Re: [Freeipa-devel] JSON problems (the woes of binary data)

2010-02-26 Thread Rich Megginson

John Dennis wrote:

The Problem:


I've been looking at the encoding exception which is being thrown when 
you click on the "Services" menu item in our current implementation. 
By default we seem to be using JSON as our RPC mechanism. The 
exception is being thrown when the JSON encoder hits a certificate. 
Recall that we store certificates in LDAP as binary data and in our 
implementation we distinguish binary data from text by Python object 
type, text is *always* a unicode object and binary data is *always* a 
str object. However in Python 2.x str objects are believed to be text 
and are subject to encoding/decoding in many parts of the Python world.


Unlike XML-RPC JSON does *not* have a binary type. In JSON there are 
*only* unicode strings. So what is happening is that that when the 
JSON encoder sees our certificate data in a str object it says "str 
objects are text and we have to produce a UTF-8 unicode encoding from 
that str object". There's the problem! It's completely nonsensical to 
try and encode binary to to UTF-8.


The right way to handle this is to encode the binary data to base64 
ASCII text and then hand it to JSON. FWIW our XML-RPC handler does 
this already because XML-RPC knows about binary data and elects to 
encode/decode it to base64 as it's marshaled and unmarshaled. But JSON 
can't do this during marhasling and unmarshaling because the JSON 
protocol has no concept of binary data.


The python JSON encoder class does give us the option to hook into the 
encoder and check if the object is a str object and then base64 
encode. But that doesn't help us at the opposite end. How would we 
know when unmarshaling that a given string is supposed to be base64 
decoded back into binary data? We could prepend a special string and 
hope that string never gets used by normal text (yuck). Keeping a list 
of what needs base64 decoding is not an option within JSON because at 
the time of decoding we have no information available about the 
context of the JSON objects.


That means if we want to use JSON we really should push the base64 
encode/decode to the parts of the code which have a priori knowledge 
about the objects they're pushing through the command interface. This 
would mean any command which passes a certificate should base64 encode 
it prior to sending it and base64 decode after it come back from a 
command result. Actually it would be preferable to use PEM encoding, 
and by the way, the whole reason why PEM encodings for certificates 
was developed was exactly for this scenario: transporting a 
certificate through a text based interchange mechanism!


Possible Solutions:
---

As I see it we have these options in front of us for how to deal with 
this problem:


* Drop support for JSON, only use XML-RPC

* Once we read a certificate from LDAP immediately convert it to PEM 
format. Adopt the convention that anytime we exchange certificates it 
will be in PEM format. Only convert from PEM format when the target 
demands binary (e.g. storing it in LDAP, passing it to a library 
expecting DER encoded data, etc.).


* Come up with some hacky protocol on top of JSON which signals "this 
string is really binary" and check for it on every JSON encode/decode 
and cross our fingers no one tries to send a legitimate string which 
would trigger the encode/decode.


Question: Are certificates the one and only example of binary data we 
exchange?


Recommendation:
---

My personal recommendation is we adopt the convention that 
certificates are always PEM encoded. We've already run into many 
problems trying to deduce what format a certificate is (e.g. binary, 
base64, PEM) I think it would be good if we just put a stake in the 
ground and said "certificates are always PEM encoded" and be done with 
all these problems we keep having with the data type of certificates.
This is what the directory server console does, which allows you to 
copy/paste CA certs, cert requests, cert request responses, etc. 
directly in the UI, and easily convert that pem/ascii format to other 
formats.


As an aside I'm also skeptical of the robustness of allowing binary 
data at all in our implementation. Trying to support binary data has 
been nothing but a headache and a source of many many bugs. Do we 
really need it?




___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] JSON problems (the woes of binary data)

2010-02-26 Thread Jason Gerard DeRose
On Fri, 2010-02-26 at 15:59 -0500, John Dennis wrote:
> The Problem:
> 
> 
> I've been looking at the encoding exception which is being thrown when 
> you click on the "Services" menu item in our current implementation. By 
> default we seem to be using JSON as our RPC mechanism. The exception is 
> being thrown when the JSON encoder hits a certificate. Recall that we 
> store certificates in LDAP as binary data and in our implementation we 
> distinguish binary data from text by Python object type, text is 
> *always* a unicode object and binary data is *always* a str object. 
> However in Python 2.x str objects are believed to be text and are 
> subject to encoding/decoding in many parts of the Python world.

