<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/ipaserver, branch patternfly</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/'/>
<entry>
<title>Add mechanism for updating permissions to managed</title>
<updated>2014-06-04T15:34:17+00:00</updated>
<author>
<name>Petr Viktorin</name>
<email>pviktori@redhat.com</email>
</author>
<published>2014-05-14T14:08:28+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=acb2ca47d68becca8c7385899c9107d5b6a13a1a'/>
<id>acb2ca47d68becca8c7385899c9107d5b6a13a1a</id>
<content type='text'>
Part of the work for: https://fedorahosted.org/freeipa/ticket/4346

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Part of the work for: https://fedorahosted.org/freeipa/ticket/4346

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Modified dns related global functions</title>
<updated>2014-06-03T13:55:32+00:00</updated>
<author>
<name>Martin Basti</name>
<email>mbasti@redhat.com</email>
</author>
<published>2014-05-16T10:21:04+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=b964d2130a15d7b1561c66c721e3257ce0d24305'/>
<id>b964d2130a15d7b1561c66c721e3257ce0d24305</id>
<content type='text'>
* Modified functions to use DNSName type
* Removed unused functions

Part of ticket:
IPA should allow internationalized domain names
https://fedorahosted.org/freeipa/ticket/3169

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Modified functions to use DNSName type
* Removed unused functions

Part of ticket:
IPA should allow internationalized domain names
https://fedorahosted.org/freeipa/ticket/3169

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa recursively adds old backups</title>
<updated>2014-05-30T06:15:22+00:00</updated>
<author>
<name>Gabe</name>
<email>redhatrises@gmail.com</email>
</author>
<published>2014-05-28T23:16:04+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=9f2c4705d7e2fa83be95f005a78f83a399acfa72'/>
<id>9f2c4705d7e2fa83be95f005a78f83a399acfa72</id>
<content type='text'>
- Added exclude for the ipa backup folder to the files tar

https://fedorahosted.org/freeipa/ticket/4331

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
- Added exclude for the ipa backup folder to the files tar

https://fedorahosted.org/freeipa/ticket/4331

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ldap2.has_upg: Raise an error if the UPG definition is not found</title>
<updated>2014-05-29T14:22:37+00:00</updated>
<author>
<name>Petr Viktorin</name>
<email>pviktori@redhat.com</email>
</author>
<published>2014-05-27T15:07:13+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=4f89decc9a6020cbacbfa4406f32ce5465d49a72'/>
<id>4f89decc9a6020cbacbfa4406f32ce5465d49a72</id>
<content type='text'>
The UPG Definition is always present in IPA; if it can not be read
it's usually caused by insufficient privileges.
Previously the code assumed the absence of the entry meant that
UPG is disabled. With granular read permissions, this would mean
that users that can add users but can't read UPG Definition would
add users without UPG, and the reason for that would not be very clear.
It is better to fail early if the definition can't be read.

Raise an error if the UPG Definition is not available. This makes
read access to it a prerequisite for adding users.

Part of the work for: https://fedorahosted.org/freeipa/ticket/3566

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The UPG Definition is always present in IPA; if it can not be read
it's usually caused by insufficient privileges.
Previously the code assumed the absence of the entry meant that
UPG is disabled. With granular read permissions, this would mean
that users that can add users but can't read UPG Definition would
add users without UPG, and the reason for that would not be very clear.
It is better to fail early if the definition can't be read.

Raise an error if the UPG Definition is not available. This makes
read access to it a prerequisite for adding users.

Part of the work for: https://fedorahosted.org/freeipa/ticket/3566

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Call generate-rndc-key.sh during ipa-server-install</title>
<updated>2014-05-27T11:05:53+00:00</updated>
<author>
<name>Adam Misnyovszki</name>
<email>amisnyov@redhat.com</email>
</author>
<published>2014-04-18T13:44:11+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=71c6d2f1eb9610a0e0a994a6cfd78fdf9bb9d1fa'/>
<id>71c6d2f1eb9610a0e0a994a6cfd78fdf9bb9d1fa</id>
<content type='text'>
Since systemd has by default a 2 minute timeout to start
a service, the end of ipa-server-install might fail
because starting named times out. This patch ensures that
generate-rndc-key.sh runs before named service restart.

Also, warning message is displayed before KDC install and
generate-rndc-key.sh, if there is a lack of entropy, to
notify the user that the process could take more time
than expected.

Modifications done by Martin Kosek:
- removed whitespace at the end of installutils.py
- the warning in krbinstance.py moved right before the step
  requiring entropy
- slightly reworded the warning message

https://fedorahosted.org/freeipa/ticket/4210

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since systemd has by default a 2 minute timeout to start
a service, the end of ipa-server-install might fail
because starting named times out. This patch ensures that
generate-rndc-key.sh runs before named service restart.

Also, warning message is displayed before KDC install and
generate-rndc-key.sh, if there is a lack of entropy, to
notify the user that the process could take more time
than expected.

