<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git, branch cakeysfix</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>Make sure remote hosts have our keys</title>
<updated>2017-05-03T11:35:53+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2017-03-31T15:22:45+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=06e65f8859164bc7e12a2c42d64b9f7c381a3219'/>
<id>06e65f8859164bc7e12a2c42d64b9f7c381a3219</id>
<content type='text'>
In complex replication setups a replica may try to obtain CA keys from a
host that is not the master we initially create the keys against.
In this case race conditions may happen due to replication. So we need
to make sure the server we are contacting to get the CA keys has our
keys in LDAP. We do this by waiting to positively fetch our encryption
public key (the last one we create) from the target host LDAP server.

Fixes: https://pagure.io/freeipa/issue/6838

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In complex replication setups a replica may try to obtain CA keys from a
host that is not the master we initially create the keys against.
In this case race conditions may happen due to replication. So we need
to make sure the server we are contacting to get the CA keys has our
keys in LDAP. We do this by waiting to positively fetch our encryption
public key (the last one we create) from the target host LDAP server.

Fixes: https://pagure.io/freeipa/issue/6838

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove the cachedproperty class</title>
<updated>2017-05-02T15:33:25+00:00</updated>
<author>
<name>Stanislav Laznicka</name>
<email>slaznick@redhat.com</email>
</author>
<published>2017-04-28T07:31:45+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=92313c9e9d37733feb79d1b1c825178f48d6c69c'/>
<id>92313c9e9d37733feb79d1b1c825178f48d6c69c</id>
<content type='text'>
The cachedproperty class was used in one special use-case where it only
caused issues. Let's get rid of it.

https://pagure.io/freeipa/issue/6878

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The cachedproperty class was used in one special use-case where it only
caused issues. Let's get rid of it.

https://pagure.io/freeipa/issue/6878

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Refresh Dogtag RestClient.ca_host property</title>
<updated>2017-05-02T15:33:25+00:00</updated>
<author>
<name>Stanislav Laznicka</name>
<email>slaznick@redhat.com</email>
</author>
<published>2017-04-27T10:51:30+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=0d406fcb784924bfe685729f3156efb8c902b947'/>
<id>0d406fcb784924bfe685729f3156efb8c902b947</id>
<content type='text'>
Refresh the ca_host property of the Dogtag's RestClient class when
it's requested as a context manager.

This solves the problem which would occur on DL0 when installing
CA which needs to perform a set of steps against itself accessing
8443 port. This port should however only be available locally so
trying to connect to remote master would fail. We need to make
sure the right CA host is accessed.

https://pagure.io/freeipa/issue/6878

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Refresh the ca_host property of the Dogtag's RestClient class when
it's requested as a context manager.

This solves the problem which would occur on DL0 when installing
CA which needs to perform a set of steps against itself accessing
8443 port. This port should however only be available locally so
trying to connect to remote master would fail. We need to make
sure the right CA host is accessed.

https://pagure.io/freeipa/issue/6878

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-client-install: remove extra space in pkinit_anchors definition</title>
<updated>2017-05-02T11:46:55+00:00</updated>
<author>
<name>Florence Blanc-Renaud</name>
<email>flo@redhat.com</email>
</author>
<published>2017-05-02T08:22:22+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=26dbab1fd4384b8f3999b153c2d94220cf541ad2'/>
<id>26dbab1fd4384b8f3999b153c2d94220cf541ad2</id>
<content type='text'>
ipa-client-install modifies /etc/krb5.conf and defines the following line:
    pkinit_anchors = FILE: /etc/ipa/ca.crt

The extra space between FILE: and /etc/ipa/ca.crt break pkinit.

https://pagure.io/freeipa/issue/6916

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
ipa-client-install modifies /etc/krb5.conf and defines the following line:
    pkinit_anchors = FILE: /etc/ipa/ca.crt

The extra space between FILE: and /etc/ipa/ca.crt break pkinit.

https://pagure.io/freeipa/issue/6916

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>kerberos session: use CA cert with full cert chain for obtaining cookie</title>
<updated>2017-05-02T11:42:52+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2017-04-25T15:19:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=c19196a0d3fc0a38c4c83cb8a7fde56e6bc310af'/>
<id>c19196a0d3fc0a38c4c83cb8a7fde56e6bc310af</id>
<content type='text'>
Http request performed in finalize_kerberos_acquisition doesn't use
CA certificate/certificate store with full certificate chain of IPA server.
So it might happen that in case that IPA is installed with externally signed
CA certificate, the call can fail because of certificate validation
and e.g. prevent session acquisition.

If it will fail for sure is not known - the use case was not discovered,
but it is faster and safer to fix preemptively.

https://pagure.io/freeipa/issue/6876

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Http request performed in finalize_kerberos_acquisition doesn't use
CA certificate/certificate store with full certificate chain of IPA server.
So it might happen that in case that IPA is installed with externally signed
CA certificate, the call can fail because of certificate validation
and e.g. prevent session acquisition.