The CLI communicates to the server over XML-RPC, but the webUI
communicates to the server over JSON-RPC.  Dealing with JSON on the web
client is fast and easy, XML difficult and slow.

> Unlike XML-RPC JSON does *not* have a binary type. In JSON there are 
> *only* unicode strings. So what is happening is that that when the JSON 
> encoder sees our certificate data in a str object it says "str objects 
> are text and we have to produce a UTF-8 unicode encoding from that str 
> object". There's the problem! It's completely nonsensical to try and 
> encode binary to to UTF-8.

Yeah, I do wish JSON had a binary literal type.  This is obviously a bug
in my JSON-RPC code, but also an issue we need to solve for the UI.
When we send binary to the webUI, what is our intent?  I think that
displaying it as base64 encoded text is not generally what the user
wants.  I think displaying a link that will allow them to download the
file is generally a better idea.  Perhaps the Param should indicate how
it should be handled in the webUI.

> The right way to handle this is to encode the binary data to base64 
> ASCII text and then hand it to JSON. FWIW our XML-RPC handler does this 
> already because XML-RPC knows about binary data and elects to 
> encode/decode it to base64 as it's marshaled and unmarshaled. But JSON 
> can't do this during marhasling and unmarshaling because the JSON 
> protocol has no concept of binary data.
> 
> The python JSON encoder class does give us the option to hook into the 
> encoder and check if the object is a str object and then base64 encode. 
> But that doesn't help us at the opposite end. How would we know when 
> unmarshaling that a given string is supposed to be base64 decoded back 
> into binary data? We could prepend a special string and hope that string 
> never gets used by normal text (yuck). Keeping a list of what needs 
> base64 decoding is not an option within JSON because at the time of 
> decoding we have no information available about the context of the JSON 
> objects.

I think sending it as a dict with a special key, something like:

  {'__base64__': b64encode(my_str)}

> That means if we want to use JSON we really should push the base64 
> encode/decode to the parts of the code which have a priori knowledge 
> about the objects they're pushing through the command interface. This 
> would mean any command which passes a certificate should base64 encode 
> it prior to sending it and base64 decode after it come back from a 
> command result. Actually it would be preferable to use PEM encoding, and 
> by the way, the whole reason why PEM encodings for certificates was 
> developed was exactly for this scenario: transporting a certificate 
> through a text based interchange mechanism!
> 
> Possible Solutions:
> ---
> 
> As I see it we have these options in front of us for how to deal with 
> this problem:
> 
> * Drop support for JSON, only use XML-RPC

We can't do this and keep the flexibility we need in the UI.  Also,
there is a strong trend to use JSON over XML lately (RPC or otherwise),
so I think we do ourselves a disservice by dropping the JSON-RPC.

> * Once we read a certificate from LDAP immediately convert it to PEM 
> format. Adopt the convention that anytime we exchange certificates it 
> will be in PEM format. Only convert from PEM format when the target 
> demands binary (e.g. storing it in LDAP, passing it to a library 
> expecting DER encoded data, etc.).
> 
> * Come up with some hacky protocol on top of JSON which signals "this 
> string is really binary" and check for it on every JSON encode/decode 
> and cross our fingers no one tries to send a legitimate string which 
> would trigger the encode/decode.
> 
> Question: Are certificates the one and only example of binary data we 
> exchange?

At this time, I believe so.  But it would be nice to have a plan for how
do deal with this in the future for other binary data.

> Recommendation:
> ---
> 
> My personal recommendation is we adopt the convention that certificates 
> are always PEM encoded. We've already run into many problems trying to 
> deduce what format a certificate is (e.g. binary, base64, PEM) I think 
> it would be good if we just put a stake in the gro

Re: [Freeipa-devel] commit policy for translations (.po files)

2010-02-26 Thread Dmitri Pal
Simo Sorce wrote:
> On Fri, 26 Feb 2010 13:19:47 -0500
> John Dennis  wrote:
>
>   
>> I'd like to propose that for translations (e.g. .po files) we skip
>> the review process on the patch and just push them to master.
>> Realistically few of us will be able to verify whether the string
>> translations are correct or not.
>> 
>
> +1 we do the same for sssd
>
> Simo.
>
>   
I agree too.

