<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/ipaserver, branch master</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/'/>
<entry>
<title>Fix incorrect check for principal type when evaluating CA ACLs</title>
<updated>2016-07-01T11:16:23+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2016-07-01T09:55:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=0ade41abbad324d8c54449f3b1024a7651dc259d'/>
<id>0ade41abbad324d8c54449f3b1024a7651dc259d</id>
<content type='text'>
This error prevented hosts to request certificates for themselves.

https://fedorahosted.org/freeipa/ticket/3864

Reviewed-By: Petr Spacek &lt;pspacek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This error prevented hosts to request certificates for themselves.

https://fedorahosted.org/freeipa/ticket/3864

Reviewed-By: Petr Spacek &lt;pspacek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow unexpiring passwords</title>
<updated>2016-07-01T09:22:02+00:00</updated>
<author>
<name>David Kupka</name>
<email>dkupka@redhat.com</email>
</author>
<published>2016-06-30T06:52:33+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=d2cb9ed327ee4003598d5e45d80ab7918b89eeed'/>
<id>d2cb9ed327ee4003598d5e45d80ab7918b89eeed</id>
<content type='text'>
Treat maxlife=0 in password policy as "never expire". Delete
krbPasswordExpiration in user entry when password should never expire.

https://fedorahosted.org/freeipa/ticket/2795

Reviewed-By: Thierry Bordaz &lt;tbordaz@redhat.com&gt;
Reviewed-By: Pavel Vomacka &lt;pvomacka@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Treat maxlife=0 in password policy as "never expire". Delete
krbPasswordExpiration in user entry when password should never expire.

https://fedorahosted.org/freeipa/ticket/2795

Reviewed-By: Thierry Bordaz &lt;tbordaz@redhat.com&gt;
Reviewed-By: Pavel Vomacka &lt;pvomacka@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix upgrade when Dogtag also upgraded from 10.2 -&gt; 10.3</title>
<updated>2016-07-01T09:09:53+00:00</updated>
<author>
<name>Fraser Tweedale</name>
<email>ftweedal@redhat.com</email>
</author>
<published>2016-06-30T11:01:07+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=3691e39a62da5134f911f6a798f79a3a2ae0c025'/>
<id>3691e39a62da5134f911f6a798f79a3a2ae0c025</id>
<content type='text'>
ipa-server-upgrade from pre-lightweight CAs version fails when
Dogtag is also being upgraded from pre-lightweight CAs version,
because Dogtag needs to be restarted after adding the lightweight
CAs container, before requesting information about the host
authority.

Move the addition of the Dogtag lightweight CAs container entry a
bit earlier in the upgrade procedure, ensuring restart.

Fixes: https://fedorahosted.org/freeipa/ticket/6011
Reviewed-By: Martin Babinsky &lt;mbabinsk@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
ipa-server-upgrade from pre-lightweight CAs version fails when
Dogtag is also being upgraded from pre-lightweight CAs version,
because Dogtag needs to be restarted after adding the lightweight
CAs container, before requesting information about the host
authority.

Move the addition of the Dogtag lightweight CAs container entry a
bit earlier in the upgrade procedure, ensuring restart.

Fixes: https://fedorahosted.org/freeipa/ticket/6011
Reviewed-By: Martin Babinsky &lt;mbabinsk@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix internal errors in host-add and other commands caused by DNS resolution</title>
<updated>2016-07-01T08:35:39+00:00</updated>
<author>
<name>Petr Spacek</name>
<email>pspacek@redhat.com</email>
</author>
<published>2016-06-30T18:41:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=5e78b54d7c532bec0ee5a4ce3f1b6d6c94d17c51'/>
<id>5e78b54d7c532bec0ee5a4ce3f1b6d6c94d17c51</id>
<content type='text'>
Previously resolver was returning CheckedIPAddress objects. This
internal server error in cases where DNS actually returned reserved IP
addresses.

Now the resolver is returning UnsafeIPAddress objects which do syntactic
checks but do not filter IP addresses.

From now on we can decide if some IP address should be accepted as-is or
if it needs to be contrained to some subset of IP addresses using
CheckedIPAddress class.

This regression was caused by changes for
https://fedorahosted.org/freeipa/ticket/5710

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Previously resolver was returning CheckedIPAddress objects. This
internal server error in cases where DNS actually returned reserved IP
addresses.

Now the resolver is returning UnsafeIPAddress objects which do syntactic
checks but do not filter IP addresses.

From now on we can decide if some IP address should be accepted as-is or
if it needs to be contrained to some subset of IP addresses using
CheckedIPAddress class.

This regression was caused by changes for
https://fedorahosted.org/freeipa/ticket/5710

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add --cn option to cert-status</title>
<updated>2016-07-01T08:05:16+00:00</updated>
<author>
<name>Fraser Tweedale</name>
<email>ftweedal@redhat.com</email>
</author>
<published>2016-07-01T04:42:37+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=4844eaec197690e21c6cf44743df7f456d0e185d'/>
<id>4844eaec197690e21c6cf44743df7f456d0e185d</id>
<content type='text'>
Add the 'cacn' option to the cert-status command.  Right now there
is nothing we need to (or can) do with it, but we add it anyway for
future use.

Fixes: https://fedorahosted.org/freeipa/ticket/5999
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add the 'cacn' option to the cert-status command.  Right now there
is nothing we need to (or can) do with it, but we add it anyway for
future use.