Modifications done by Martin Kosek:
- removed whitespace at the end of installutils.py
- the warning in krbinstance.py moved right before the step
  requiring entropy
- slightly reworded the warning message

https://fedorahosted.org/freeipa/ticket/4210

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>rpcserver: login_password datetime fix in expiration check</title>
<updated>2014-05-26T11:08:34+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2014-05-07T13:41:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=1e96475a77280bbdc883c66e0dc451ef0559c5fb'/>
<id>1e96475a77280bbdc883c66e0dc451ef0559c5fb</id>
<content type='text'>
krbpasswordexpiration conversion to time failed because now we get
datetime object instead of string.

https://fedorahosted.org/freeipa/ticket/4339

Reviewed-By: Tomas Babej &lt;tbabej@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
krbpasswordexpiration conversion to time failed because now we get
datetime object instead of string.

https://fedorahosted.org/freeipa/ticket/4339

Reviewed-By: Tomas Babej &lt;tbabej@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ldap2.find_entries: Do not modify attrs_list in-place</title>
<updated>2014-05-26T10:39:33+00:00</updated>
<author>
<name>Petr Viktorin</name>
<email>pviktori@redhat.com</email>
</author>
<published>2014-05-16T11:18:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=988b2cebf4bf6657eb50f5ecc57bd39425739b8b'/>
<id>988b2cebf4bf6657eb50f5ecc57bd39425739b8b</id>
<content type='text'>
dap2.find_entries modified the passed in attrs_list to remove
the virtual attributes memberindirect and memberofindirect
before passing the list to LDAP. This means that a call like
    ldap2.get_entry(dn, attrs_list=some_framework_object.default_attributes)
would permanently remove the virtual attributes from
some_framework_object's definition.

Create a copy of the list instead.

https://fedorahosted.org/freeipa/ticket/4349

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
dap2.find_entries modified the passed in attrs_list to remove
the virtual attributes memberindirect and memberofindirect
before passing the list to LDAP. This means that a call like
    ldap2.get_entry(dn, attrs_list=some_framework_object.default_attributes)
would permanently remove the virtual attributes from
some_framework_object's definition.

Create a copy of the list instead.

https://fedorahosted.org/freeipa/ticket/4349

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove the global anonymous read ACI</title>
<updated>2014-05-26T10:14:55+00:00</updated>
<author>
<name>Petr Viktorin</name>
<email>pviktori@redhat.com</email>
</author>
<published>2014-04-29T19:46:26+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=193ced0bd7a9a26e7b25f08b023ee21302acaac7'/>
<id>193ced0bd7a9a26e7b25f08b023ee21302acaac7</id>
<content type='text'>
Also remove
- the deny ACIs that implemented exceptions to it:
  - no anonymous access to roles
  - no anonymous access to member information
  - no anonymous access to hbac
  - no anonymous access to sudo (2×)
- its updater plugin

Part of the work for: https://fedorahosted.org/freeipa/ticket/3566

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Also remove
- the deny ACIs that implemented exceptions to it:
  - no anonymous access to roles
  - no anonymous access to member information
  - no anonymous access to hbac
  - no anonymous access to sudo (2×)
- its updater plugin

Part of the work for: https://fedorahosted.org/freeipa/ticket/3566

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Set user addressbook/IPA attribute read ACI to anonymous on upgrades from 3.x</title>
<updated>2014-05-26T10:12:35+00:00</updated>
<author>
<name>Petr Viktorin</name>
<email>pviktori@redhat.com</email>
</author>
<published>2014-04-29T19:32:29+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=63becae88c6c270b98f0432dc474b661b82f3119'/>
<id>63becae88c6c270b98f0432dc474b661b82f3119</id>
<content type='text'>
When upgrading from an "old" IPA, or installing the first "new" replica,
we need to keep allowing anonymous access to many user attributes.

Add an optional 'fixup_function' to the managed permission templates,
and use it to set the bind rule type to 'anonymous' when installing
(or upgrading to) the first "new" master.

This assumes that the anonymous read ACI will be removed in a "new" IPA.

Part of the work for: https://fedorahosted.org/freeipa/ticket/3566

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When upgrading from an "old" IPA, or installing the first "new" replica,
we need to keep allowing anonymous access to many user attributes.

Add an optional 'fixup_function' to the managed permission templates,
and use it to set the bind rule type to 'anonymous' when installing
(or upgrading to) the first "new" master.

This assumes that the anonymous read ACI will be removed in a "new" IPA.

Part of the work for: https://fedorahosted.org/freeipa/ticket/3566

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>update_managed_permissions: Pass around anonymous ACI rather than its blacklist</title>
<updated>2014-05-26T10:12:35+00:00</updated>
<author>
<name>Petr Viktorin</name>
<email>pviktori@redhat.com</email>
</author>
<published>2014-04-29T19:15:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/pvoborni/public_git/freeipa.git/commit/?id=993c1c8557aafb890199b1c443ebd2d895ae6ba6'/>
<id>993c1c8557aafb890199b1c443ebd2d895ae6ba6</id>
<content type='text'>
It turns out the ACI object of the anonymous read ACI, rather than just the
list of its attributes, will be useful in the future.
Change the plugin so that the ACI object is passed around.

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It turns out the ACI object of the anonymous read ACI, rather than just the
list of its attributes, will be useful in the future.
Change the plugin so that the ACI object is passed around.

Reviewed-By: Martin Kosek &lt;mkosek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
