<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/ipaserver/plugins, branch cakeysfix</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>Refresh Dogtag RestClient.ca_host property</title>
<updated>2017-05-02T15:33:25+00:00</updated>
<author>
<name>Stanislav Laznicka</name>
<email>slaznick@redhat.com</email>
</author>
<published>2017-04-27T10:51:30+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=0d406fcb784924bfe685729f3156efb8c902b947'/>
<id>0d406fcb784924bfe685729f3156efb8c902b947</id>
<content type='text'>
Refresh the ca_host property of the Dogtag's RestClient class when
it's requested as a context manager.

This solves the problem which would occur on DL0 when installing
CA which needs to perform a set of steps against itself accessing
8443 port. This port should however only be available locally so
trying to connect to remote master would fail. We need to make
sure the right CA host is accessed.

https://pagure.io/freeipa/issue/6878

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Refresh the ca_host property of the Dogtag's RestClient class when
it's requested as a context manager.

This solves the problem which would occur on DL0 when installing
CA which needs to perform a set of steps against itself accessing
8443 port. This port should however only be available locally so
trying to connect to remote master would fail. We need to make
sure the right CA host is accessed.

https://pagure.io/freeipa/issue/6878

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Vault: Explicitly default to 3DES CBC</title>
<updated>2017-04-28T06:25:03+00:00</updated>
<author>
<name>Christian Heimes</name>
<email>cheimes@redhat.com</email>
</author>
<published>2017-04-26T16:15:40+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=5197422ef65e7239fc56c562ab87d99388a38a8d'/>
<id>5197422ef65e7239fc56c562ab87d99388a38a8d</id>
<content type='text'>
The server-side plugin for IPA Vault relied on the fact that the default
oid for encryption algorithm is 3DES in CBC mode (DES-EDE3-CBC). Dogtag
10.4 has changed the default from 3DES to AES. Pass the correct
algorithm OID to KeyClient.archive_encrypted_data().

Closes: https://pagure.io/freeipa/issue/6899
Signed-off-by: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Fraser Tweedale &lt;ftweedal@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The server-side plugin for IPA Vault relied on the fact that the default
oid for encryption algorithm is 3DES in CBC mode (DES-EDE3-CBC). Dogtag
10.4 has changed the default from 3DES to AES. Pass the correct
algorithm OID to KeyClient.archive_encrypted_data().

Closes: https://pagure.io/freeipa/issue/6899
Signed-off-by: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Fraser Tweedale &lt;ftweedal@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Update get_attr_filter in LDAPSearch to handle nsaccountlock user searches</title>
<updated>2017-04-26T10:20:42+00:00</updated>
<author>
<name>Gabe</name>
<email>redhatrises@gmail.com</email>
</author>
<published>2017-04-25T13:51:17+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=38276d3473ecf2a4cc5b5e2a107347f046625626'/>
<id>38276d3473ecf2a4cc5b5e2a107347f046625626</id>
<content type='text'>
- Update get_attr_filter in LDAPSearch to handle nsaccountlock by setting the default value for
  nsaccountlock to false as well as update the filter to check for the default value
- Remove pytest xfail for test_find_enabled_user

https://pagure.io/freeipa/issue/6896

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
- Update get_attr_filter in LDAPSearch to handle nsaccountlock by setting the default value for
  nsaccountlock to false as well as update the filter to check for the default value
- Remove pytest xfail for test_find_enabled_user

https://pagure.io/freeipa/issue/6896

Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>cert: defer cert-find result post-processing</title>
<updated>2017-04-19T11:28:27+00:00</updated>
<author>
<name>Jan Cholasta</name>
<email>jcholast@redhat.com</email>
</author>
<published>2017-03-30T08:33:30+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=eb6d4c3037d0cc269a7924745f1cbd8f647e6e1a'/>
<id>eb6d4c3037d0cc269a7924745f1cbd8f647e6e1a</id>
<content type='text'>
Rather than post-processing the results of each internal search,
post-process the combined result.

This avoids expensive per-certificate searches when cert-find is executed
with the --all option on certificates which won't even be included in the
combined result.

https://pagure.io/freeipa/issue/6808

Reviewed-By: Stanislav Laznicka &lt;slaznick@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Rather than post-processing the results of each internal search,
post-process the combined result.

This avoids expensive per-certificate searches when cert-find is executed
with the --all option on certificates which won't even be included in the
combined result.

https://pagure.io/freeipa/issue/6808

Reviewed-By: Stanislav Laznicka &lt;slaznick@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>trust: always use oddjobd helper for fetching trust information</title>
<updated>2017-04-11T12:16:39+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2017-04-05T09:37:10+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=e560899cce20ca7773a5ce46a1c29db1349e8ec7'/>
<id>e560899cce20ca7773a5ce46a1c29db1349e8ec7</id>
<content type='text'>
Since introduction of privilege separation in IPA framework none of the
operations that require direct access to the framework's credentials can
be done. All authentication has to be performed with GSSAPI.

As result, we cannot obtain TGT for HTTP/.. principal with kinit
anymore, so it is better to re-route all types of trust to oddjobd
helper and get rid of casing out two-way trust.

Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1438366

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since introduction of privilege separation in IPA framework none of the
operations that require direct access to the framework's credentials can
be done. All authentication has to be performed with GSSAPI.

As result, we cannot obtain TGT for HTTP/.. principal with kinit
anymore, so it is better to re-route all types of trust to oddjobd
helper and get rid of casing out two-way trust.

Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1438366

Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>idrange-add: properly handle empty --dom-name option</title>
<updated>2017-04-05T08:15:51+00:00</updated>
<author>
<name>Florence Blanc-Renaud</name>
<email>flo@redhat.com</email>
</author>
<published>2017-03-28T14:02:45+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=70743c8c48db54309a09d510b3a5d8ae86c29e58'/>
<id>70743c8c48db54309a09d510b3a5d8ae86c29e58</id>
<content type='text'>
When idrange-add is called with --dom-name=, the CLI exits with
ipa: ERROR: an internal error has occurred
This happens because the code checks if the option is provided but does not
check if the value is None.

We need to handle empty dom-name as if the option was not specified.

https://pagure.io/freeipa/issue/6404

Reviewed-By: Stanislav Laznicka &lt;slaznick@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When idrange-add is called with --dom-name=, the CLI exits with
ipa: ERROR: an internal error has occurred
This happens because the code checks if the option is provided but does not
check if the value is None.

We need to handle empty dom-name as if the option was not specified.

https://pagure.io/freeipa/issue/6404

Reviewed-By: Stanislav Laznicka &lt;slaznick@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add an option to build ipaserver wheels</title>
<updated>2017-04-03T11:08:52+00:00</updated>
<author>
<name>Christian Heimes</name>
<email>cheimes@redhat.com</email>
</author>
<published>2017-01-17T11:16:25+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=ae1c2086db3efb51341025ae25f9b39060868ac1'/>
<id>ae1c2086db3efb51341025ae25f9b39060868ac1</id>
<content type='text'>
To create a wheel bundle with ipaserver and its dependencies:

    make wheel_bundle IPA_SERVER_WHEELS=1

To include additional dependencies:

    make wheel_bundle IPA_EXTRA_WHEELS=ipatests[webui]

Signed-off-by: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
To create a wheel bundle with ipaserver and its dependencies:

    make wheel_bundle IPA_SERVER_WHEELS=1

To include additional dependencies:

    make wheel_bundle IPA_EXTRA_WHEELS=ipatests[webui]

Signed-off-by: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Conditionally import pyhbac</title>
<updated>2017-04-03T11:08:52+00:00</updated>
<author>
<name>Christian Heimes</name>
<email>cheimes@redhat.com</email>
</author>
<published>2017-01-17T07:49:54+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=3064b890e24a5056c77f19c3951cfb59d49366f8'/>
<id>3064b890e24a5056c77f19c3951cfb59d49366f8</id>
<content type='text'>
The pyhbac module is part of SSSD. It's not available as stand-alone
PyPI package. It would take a lot of effort to package it because the
code is deeply tight into SSSD.

Let's follow the example of other SSSD Python packages and make the
import of pyhbac conditionally. It's only necessary for caacl and
hbactest plugins.

I renamed convert_to_ipa_rule() to _convert_to_ipa_rule() because it
does not check for presence of pyhbac package itself. The check is
performed earlier in execute(). The prefix indicates that it is an
internal function and developers have to think twice before using it
in another place.

This makes it much easier to install ipaserver with instrumented build
of Python with a different ABI or in isolated virtual envs to profile
and debug the server.

Signed-off-by: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The pyhbac module is part of SSSD. It's not available as stand-alone
PyPI package. It would take a lot of effort to package it because the
code is deeply tight into SSSD.

Let's follow the example of other SSSD Python packages and make the
import of pyhbac conditionally. It's only necessary for caacl and
hbactest plugins.

I renamed convert_to_ipa_rule() to _convert_to_ipa_rule() because it
does not check for presence of pyhbac package itself. The check is
performed earlier in execute(). The prefix indicates that it is an
internal function and developers have to think twice before using it
in another place.

This makes it much easier to install ipaserver with instrumented build
of Python with a different ABI or in isolated virtual envs to profile
and debug the server.

Signed-off-by: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Hide request_type doc string in cert-request help</title>
<updated>2017-03-31T10:32:51+00:00</updated>
<author>
<name>Abhijeet Kasurde</name>
<email>akasurde@redhat.com</email>
</author>
<published>2017-02-18T11:01:07+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=a1bb442054936113369a88b49483e914664712e7'/>
<id>a1bb442054936113369a88b49483e914664712e7</id>
<content type='text'>
Fix hides description of request_type argument in cert-request
command help

Fixes https://pagure.io/freeipa/issue/6494
Fixes https://pagure.io/freeipa/issue/5734

Signed-off-by: Abhijeet Kasurde &lt;akasurde@redhat.com&gt;
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Fraser Tweedale &lt;ftweedal@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix hides description of request_type argument in cert-request
command help

Fixes https://pagure.io/freeipa/issue/6494
Fixes https://pagure.io/freeipa/issue/5734

Signed-off-by: Abhijeet Kasurde &lt;akasurde@redhat.com&gt;
Reviewed-By: Martin Basti &lt;mbasti@redhat.com&gt;
Reviewed-By: Fraser Tweedale &lt;ftweedal@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add --password-expiration to allow admin to force user password expiration</title>
<updated>2017-03-31T10:19:40+00:00</updated>
<author>
<name>Gabe</name>
<email>redhatrises@gmail.com</email>
</author>
<published>2017-03-31T00:21:47+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=274b0bcf5ff2408739d94ba1b1b4bca69f310dfc'/>
<id>274b0bcf5ff2408739d94ba1b1b4bca69f310dfc</id>
<content type='text'>
- Allows an admin to easily force a user to expire their password forcing the user to change it immediately or at a specified time in the future

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
- Allows an admin to easily force a user to expire their password forcing the user to change it immediately or at a specified time in the future

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Jan Cholasta &lt;jcholast@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
