<feed xmlns='http://www.w3.org/2005/Atom'>
<title>.git/install/conf, branch master</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/'/>
<entry>
<title>Use only system fonts</title>
<updated>2014-01-21T11:05:09+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2013-12-04T15:15:20+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=3e0ae972685aefa20ec619b17a7c2b7f7c2f50d9'/>
<id>3e0ae972685aefa20ec619b17a7c2b7f7c2f50d9</id>
<content type='text'>
This commit changes how fonts are used.

- remove usage of bundled fonts and only system fonts are used instead
  - by using alias in httpd conf
  - by using local("Font Name") directive in font-face
- removed usage of overpass font
- redefined Open Sans font-face declarations. Note: upstream is doing the
  same change so we will be fine on upgrade.
- introduce variable.less for variable definitions and overrides. This file
  will be very useful when we upgrade to newer RCUE so we will be able to
  redefine their and bootstrap's variables.

Fixes: https://fedorahosted.org/freeipa/ticket/2861
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This commit changes how fonts are used.

- remove usage of bundled fonts and only system fonts are used instead
  - by using alias in httpd conf
  - by using local("Font Name") directive in font-face
- removed usage of overpass font
- redefined Open Sans font-face declarations. Note: upstream is doing the
  same change so we will be fine on upgrade.
- introduce variable.less for variable definitions and overrides. This file
  will be very useful when we upgrade to newer RCUE so we will be able to
  redefine their and bootstrap's variables.

Fixes: https://fedorahosted.org/freeipa/ticket/2861
</pre>
</div>
</content>
</entry>
<entry>
<title>Load updated Web UI files after server upgrade</title>
<updated>2013-10-16T16:06:30+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2013-08-29T13:19:02+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=b4fc6f4ba880c210cf1a439036db4695cc74c5ae'/>
<id>b4fc6f4ba880c210cf1a439036db4695cc74c5ae</id>
<content type='text'>
Issue:
* There was no caching policy specified.
* -&gt; Browsers use their own default policy.
* -&gt; After upgrade, some Web UI files might have been actualized some not.
* -&gt; With schema change may result into weird bugs in Web UI

Solution considerations:

1. Detect server version change and hard-reload at runtime
Detection is easy. Problem is the reload. Obvious candidate 'window.location.reload(true)' works in Firefox but not in Chrome because expected behavior when parameter is used is not in standard and therefore Chromium/WebKit authors did not implement it.

2. Application Cache
HTML 5 technology which lets web apps to run offline. Besides weird issues with event handlers which I encountered, this would be an ideal candidate. Simple change of manifest file would lead to reload of all files (requires reload of page to used the new files).

Showstopper was usage with untrusted certificate. If user did not add exception for the cert or its CA and would visit the page for a second time, all AJAX calls would fail.

3. Set Expires to now() for everything
Web UI rarely changes so this is an overkill. Setting it to different value is not a solution either. We can't predict when the upgrade will happen and when new Web UI will be needed.

Solution:
* Implemented a mini loader which loads basic resources. Dojo loader takes action after Dojo is loaded.
* The loader adds a version parameter (?v=__NUM_VERSION__) to all requests.
* Version is defined in the loader. It's set to current in `make version-update`.
* All static pages use this loader to fetch their resources.
* Version is also passed to dojo loader as cache-bust for the same effect.
* Expire header was set to 'access time plus 1 year' for /ui folder. Exceptions are HTML files and loader (set to immediate expiration).

Possible issues:
* Images are cached but not requested with version param.
  * Images with version and without are considered different
  * -&gt; We would have to attach version to all URIs - in CSS and in JS. But we should avoid changing jQuery UI CSS.
  * Proposed solution is to change image name when changing image. Image change is done rarely.
* Version is set by build and therefore updated just on server update. It might cause trouble with different update schedule of plugins.
  * No action taken to address this issue yet.
  * We might leave it on plugin devs (own .conf in /etc/httpd/conf.d/)
  * or set expires to now for all plugins
* running `make version-update` is required in order to use static version of UI for testing

https://fedorahosted.org/freeipa/ticket/3798
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Issue:
* There was no caching policy specified.
* -&gt; Browsers use their own default policy.
* -&gt; After upgrade, some Web UI files might have been actualized some not.
* -&gt; With schema change may result into weird bugs in Web UI

Solution considerations:

1. Detect server version change and hard-reload at runtime
Detection is easy. Problem is the reload. Obvious candidate 'window.location.reload(true)' works in Firefox but not in Chrome because expected behavior when parameter is used is not in standard and therefore Chromium/WebKit authors did not implement it.

