<feed xmlns='http://www.w3.org/2005/Atom'>
<title>freeipa.git/ipaserver/plugins, branch fix_ber_scanf</title>
<subtitle>FreeIPA patches</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/'/>
<entry>
<title>Modify webUI to adhere to new IPA server API</title>
<updated>2019-09-10T09:33:21+00:00</updated>
<author>
<name>Changmin Teng</name>
<email>cteng@redhat.com</email>
</author>
<published>2019-07-29T15:10:31+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=b66e8a1ee295e11e286979a0bd9ce303cbab2aa5'/>
<id>b66e8a1ee295e11e286979a0bd9ce303cbab2aa5</id>
<content type='text'>
Given the changes in IPA server API changes, whebUI is modified to
utilize new authentication indicators, and disabled custom indicators
for services' white list.

Resolves: https://pagure.io/freeipa/issue/8001
Signed-off-by: Changmin Teng &lt;cteng@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
Reviewed-By: Robbie Harwood &lt;rharwood@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Given the changes in IPA server API changes, whebUI is modified to
utilize new authentication indicators, and disabled custom indicators
for services' white list.

Resolves: https://pagure.io/freeipa/issue/8001
Signed-off-by: Changmin Teng &lt;cteng@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
Reviewed-By: Robbie Harwood &lt;rharwood@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Extend the list of supported pre-auth mechanisms in IPA server API</title>
<updated>2019-09-10T09:33:21+00:00</updated>
<author>
<name>Changmin Teng</name>
<email>cteng@redhat.com</email>
</author>
<published>2019-07-29T15:00:35+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=d0570404ef5a79dfc08d7959d21e9e4843973faf'/>
<id>d0570404ef5a79dfc08d7959d21e9e4843973faf</id>
<content type='text'>
As new authentication indicators implemented, we also modified server
API to support those new values. Also, "krbprincipalauthind" attribute
is modified to use a pre-defined set of values instead of arbitrary
strings.

Resolves: https://pagure.io/freeipa/issue/8001
Signed-off-by: Changmin Teng &lt;cteng@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
Reviewed-By: Robbie Harwood &lt;rharwood@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
As new authentication indicators implemented, we also modified server
API to support those new values. Also, "krbprincipalauthind" attribute
is modified to use a pre-defined set of values instead of arbitrary
strings.

Resolves: https://pagure.io/freeipa/issue/8001
Signed-off-by: Changmin Teng &lt;cteng@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Simo Sorce &lt;ssorce@redhat.com&gt;
Reviewed-By: Robbie Harwood &lt;rharwood@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>config plugin: replace 'is 0' with '== 0'</title>
<updated>2019-09-04T06:28:14+00:00</updated>
<author>
<name>Florence Blanc-Renaud</name>
<email>flo@redhat.com</email>
</author>
<published>2019-09-03T09:48:50+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=4a437a3c422ee8a7b3dfee9a90abc2d9cc9e7990'/>
<id>4a437a3c422ee8a7b3dfee9a90abc2d9cc9e7990</id>
<content type='text'>
Since python3.8, identity checks with literal produce syntax warnings.
Replace the check 'if .. is 0' with 'if .. == 0'

Related: https://pagure.io/freeipa/issue/8057
Signed-off-by: Florence Blanc-Renaud &lt;flo@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since python3.8, identity checks with literal produce syntax warnings.
Replace the check 'if .. is 0' with 'if .. == 0'

Related: https://pagure.io/freeipa/issue/8057
Signed-off-by: Florence Blanc-Renaud &lt;flo@redhat.com&gt;
Reviewed-By: Christian Heimes &lt;cheimes@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow insecure binds for migration</title>
<updated>2019-08-13T16:43:58+00:00</updated>
<author>
<name>Christian Heimes</name>
<email>cheimes@redhat.com</email>
</author>
<published>2019-08-13T15:22:01+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=a36556e1064900af7a75ca6f07aba66212cf321a'/>
<id>a36556e1064900af7a75ca6f07aba66212cf321a</id>
<content type='text'>
Commit 5be9341fbabaf7bcb396a2ce40f17e1ccfa54b77 disallowed simple bind
over an insecure connection. Password logins were only allowed over LDAPS
or LDAP+STARTTLS. The restriction broke 'ipa migrate-ds' in some cases.

This commit lifts the restriction and permits insecure binds over plain
LDAP. It also makes the migrate-ds plugin use STARTTLS when a CA
certificate is configured with a plain LDAP connection.

Fixes: https://pagure.io/freeipa/issue/8040
Signed-off-by: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Thomas Woerner &lt;twoerner@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Commit 5be9341fbabaf7bcb396a2ce40f17e1ccfa54b77 disallowed simple bind
over an insecure connection. Password logins were only allowed over LDAPS
or LDAP+STARTTLS. The restriction broke 'ipa migrate-ds' in some cases.