Fixes: https://fedorahosted.org/freeipa/ticket/5999
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add widgets for kerberos aliases</title>
<updated>2016-07-01T07:39:49+00:00</updated>
<author>
<name>Pavel Vomacka</name>
<email>pvomacka@redhat.com</email>
</author>
<published>2016-06-30T12:34:33+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=4bc2e3164fbc4fdbbd4ecd1d26001a5d4671dd94'/>
<id>4bc2e3164fbc4fdbbd4ecd1d26001a5d4671dd94</id>
<content type='text'>
Create own custom_command_multivalued_widget for kerberos aliases.

https://fedorahosted.org/freeipa/ticket/5927

Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Create own custom_command_multivalued_widget for kerberos aliases.

https://fedorahosted.org/freeipa/ticket/5927

Reviewed-By: Petr Vobornik &lt;pvoborni@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Unify display of principal names/aliases across entities</title>
<updated>2016-07-01T07:37:25+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2016-06-29T12:54:54+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=acf2234ebc8609a35a8f45598d5d817cbdbff121'/>
<id>acf2234ebc8609a35a8f45598d5d817cbdbff121</id>
<content type='text'>
Since now users, hosts, and service all support assigning multiple principal
aliases to them, the display of kerberos principal names should be consistent
across all these objects. Principal aliases and canonical names will now be
displayed in all add, mod, show, and find operations.

https://fedorahosted.org/freeipa/ticket/3864

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since now users, hosts, and service all support assigning multiple principal
aliases to them, the display of kerberos principal names should be consistent
across all these objects. Principal aliases and canonical names will now be
displayed in all add, mod, show, and find operations.

https://fedorahosted.org/freeipa/ticket/3864

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Provide API for management of host, service, and user principal aliases</title>
<updated>2016-07-01T07:37:25+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2016-06-23T18:06:42+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=e6ff83e3610d553f6ff98e3adbfbe3c6984b2f17'/>
<id>e6ff83e3610d553f6ff98e3adbfbe3c6984b2f17</id>
<content type='text'>
New commands (*-{add,remove}-principal [PKEY] [PRINCIPAL ...])
were added to manage principal aliases.

'add' commands will check the following:
* the correct principal type is supplied as an alias
* the principals have correct realm and the realm/alternative suffix (e.g.
  e-mail) do not overlap with those of trusted AD domains

If the entry does not have canonical principal name, the first returned
principal name will be set as one. This is mostly to smoothly operate on
entries created on older servers.

'remove' commands will check that there is at least one principal alias equal
to the canonical name left on the entry.

See also: http://www.freeipa.org/page/V4/Kerberos_principal_aliases

https://fedorahosted.org/freeipa/ticket/1365
https://fedorahosted.org/freeipa/ticket/3961
https://fedorahosted.org/freeipa/ticket/5413

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
New commands (*-{add,remove}-principal [PKEY] [PRINCIPAL ...])
were added to manage principal aliases.

'add' commands will check the following:
* the correct principal type is supplied as an alias
* the principals have correct realm and the realm/alternative suffix (e.g.
  e-mail) do not overlap with those of trusted AD domains

If the entry does not have canonical principal name, the first returned
principal name will be set as one. This is mostly to smoothly operate on
entries created on older servers.

'remove' commands will check that there is at least one principal alias equal
to the canonical name left on the entry.

See also: http://www.freeipa.org/page/V4/Kerberos_principal_aliases

https://fedorahosted.org/freeipa/ticket/1365
https://fedorahosted.org/freeipa/ticket/3961
https://fedorahosted.org/freeipa/ticket/5413

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Make framework consider krbcanonicalname as service primary key</title>
<updated>2016-07-01T07:37:25+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2016-06-23T18:01:34+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=a28d312796839e3413c98ee37d34ccc892e85357'/>
<id>a28d312796839e3413c98ee37d34ccc892e85357</id>
<content type='text'>
The framework does not allow single param to appear as both positional
argument and option in a single command, or to represent two different
positional arguments for that matter. Since principal aliases shall go to
krbprincipalname attribute, the framework has to be tricked to believe
krbcanonicalname is the service's primary key. The entry DN stored in LDAP
remains the same.

https://fedorahosted.org/freeipa/ticket/1365

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The framework does not allow single param to appear as both positional
argument and option in a single command, or to represent two different
positional arguments for that matter. Since principal aliases shall go to
krbprincipalname attribute, the framework has to be tricked to believe
krbcanonicalname is the service's primary key. The entry DN stored in LDAP
remains the same.

https://fedorahosted.org/freeipa/ticket/1365

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow for commands that use positional parameters to add/remove attributes</title>
<updated>2016-07-01T07:37:25+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2016-06-23T17:14:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/sbose/public_git/freeipa.git/commit/?id=750a392fe22aa8ddcb21077e8c24b96d36ecf20c'/>
<id>750a392fe22aa8ddcb21077e8c24b96d36ecf20c</id>
<content type='text'>
Commands that modify a single multivalued attribute of an entry should use
positional parameters to specify both the primary key and the values to
add/remove. Named options are redundant in this case.

The `--certificate option` of `*-add/remove-cert` commands was turned
mandatory to avoid EmptyModlist when it is omitted.

https://fedorahosted.org/freeipa/ticket/3961
https://fedorahosted.org/freeipa/ticket/5413

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Commands that modify a single multivalued attribute of an entry should use
positional parameters to specify both the primary key and the values to
add/remove. Named options are redundant in this case.

The `--certificate option` of `*-add/remove-cert` commands was turned
mandatory to avoid EmptyModlist when it is omitted.

https://fedorahosted.org/freeipa/ticket/3961
https://fedorahosted.org/freeipa/ticket/5413

Reviewed-By: David Kupka &lt;dkupka@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