2. Application Cache
HTML 5 technology which lets web apps to run offline. Besides weird issues with event handlers which I encountered, this would be an ideal candidate. Simple change of manifest file would lead to reload of all files (requires reload of page to used the new files).

Showstopper was usage with untrusted certificate. If user did not add exception for the cert or its CA and would visit the page for a second time, all AJAX calls would fail.

3. Set Expires to now() for everything
Web UI rarely changes so this is an overkill. Setting it to different value is not a solution either. We can't predict when the upgrade will happen and when new Web UI will be needed.

Solution:
* Implemented a mini loader which loads basic resources. Dojo loader takes action after Dojo is loaded.
* The loader adds a version parameter (?v=__NUM_VERSION__) to all requests.
* Version is defined in the loader. It's set to current in `make version-update`.
* All static pages use this loader to fetch their resources.
* Version is also passed to dojo loader as cache-bust for the same effect.
* Expire header was set to 'access time plus 1 year' for /ui folder. Exceptions are HTML files and loader (set to immediate expiration).

Possible issues:
* Images are cached but not requested with version param.
  * Images with version and without are considered different
  * -&gt; We would have to attach version to all URIs - in CSS and in JS. But we should avoid changing jQuery UI CSS.
  * Proposed solution is to change image name when changing image. Image change is done rarely.
* Version is set by build and therefore updated just on server update. It might cause trouble with different update schedule of plugins.
  * No action taken to address this issue yet.
  * We might leave it on plugin devs (own .conf in /etc/httpd/conf.d/)
  * or set expires to now for all plugins
* running `make version-update` is required in order to use static version of UI for testing

https://fedorahosted.org/freeipa/ticket/3798
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not redirect to https in /ipa/ui on non-HTML files</title>
<updated>2013-06-26T13:02:13+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2013-06-24T15:44:15+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=093fa2daa03c8071ec65442c926c23ec34ae7184'/>
<id>093fa2daa03c8071ec65442c926c23ec34ae7184</id>
<content type='text'>
Those resources are needed by page which has to use http(browser config) prior to acceptance of CA cert.

https://fedorahosted.org/freeipa/ticket/3748
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Those resources are needed by page which has to use http(browser config) prior to acceptance of CA cert.

https://fedorahosted.org/freeipa/ticket/3748
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not redirect ipa/crl to HTTPS</title>
<updated>2013-06-20T10:56:01+00:00</updated>
<author>
<name>Tomas Babej</name>
<email>tbabej@redhat.com</email>
</author>
<published>2013-06-20T08:55:39+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=6118b73fab1bfbbbaf0ce10ebb48fb3864b90a5e'/>
<id>6118b73fab1bfbbbaf0ce10ebb48fb3864b90a5e</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3713
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3713
</pre>
</div>
</content>
</entry>
<entry>
<title>Generate plugin index dynamically</title>
<updated>2013-05-06T14:22:30+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2013-04-23T17:54:21+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=c72d0f5075c63df0d75331d5afd0da2dc752ec14'/>
<id>c72d0f5075c63df0d75331d5afd0da2dc752ec14</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/3235
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/3235
</pre>
</div>
</content>
</entry>
<entry>
<title>Update pki proxy configuration</title>
<updated>2013-05-06T11:33:52+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2013-05-06T07:22:27+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=77e4f445cce087a915533ad3ae2e35e93db762c5'/>
<id>77e4f445cce087a915533ad3ae2e35e93db762c5</id>
<content type='text'>
Replicas with Dogtag pki-ca 10.0.2 CA require access to additional
Dogtag REST API calls. Update pki proxy configuration to allow that.

https://fedorahosted.org/freeipa/ticket/3601
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Replicas with Dogtag pki-ca 10.0.2 CA require access to additional
Dogtag REST API calls. Update pki proxy configuration to allow that.