This commit lifts the restriction and permits insecure binds over plain
LDAP. It also makes the migrate-ds plugin use STARTTLS when a CA
certificate is configured with a plain LDAP connection.

Fixes: https://pagure.io/freeipa/issue/8040
Signed-off-by: Christian Heimes &lt;cheimes@redhat.com&gt;
Reviewed-By: Thomas Woerner &lt;twoerner@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Don't return SSH keys with ipa host-find --pkey-only</title>
<updated>2019-08-07T06:35:28+00:00</updated>
<author>
<name>Rob Crittenden</name>
<email>rcritten@redhat.com</email>
</author>
<published>2019-08-01T17:53:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=73c32dbfeb9a67a476243540dc724784b1a007aa'/>
<id>73c32dbfeb9a67a476243540dc724784b1a007aa</id>
<content type='text'>
This was introduced in 14ee02dcbd6cbb6c221ac7526e471a9fc58fcc82

https://pagure.io/freeipa/issue/8029

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This was introduced in 14ee02dcbd6cbb6c221ac7526e471a9fc58fcc82

https://pagure.io/freeipa/issue/8029

Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>user-stage: transfer all attributes from preserved to stage user</title>
<updated>2019-07-31T06:34:34+00:00</updated>
<author>
<name>Florence Blanc-Renaud</name>
<email>flo@redhat.com</email>
</author>
<published>2019-07-23T07:31:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=27baf3501389cc3c8a12e06686da13a874d3f9da'/>
<id>27baf3501389cc3c8a12e06686da13a874d3f9da</id>
<content type='text'>
The user-stage command is internally implemented as:
- user_show(all=True) in order to read the user attributes
- loop on the attributes defined as possible to add using stageuser-add and
transform them into new options for stageuser_add (for instance stageuser-add
provides the option --shell for the attribute loginshell, but there is no
option for the attribute businesscategory).
- call stageuser_add in order to create a new entry in the active users subtree
- user-del to remove the previous entry in the staged users subtree

The issue is in the 2nd step. Only the attributes with a stageuser-add option
are processed.
The logic of the code should be slightly modified, so that all the attributes
read in the first step are processed:
- if they correspond to an option of stageuser-add, process them like it's
currently done. For instance if the entry contains displayname, then it
should be processed as --displayName=value in the stageuser-add cmd
- if they do not correspond to an option of stageuser-add, add them with
--setattr=&lt;attrname&gt;=&lt;attrvalue&gt;

Note that some attributes may need to be filtered, for instance user-show
returns has_password or has_keytab, which do not correspond to attributes
in the LDAP entry.

Fixes: https://pagure.io/freeipa/issue/7597
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The user-stage command is internally implemented as:
- user_show(all=True) in order to read the user attributes
- loop on the attributes defined as possible to add using stageuser-add and
transform them into new options for stageuser_add (for instance stageuser-add
provides the option --shell for the attribute loginshell, but there is no
option for the attribute businesscategory).
- call stageuser_add in order to create a new entry in the active users subtree
- user-del to remove the previous entry in the staged users subtree

The issue is in the 2nd step. Only the attributes with a stageuser-add option
are processed.
The logic of the code should be slightly modified, so that all the attributes
read in the first step are processed:
- if they correspond to an option of stageuser-add, process them like it's
currently done. For instance if the entry contains displayname, then it
should be processed as --displayName=value in the stageuser-add cmd
- if they do not correspond to an option of stageuser-add, add them with
--setattr=&lt;attrname&gt;=&lt;attrvalue&gt;

Note that some attributes may need to be filtered, for instance user-show
returns has_password or has_keytab, which do not correspond to attributes
in the LDAP entry.

Fixes: https://pagure.io/freeipa/issue/7597
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>WebUI: Add PKINIT status field to 'Configuration' page</title>
<updated>2019-07-26T16:10:02+00:00</updated>
<author>
<name>Serhii Tsymbaliuk</name>
<email>stsymbal@redhat.com</email>
</author>
<published>2019-07-23T13:08:12+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=6af723c0c36bc1d7b4c4357b466a285254e0e176'/>
<id>6af723c0c36bc1d7b4c4357b466a285254e0e176</id>
<content type='text'>
- Add 'Server Options' section to the page
- Add 'IPA master capable of PKINIT' field to the 'Server Options'

Ticket: https://pagure.io/freeipa/issue/7305

Signed-off-by: Serhii Tsymbaliuk &lt;stsymbal@redhat.com&gt;
Reviewed-By: Florence Blanc-Renaud &lt;flo@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
- Add 'Server Options' section to the page
- Add 'IPA master capable of PKINIT' field to the 'Server Options'

