<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/daemons/ipa-slapi-plugins, branch ipa-2-2</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>Fix migration code password setting.</title>
<updated>2012-05-17T15:18:12+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>ssorce@redhat.com</email>
</author>
<published>2012-05-17T14:33:43+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=f883b2547d887eac7976d0372f5b25d48a1b3a4d'/>
<id>f883b2547d887eac7976d0372f5b25d48a1b3a4d</id>
<content type='text'>
When we set a password we also need to make sure krbExtraData is set.
If not kadmin will later complain that the object is corrupted at password
change time.

Ticket: https://fedorahosted.org/freeipa/ticket/2764
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When we set a password we also need to make sure krbExtraData is set.
If not kadmin will later complain that the object is corrupted at password
change time.

Ticket: https://fedorahosted.org/freeipa/ticket/2764
</pre>
</div>
</content>
</entry>
<entry>
<title>Treat UPGs correctly in winsync replication</title>
<updated>2012-03-15T08:57:47+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2012-03-06T14:59:20+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=16918715dd4b964d5d861a3075b356918034e908'/>
<id>16918715dd4b964d5d861a3075b356918034e908</id>
<content type='text'>
IPA winsync plugin failed to replicate users when default user group
was non-posix even though User Private Groups (UPG) were enabled
on the server. Both their uidNumber and gidNumber were empty and
they missed essential object classes. When the default user group
was made posix and UPG was disabled it did not set gidNumber to
the default group gidNumber.

This patch improves this behavior to set gidNumber correctly
according to UPG configuration and the default group status
(posix/non-posix). 4 situations can occur, the following list
specifies what value is assigned to user gidNumber:
 1) Default group posix, UPG enabled: gidNumber = UPG gidNumber
 2) Default group posix, UPG disabled: gidNumber = default
    group gidNumber
 3) Default group non-posix, UPG enabled: gidNumber = UPG gidNumber
 4) Default group non-posix, UPG disabled: an error is printed to
    the dirsrv log as the gidNumber cannot be retrieved. User
    is replicated in the same way as before this patch, i.e.
    without essential object classes.

https://fedorahosted.org/freeipa/ticket/2436
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
IPA winsync plugin failed to replicate users when default user group
was non-posix even though User Private Groups (UPG) were enabled
on the server. Both their uidNumber and gidNumber were empty and
they missed essential object classes. When the default user group
was made posix and UPG was disabled it did not set gidNumber to
the default group gidNumber.

This patch improves this behavior to set gidNumber correctly
according to UPG configuration and the default group status
(posix/non-posix). 4 situations can occur, the following list
specifies what value is assigned to user gidNumber:
 1) Default group posix, UPG enabled: gidNumber = UPG gidNumber
 2) Default group posix, UPG disabled: gidNumber = default
    group gidNumber
 3) Default group non-posix, UPG enabled: gidNumber = UPG gidNumber
 4) Default group non-posix, UPG disabled: an error is printed to
    the dirsrv log as the gidNumber cannot be retrieved. User
    is replicated in the same way as before this patch, i.e.
    without essential object classes.

https://fedorahosted.org/freeipa/ticket/2436
</pre>
</div>
</content>
</entry>
<entry>
<title>Improve password change error message</title>
<updated>2012-02-03T16:22:24+00:00</updated>
<author>
<name>Martin Kosek</name>
<email>mkosek@redhat.com</email>
</author>
<published>2012-02-02T10:55:14+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=55cd9e7dbec3d74c1856fc177bb3d64010761cc2'/>
<id>55cd9e7dbec3d74c1856fc177bb3d64010761cc2</id>
<content type='text'>
User always receives the same error message if he changes his password
via "ipa passwd" command and the new password fails configured
password policy. He then has to investigate on his own the actual
reason why was the policy violated. This patch improves our SLAPI PWD
plugins to provide a better error message explaining the violation
reason.