If it will fail for sure is not known - the use case was not discovered,
but it is faster and safer to fix preemptively.

https://pagure.io/freeipa/issue/6876

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed typo in ipa-client-install output</title>
<updated>2017-05-02T11:41:20+00:00</updated>
<author>
<name>Thorsten Scherf</name>
<email>tscherf@redhat.com</email>
</author>
<published>2017-04-28T14:40:17+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=e3f849d541e8d054b0932d8ec1bd4c836e53c6f0'/>
<id>e3f849d541e8d054b0932d8ec1bd4c836e53c6f0</id>
<content type='text'>
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>restore: restart/reload gssproxy after restore</title>
<updated>2017-04-28T12:56:02+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2017-04-26T16:47:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=3a4c8e39c3e38ec651cfcbb3cac59e0e92e04fe0'/>
<id>3a4c8e39c3e38ec651cfcbb3cac59e0e92e04fe0</id>
<content type='text'>
So that gssproxy picks up new configuration and therefore related
usages like authentication of CLI against server works

https://pagure.io/freeipa/issue/6902

Reviewed-By: Tomas Krizek &lt;tkrizek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
So that gssproxy picks up new configuration and therefore related
usages like authentication of CLI against server works

https://pagure.io/freeipa/issue/6902

Reviewed-By: Tomas Krizek &lt;tkrizek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>automount install: fix checking of SSSD functionality on uninstall</title>
<updated>2017-04-28T11:41:56+00:00</updated>
<author>
<name>Petr Vobornik</name>
<email>pvoborni@redhat.com</email>
</author>
<published>2017-04-25T16:19:21+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=b4e447fa6fc7d659ae6a3b6285d4ddda0baa0be4'/>
<id>b4e447fa6fc7d659ae6a3b6285d4ddda0baa0be4</id>
<content type='text'>
Change in 2d4d1a9dc0ef2bbe86751768d6e6b009a52c0dc9 no longer initializes
api in `ipa-client-automount --uninstallation` Which caused error in
wait_for_sssd which gets realm from initialized API.

This patch initializes the API in a way that it doesn't download schema
on uninstallation and on installation it uses host keytab for it so it
no longer requires user's Kerberos credentials.

Also fix call of xxx_service_class_factory which requires api as param.

https://pagure.io/freeipa/issue/6861

Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
Reviewed-By: Tomas Krizek &lt;tkrizek@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Change in 2d4d1a9dc0ef2bbe86751768d6e6b009a52c0dc9 no longer initializes
api in `ipa-client-automount --uninstallation` Which caused error in
wait_for_sssd which gets realm from initialized API.

This patch initializes the API in a way that it doesn't download schema
on uninstallation and on installation it uses host keytab for it so it
no longer requires user's Kerberos credentials.

Also fix call of xxx_service_class_factory which requires api as param.

https://pagure.io/freeipa/issue/6861

Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
Reviewed-By: Tomas Krizek &lt;tkrizek@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>vault: piped input for ipa vault-add fails</title>
<updated>2017-04-28T11:19:51+00:00</updated>
<author>
<name>Florence Blanc-Renaud</name>
<email>flo@redhat.com</email>
</author>
<published>2017-04-27T16:20:06+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=d5c41ed4ad370c7d74296a830993a5bd3fd32e5f'/>
<id>d5c41ed4ad370c7d74296a830993a5bd3fd32e5f</id>
<content type='text'>
An exception is raised when using echo "Secret123\n" | ipa vault-add myvault

This happens because the code is using (string).decode(sys.stdin.encoding)
and sys.stdin.encoding is None when the input is read from a pipe.
The fix is using the prompt_password method defined by Backend.textui,
which gracefully handles this issue.

https://pagure.io/freeipa/issue/6907

Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Abhijeet Kasurde &lt;akasurde@redhat.com&gt;
Reviewed-By: Stanislav Laznicka &lt;slaznick@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
An exception is raised when using echo "Secret123\n" | ipa vault-add myvault

This happens because the code is using (string).decode(sys.stdin.encoding)
and sys.stdin.encoding is None when the input is read from a pipe.
The fix is using the prompt_password method defined by Backend.textui,
which gracefully handles this issue.

https://pagure.io/freeipa/issue/6907

Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Abhijeet Kasurde &lt;akasurde@redhat.com&gt;
Reviewed-By: Stanislav Laznicka &lt;slaznick@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not test anonymous PKINIT after install/upgrade</title>
<updated>2017-04-28T08:38:12+00:00</updated>
<author>
<name>Martin Babinsky</name>
<email>mbabinsk@redhat.com</email>
</author>
<published>2017-04-25T17:12:51+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=960e361f68a3d7acd9bcf16ec6fe8f6d5376c4ae'/>
<id>960e361f68a3d7acd9bcf16ec6fe8f6d5376c4ae</id>
<content type='text'>
Local FAST armoring will now work regardless of PKINIT status so there
is no need to explicitly test for working PKINIT. If there is, there
should be a test case for that.

https://pagure.io/freeipa/issue/6830

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Local FAST armoring will now work regardless of PKINIT status so there
is no need to explicitly test for working PKINIT. If there is, there
should be a test case for that.

https://pagure.io/freeipa/issue/6830

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