Ticket: https://pagure.io/freeipa/issue/7305

Signed-off-by: Serhii Tsymbaliuk &lt;stsymbal@redhat.com&gt;
Reviewed-By: Florence Blanc-Renaud &lt;flo@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove posixAccount from service_find search filter</title>
<updated>2019-07-19T17:13:34+00:00</updated>
<author>
<name>Rob Crittenden</name>
<email>rcritten@redhat.com</email>
</author>
<published>2019-07-19T12:55:02+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=e771fa59ff65545ff1e84f1cd30e06556fabcee3'/>
<id>e771fa59ff65545ff1e84f1cd30e06556fabcee3</id>
<content type='text'>
This will allow cifs principals to be found. They were suppressed
because they include objectclass=posixAccount.

This is a bit of a historical anomaly. This was included in the
filter from the initial commit (though it was person, not
posixAccount). I believe it was a mistake from the beginning but
it wasn't noticed because it didn't cause any obvious issues.

https://pagure.io/freeipa/issue/8013

Reviewed-By: Alexander Bokovoy &lt;abbra@users.noreply.github.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This will allow cifs principals to be found. They were suppressed
because they include objectclass=posixAccount.

This is a bit of a historical anomaly. This was included in the
filter from the initial commit (though it was person, not
posixAccount). I believe it was a mistake from the beginning but
it wasn't noticed because it didn't cause any obvious issues.

https://pagure.io/freeipa/issue/8013

Reviewed-By: Alexander Bokovoy &lt;abbra@users.noreply.github.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>certmap rules: altSecurityIdentities should only be used for trusted domains</title>
<updated>2019-07-17T14:50:07+00:00</updated>
<author>
<name>Alexander Bokovoy</name>
<email>abokovoy@redhat.com</email>
</author>
<published>2019-05-03T10:00:18+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=41ca4d484e7492bf469d73c6e627cc6df46eebf8'/>
<id>41ca4d484e7492bf469d73c6e627cc6df46eebf8</id>
<content type='text'>
IPA LDAP has no altSecurityIdentities in use, it only should apply to
identities in trusted Active Directory domains.

Add checks to enforce proper certmap rule attribution for specific
Active Directory domains.

Related: https://pagure.io/freeipa/issue/7932
Reviewed-By: Florence Blanc-Renaud &lt;flo@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
IPA LDAP has no altSecurityIdentities in use, it only should apply to
identities in trusted Active Directory domains.

Add checks to enforce proper certmap rule attribution for specific
Active Directory domains.

Related: https://pagure.io/freeipa/issue/7932
Reviewed-By: Florence Blanc-Renaud &lt;flo@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Make use of single configuration point for SELinux</title>
<updated>2019-07-01T11:44:57+00:00</updated>
<author>
<name>Stanislav Levin</name>
<email>slev@altlinux.org</email>
</author>
<published>2019-06-27T08:52:40+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/freeipa.git/commit/?id=b2acd65013348c0f5d91582f240714b0f3357678'/>
<id>b2acd65013348c0f5d91582f240714b0f3357678</id>
<content type='text'>
For now, FreeIPA supports SELinux things as they are in RedHat/Fedora.
But different distributions may have their own SELinux customizations.

This moves SELinux configuration out to platform constants:
- SELINUX_MCS_MAX
- SELINUX_MCS_REGEX
- SELINUX_MLS_MAX
- SELINUX_MLS_REGEX
- SELINUX_USER_REGEX
- SELINUX_USERMAP_DEFAULT
- SELINUX_USERMAP_ORDER

and applies corresponding changes to the test code.

Fixes: https://pagure.io/freeipa/issue/7996
Signed-off-by: Stanislav Levin &lt;slev@altlinux.org&gt;
Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
For now, FreeIPA supports SELinux things as they are in RedHat/Fedora.
But different distributions may have their own SELinux customizations.

This moves SELinux configuration out to platform constants:
- SELINUX_MCS_MAX
- SELINUX_MCS_REGEX
- SELINUX_MLS_MAX
- SELINUX_MLS_REGEX
- SELINUX_USER_REGEX
- SELINUX_USERMAP_DEFAULT
- SELINUX_USERMAP_ORDER

and applies corresponding changes to the test code.

Fixes: https://pagure.io/freeipa/issue/7996
Signed-off-by: Stanislav Levin &lt;slev@altlinux.org&gt;
Reviewed-By: Rob Crittenden &lt;rcritten@redhat.com&gt;
Reviewed-By: Alexander Bokovoy &lt;abokovoy@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