https://fedorahosted.org/freeipa/ticket/2067
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
User always receives the same error message if he changes his password
via "ipa passwd" command and the new password fails configured
password policy. He then has to investigate on his own the actual
reason why was the policy violated. This patch improves our SLAPI PWD
plugins to provide a better error message explaining the violation
reason.

https://fedorahosted.org/freeipa/ticket/2067
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove ipa_get_random_salt() from ipapwd_encoding.c</title>
<updated>2012-01-11T17:04:23+00:00</updated>
<author>
<name>Rob Crittenden</name>
<email>rcritten@redhat.com</email>
</author>
<published>2012-01-10T22:40:55+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=1dadd06067acbf21ce1bd2ca73c082b21f907579'/>
<id>1dadd06067acbf21ce1bd2ca73c082b21f907579</id>
<content type='text'>
This appeared only in the 2.1 branch and is not needed
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This appeared only in the 2.1 branch and is not needed
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove include for errno.h that was specific to 2.1 branch</title>
<updated>2012-01-11T17:04:22+00:00</updated>
<author>
<name>Rob Crittenden</name>
<email>rcritten@redhat.com</email>
</author>
<published>2012-01-10T22:00:23+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=39d0488f1b0d025cc8c7de3229228cc6a6fac6eb'/>
<id>39d0488f1b0d025cc8c7de3229228cc6a6fac6eb</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/2038
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/2038
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix CID 10745: Unchecked return value</title>
<updated>2012-01-11T17:04:15+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>ssorce@redhat.com</email>
</author>
<published>2011-11-03T13:57:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=24a9cb6fc9392c1249923a8e339194877cc30df6'/>
<id>24a9cb6fc9392c1249923a8e339194877cc30df6</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/2036
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/2036
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix CID 10743: Unchecked return value</title>
<updated>2012-01-11T17:04:15+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>ssorce@redhat.com</email>
</author>
<published>2011-11-03T14:05:21+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=0ef4ead356b0a0e8e28d438d836ae6ad853508e7'/>
<id>0ef4ead356b0a0e8e28d438d836ae6ad853508e7</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/2036
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/2036
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix CID 10742: Unchecked return value</title>
<updated>2012-01-11T17:04:15+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>ssorce@redhat.com</email>
</author>
<published>2011-11-03T14:06:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=0a1da0d7b2876508e8ae19b70df250131f6ee6ce'/>
<id>0a1da0d7b2876508e8ae19b70df250131f6ee6ce</id>
<content type='text'>
https://fedorahosted.org/freeipa/ticket/2036
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://fedorahosted.org/freeipa/ticket/2036
</pre>
</div>
</content>
</entry>
<entry>
<title>include &lt;stdint.h&gt; for uintptr_t</title>
<updated>2012-01-11T17:04:13+00:00</updated>
<author>
<name>Marko Myllynen</name>
<email>myllynen@redhat.com</email>
</author>
<published>2011-09-21T12:03:55+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=d49a6c809542e276ff5f2046d8791dda90634cb7'/>
<id>d49a6c809542e276ff5f2046d8791dda90634cb7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>ipa-pwd-extop: Allow kadmin to set krb keys</title>
<updated>2012-01-11T17:04:13+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>ssorce@redhat.com</email>
</author>
<published>2011-07-07T17:30:15+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=7bd3a49864f5014f524f7b52bffe5da6afbf7e4f'/>
<id>7bd3a49864f5014f524f7b52bffe5da6afbf7e4f</id>
<content type='text'>
Prevent the ipa-pwd-extop plugin from re-generating keys when kadimn is storing
a new set of keys. Only generate the userPassword and sambaXXPassword hashes.
Also avoid checking policies in this case and if history is provided avoid
regenerating the passwordHistory too.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Prevent the ipa-pwd-extop plugin from re-generating keys when kadimn is storing
a new set of keys. Only generate the userPassword and sambaXXPassword hashes.
Also avoid checking policies in this case and if history is provided avoid
regenerating the passwordHistory too.
</pre>
</div>
</content>
</entry>
</feed>
