6d741'/>
<id>c4b63dc48a4ab6d4a9b7e824dba23a806fd6d741</id>
<content type='text'>
Even when NSS connection is closed, there may be still cached
certificates in the NSS lib. This may cause subsequent NSS
initialization to crash. This problem especially reproduces in the
unit tests.

Reviewed-By: Petr Viktorin &lt;pviktori@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Even when NSS connection is closed, there may be still cached
certificates in the NSS lib. This may cause subsequent NSS
initialization to crash. This problem especially reproduces in the
unit tests.

Reviewed-By: Petr Viktorin &lt;pviktori@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipaldap: Override conversion of nsds5replicalast{update,init}{start,end}</title>
<updated>2014-07-02T14:12:05+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2014-07-01T11:29:13+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=a5bb758978ffdccc5a985487d57856290428abf1'/>
<id>a5bb758978ffdccc5a985487d57856290428abf1</id>
<content type='text'>
The replication related attributes with generalized time syntax have
special behaviour implemented in 389, as follows:

In case they are explicitly requested for and not set, 0 is returned.

However, 0 is not a valid value for LDAP Generalized time. Thus
we need to add these attributes to the _SYNTAX_OVERRIDE dictionary,
overriding their conversion to datetime and converting them to
string instead, which perserves the old behaviour expected by the
replication codebase.

https://fedorahosted.org/freeipa/ticket/4350

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The replication related attributes with generalized time syntax have
special behaviour implemented in 389, as follows:

In case they are explicitly requested for and not set, 0 is returned.

However, 0 is not a valid value for LDAP Generalized time. Thus
we need to add these attributes to the _SYNTAX_OVERRIDE dictionary,
overriding their conversion to datetime and converting them to
string instead, which perserves the old behaviour expected by the
replication codebase.

https://fedorahosted.org/freeipa/ticket/4350

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix handle python-dns UnicodeError</title>
<updated>2014-06-20T11:28:53+00:00</updated>
<author>
<name>Martin Basti</name>
<email>mbasti@redhat.com</email>
</author>
<published>2014-06-20T10:53:06+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=9f5e77f686a974b837da6eb92cec741fcbb33603'/>
<id>9f5e77f686a974b837da6eb92cec741fcbb33603</id>
<content type='text'>
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Clarify LDAPClient docstrings about get_entry, get_entries and find_entries</title>
<updated>2014-06-20T10:38:58+00:00</updated>
<author>
<name>Petr Spacek</name>
<email>pspacek@redhat.com</email>
</author>
<published>2014-06-18T15:31:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=e821576129907d89a812edde45121d365a1f696d'/>
<id>e821576129907d89a812edde45121d365a1f696d</id>
<content type='text'>
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipaplatform: Change makefiles to accomodate for new platform package</title>
<updated>2014-06-16T17:48:20+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2014-06-02T05:50:12+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/abbra/public_git/freeipa.git/commit/?id=3bb9e1bbd5c8ae42e113b52dc88f9ec75b9b1142'/>
<id>3bb9e1bbd5c8ae42e113b52dc88f9ec75b9b1142</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/4052

Reviewed-By: Petr Viktorin &lt;pviktori@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/4052

Reviewed-By: Petr Viktorin &lt;pviktori@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