https://fedorahosted.org/freeipa/ticket/3601
</pre>
</div>
</content>
</entry>
<entry>
<title>Update mod_wsgi socket directory</title>
<updated>2013-03-29T07:59:50+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2013-03-20T15:40:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=d27878ce9d274c6e9d10fbdd07fde7589e50fcda'/>
<id>d27878ce9d274c6e9d10fbdd07fde7589e50fcda</id>
<content type='text'>
Fedora 19 splitted /var/run and /run directories. Update mod_wsgi
configuration so that it generates its sockets in the right one.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fedora 19 splitted /var/run and /run directories. Update mod_wsgi
configuration so that it generates its sockets in the right one.
</pre>
</div>
</content>
</entry>
<entry>
<title>Enable mod_deflate</title>
<updated>2013-01-17T16:19:29+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2012-12-04T12:24:58+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=c19af96cb8b1e272fbbd0f478ff203141a9572f7'/>
<id>c19af96cb8b1e272fbbd0f478ff203141a9572f7</id>
<content type='text'>
Enabled mod_deflate for:
* text/html (HTML files)
* text/plain (for future use)
* text/css (CSS files)
* text/xml (XML RPC)
* application/javascript (JavaScript files)
* application/json (JSON RPC)
* application/x-font-woff (woff fonts)

Added proper mime type for woff fonts.
Disabled etag header because it doesn't work with mod_deflate.

https://fedorahosted.org/freeipa/ticket/3326
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Enabled mod_deflate for:
* text/html (HTML files)
* text/plain (for future use)
* text/css (CSS files)
* text/xml (XML RPC)
* application/javascript (JavaScript files)
* application/json (JSON RPC)
* application/x-font-woff (woff fonts)

Added proper mime type for woff fonts.
Disabled etag header because it doesn't work with mod_deflate.

https://fedorahosted.org/freeipa/ticket/3326
</pre>
</div>
</content>
</entry>
<entry>
<title>Configure the initial CA as the CRL generator.</title>
<updated>2012-10-09T23:24:43+00:00</updated>
<author>
<name>Rob Crittenden</name>
<email>rcritten@redhat.com</email>
</author>
<published>2012-10-09T14:40:20+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=392097f20673708a684da168aec302da7ccda9a6'/>
<id>392097f20673708a684da168aec302da7ccda9a6</id>
<content type='text'>
Any installed clones will have CRL generation explicitly disabled.
It is a manual process to make a different CA the CRL generator.
There should be only one.

https://fedorahosted.org/freeipa/ticket/3051
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Any installed clones will have CRL generation explicitly disabled.
It is a manual process to make a different CA the CRL generator.
There should be only one.

https://fedorahosted.org/freeipa/ticket/3051
</pre>
</div>
</content>
</entry>
<entry>
<title>Move CRL publish directory to IPA owned directory</title>
<updated>2012-10-09T14:00:01+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2012-10-08T13:58:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rcritten/public_git/freeipa.git/.git/commit/?id=74ebd0fd75fababe7d080080ef019b53e96c0c4f'/>
<id>74ebd0fd75fababe7d080080ef019b53e96c0c4f</id>
<content type='text'>
Currently, CRL files are being exported to /var/lib/pki-ca
sub-directory, which is then served by httpd to clients. However,
this approach has several disadvantages:
 * We depend on pki-ca directory structure and relevant permissions.
   If pki-ca changes directory structure or permissions on upgrade,
   IPA may break. This is also a root cause of the latest error, where
   the pki-ca directory does not have X permission for others and CRL
   publishing by httpd breaks.
 * Since the directory is not static and is generated during
   ipa-server-install, RPM upgrade of IPA packages report errors when
   defining SELinux policy for these directories.

Move CRL publish directory to /var/lib/ipa/pki-ca/publish (common for
both dogtag 9 and 10) which is created on RPM upgrade, i.e. SELinux policy
configuration does not report any error. The new CRL publish directory
is used for both new IPA installs and upgrades, where contents of
the directory (CRLs) is first migrated to the new location and then the
actual configuration change is made.

https://fedorahosted.org/freeipa/ticket/3144
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Currently, CRL files are being exported to /var/lib/pki-ca
sub-directory, which is then served by httpd to clients. However,
this approach has several disadvantages:
 * We depend on pki-ca directory structure and relevant permissions.
   If pki-ca changes directory structure or permissions on upgrade,
   IPA may break. This is also a root cause of the latest error, where
   the pki-ca directory does not have X permission for others and CRL
   publishing by httpd breaks.
 * Since the directory is not static and is generated during
   ipa-server-install, RPM upgrade of IPA packages report errors when
   defining SELinux policy for these directories.

Move CRL publish directory to /var/lib/ipa/pki-ca/publish (common for
both dogtag 9 and 10) which is created on RPM upgrade, i.e. SELinux policy
configuration does not report any error. The new CRL publish directory
is used for both new IPA installs and upgrades, where contents of
the directory (CRLs) is first migrated to the new location and then the
actual configuration change is made.

https://fedorahosted.org/freeipa/ticket/3144
</pre>
</div>
</content>
</entry>
</feed>
