- Feb 05, 2025
-
-
Timo Aaltonen authored
-
- Feb 04, 2025
-
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
- Feb 01, 2025
-
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
- Dec 09, 2024
-
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
tagging IPAv4 4.11.1
- Aug 21, 2024
-
-
Rob Crittenden authored
-
Sudhir Menon authored
ipatests: Test to check that the configured value for "nsslapd-ignore-time-skew" remains on even after a "force-sync" is done Related: https://pagure.io/freeipa/issue/9635 Signed-off-by:
Sudhir Menon <sumenon@redhat.com> Reviewed-By:
Florence Blanc-Renaud <flo@redhat.com>
-
- Aug 16, 2024
-
-
Sudhir Menon authored
Test 'test_hsm_negative_bad_token_dir_permissions' was failing in RHEL because of the below error. "ipa: ERROR: stderr: usermod: invalid option -- 'r'" Hence replaced the usermod with gpasswd command which does the same and works on both RHEL and Fedora. Ref: https://pagure.io/freeipa/issue/9626 Signed-off-by:
Sudhir Menon <sumenon@redhat.com> Reviewed-By:
Florence Blanc-Renaud <flo@redhat.com>
-
Rob Crittenden authored
Fixes: https://pagure.io/freeipa/issue/9367 Signed-off-by:
Rob Crittenden <rcritten@redhat.com> Reviewed-By:
Alexander Bokovoy <abokovoy@redhat.com> Reviewed-By:
Francisco Trivino <ftrivino@redhat.com>
-
- Aug 15, 2024
-
-
Rob Crittenden authored
TripleDES will be deprecated in python-cryptography 48.0.0. We have code that uses it if it is available and otherwise ignores it. Because this gets imports in constants.py this warning is promiment pretty much everywhere. So let's ignore it since we already handle the issue. Related: https://pagure.io/freeipa/issue/9641 Signed-off-by:
Rob Crittenden <rcritten@redhat.com> Reviewed-By:
Alexander Bokovoy <abokovoy@redhat.com>
-
Rob Crittenden authored
public_key_algorithm_oid is property of underlying Certificate object that is not supposed to be callable. I missed that it contained () at the end. Fixes: https://pagure.io/freeipa/issue/9641 Signed-off-by:
Rob Crittenden <rcritten@redhat.com> Reviewed-By:
Alexander Bokovoy <abokovoy@redhat.com>
-
- Aug 14, 2024
-
-
Florence Blanc-Renaud authored
When ipa trust-add fails to retrieve the remote domain information, it exits with "an internal error has occurred". Handle the case with a better error message. Fixes: https://pagure.io/freeipa/issue/9488 Signed-off-by:
Florence Blanc-Renaud <flo@redhat.com> Reviewed-By:
Alexander Bokovoy <abokovoy@redhat.com>
-
Florence Blanc-Renaud authored
During the server installation, the installer checks if the SElinux policy module for the specific hardware is detected. The current code mixed up SElinux policy module name and RPM package name and resulted in a false warning that the module was missing. The module name is ipa-nfast or ipa-luna, not ipa-selinux-nfast or ipa-selinux-luna. The name is defined in the spec file as %{module}-nfast and module=ipa. Fixes: https://pagure.io/freeipa/issue/9636 Signed-off-by:
Florence Blanc-Renaud <flo@redhat.com> Reviewed-By:
Alexander Bokovoy <abokovoy@redhat.com>
-
- Aug 12, 2024
-
-
Florence Blanc-Renaud authored
The test TestHSMNegative should be skipped if PKI is too old, but its uninstall method does not check the PKI version. Add a call to check_version in the class uninstall method. Fixes: https://pagure.io/freeipa/issue/9648 Signed-off-by:
Florence Blanc-Renaud <flo@redhat.com> Reviewed-By:
Michal Polovka <mpolovka@redhat.com>
-
- Aug 08, 2024
-
-
Sudhir Menon authored
This patch add tests to check the scenarios associated with pagure tickets https://pagure.io/freeipa/issue/9642 - ipa-migrate - properly handle invalid certificates https://pagure.io/freeipa/issue/9619 - ipa-migrate starttls does not work Signed-off-by:
Sudhir Menon <sumenon@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-
Mohammad Rizwan authored
related: https://pagure.io/freeipa/issue/9618 Signed-off-by:
Mohammad Rizwan <myusuf@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com> Reviewed-By:
Florence Blanc-Renaud <flo@redhat.com>
-
- Aug 05, 2024
-
-
Florence Blanc-Renaud authored
The test is often failing on timeout. Add 15min to the test definitions. Signed-off-by:
Florence Blanc-Renaud <flo@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-
Rob Crittenden authored
It previously only printed the issue which made troubleshooting after the fact difficult. Using logger.error() provides the same visual functionality but also logs to the server install log. Fixes: https://pagure.io/freeipa/issue/9637 Signed-off-by:
Rob Crittenden <rcritten@redhat.com> Reviewed-By:
Florence Blanc-Renaud <flo@redhat.com>
-
Rob Crittenden authored
Remove the client side cookie if a user possesses an IPA session cookie and the associated credentials can't be found on the server. This handles the case where the ccaches are removed for some reason (maybe cleanup, maybe a container was restarted) and allows for a successful SSO if the user's Kerberos ticket is still valid. Without this change the user is always dropped into a the username/password dialog. The only workaround is to remove the cookie on the client side. Fixes: https://pagure.io/freeipa/issue/9624 Signed-off-by:
Rob Crittenden <rcritten@redhat.com> Reviewed-By:
Florence Blanc-Renaud <flo@redhat.com>
-
- Aug 01, 2024
-
-
Florence Blanc-Renaud authored
During a replica CA installation, the initial replication step may fail if there is too much time skew between the server and replica. The replica installer already takes care of this for the replication of the domain suffix but the replica CA installer does not set nssldapd-ignore-time-skew to on for o=ipaca suffix. During a replica CA installation, read the initial value of nssldapd-ignore-time-skew, force it to on, start replication and revert to the initial value. Apply the same logic to dsinstance and ipa-replica-manage force-sync. Fixes: https://pagure.io/freeipa/issue/9635 Signed-off-by:
Florence Blanc-Renaud <flo@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-
- Jul 31, 2024
-
-
Alexander Bokovoy authored
Related: https://pagure.io/freeipa/issue/9641 Signed-off-by:
Alexander Bokovoy <abokovoy@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-
Alexander Bokovoy authored
Cryptography 43 started to warn that in version 48 it will remove TripleDES support. Change the code to detect missing TripleDES algorithm and do not fail. Related: https://pagure.io/freeipa/issue/9641 Signed-off-by:
Alexander Bokovoy <abokovoy@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-
Alexander Bokovoy authored
Pylint started to complain that 'unicode' variable is accessed before definition. This is clearly a bug in how 'six' and pylint are working together. Replace use of 'unicode()' by 'str()'. Fixes: https://pagure.io/freeipa/issue/9644 Signed-off-by:
Alexander Bokovoy <abokovoy@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-
Alexander Bokovoy authored
Cryptography 43 added two new abstract methods to Certificate class of which we are using one, public_key_algorithm_oid. Fixes: https://pagure.io/freeipa/issue/9641 Signed-off-by:
Alexander Bokovoy <abokovoy@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-
Rob Crittenden authored
Run all commands as pkiuser when validating that the HSM token is available, that the token library path is correct and that the password can read keys. This will avoid issues where the initial validation is ok but the pkiuser is not granted read access to some part of the token. This is very possible when using softhsm2. Fixes: https://pagure.io/freeipa/issue/9626 Signed-off-by:
Rob Crittenden <rcritten@redhat.com> Reviewed-By:
Florence Blanc-Renaud <frenaud@redhat.com>
-
Rob Crittenden authored
There were a few hardcoded places where it was set to /tmp/token_passwd instead of using the class variable. Don't rely on previous running tests installing the token password file so they can be run individually. Fixes: https://pagure.io/freeipa/issue/9603 Signed-off-by:
Rob Crittenden <rcritten@redhat.com> Reviewed-By:
Florence Blanc-Renaud <frenaud@redhat.com>
-
Mark Reynolds authored
A ValueError is raised when an invalid certificate is used, so the tool should handle this properly and not produce a stack trace. Fixes: https://pagure.io/freeipa/issue/9642 Signed-off-by:
Mark Reynolds <mreynolds@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-
Florence Blanc-Renaud authored
Nodejs22 has been released on f39 and f40 and freeipa fails to build with this version. Nodejs22 will be the default version in f41+ and adds a symlink from /usr/bin/node-22 to /usr/bin/node but on older fedora versions, the symlink is not created. As our build is using /usr/bin/node command, it fails with command not found. Stick to Nodejs 20 on these older versions. Fixes: https://pagure.io/freeipa/issue/9643 Signed-off-by:
Florence Blanc-Renaud <flo@redhat.com> Reviewed-By:
Rob Crittenden <rcritten@redhat.com>
-