-- 
Thank you,
Dmitri Pal

Engineering Manager IPA project,
Red Hat Inc.


---
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] commit policy for translations (.po files)

2010-02-26 Thread Simo Sorce
On Fri, 26 Feb 2010 13:19:47 -0500
John Dennis  wrote:

> I'd like to propose that for translations (e.g. .po files) we skip
> the review process on the patch and just push them to master.
> Realistically few of us will be able to verify whether the string
> translations are correct or not.

+1 we do the same for sssd

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] JSON problems (the woes of binary data)

2010-02-26 Thread Simo Sorce
On Fri, 26 Feb 2010 15:59:53 -0500
John Dennis  wrote:

> My personal recommendation is we adopt the convention that
> certificates are always PEM encoded.

+1

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] JSON problems (the woes of binary data)

2010-02-26 Thread Dmitri Pal
John Dennis wrote:
> The Problem:
> 
>
> I've been looking at the encoding exception which is being thrown when
> you click on the "Services" menu item in our current implementation.
> By default we seem to be using JSON as our RPC mechanism. The
> exception is being thrown when the JSON encoder hits a certificate.
> Recall that we store certificates in LDAP as binary data and in our
> implementation we distinguish binary data from text by Python object
> type, text is *always* a unicode object and binary data is *always* a
> str object. However in Python 2.x str objects are believed to be text
> and are subject to encoding/decoding in many parts of the Python world.
>
> Unlike XML-RPC JSON does *not* have a binary type. In JSON there are
> *only* unicode strings. So what is happening is that that when the
> JSON encoder sees our certificate data in a str object it says "str
> objects are text and we have to produce a UTF-8 unicode encoding from
> that str object". There's the problem! It's completely nonsensical to
> try and encode binary to to UTF-8.
>
> The right way to handle this is to encode the binary data to base64
> ASCII text and then hand it to JSON. FWIW our XML-RPC handler does
> this already because XML-RPC knows about binary data and elects to
> encode/decode it to base64 as it's marshaled and unmarshaled. But JSON
> can't do this during marhasling and unmarshaling because the JSON
> protocol has no concept of binary data.
>
> The python JSON encoder class does give us the option to hook into the
> encoder and check if the object is a str object and then base64
> encode. But that doesn't help us at the opposite end. How would we
> know when unmarshaling that a given string is supposed to be base64
> decoded back into binary data? We could prepend a special string and
> hope that string never gets used by normal text (yuck). Keeping a list
> of what needs base64 decoding is not an option within JSON because at
> the time of decoding we have no information available about the
> context of the JSON objects.
>
> That means if we want to use JSON we really should push the base64
> encode/decode to the parts of the code which have a priori knowledge
> about the objects they're pushing through the command interface. This
> would mean any command which passes a certificate should base64 encode
> it prior to sending it and base64 decode after it come back from a
> command result. Actually it would be preferable to use PEM encoding,
> and by the way, the whole reason why PEM encodings for certificates
> was developed was exactly for this scenario: transporting a
> certificate through a text based interchange mechanism!
>
> Possible Solutions:
> ---
>
> As I see it we have these options in front of us for how to deal with
> this problem:
>
> * Drop support for JSON, only use XML-RPC
>
> * Once we read a certificate from LDAP immediately convert it to PEM
> format. Adopt the convention that anytime we exchange certificates it
> will be in PEM format. Only convert from PEM format when the target
> demands binary (e.g. storing it in LDAP, passing it to a library
> expecting DER encoded data, etc.).
>
> * Come up with some hacky protocol on top of JSON which signals "this
> string is really binary" and check for it on every JSON encode/decode
> and cross our fingers no one tries to send a legitimate string which
> would trigger the encode/decode.
>
> Question: Are certificates the one and only example of binary data we
> exchange?
>
> Recommendation:
> ---
>
> My personal recommendation is we adopt the convention that
> certificates are always PEM encoded. We've already run into many
> problems trying to deduce what format a certificate is (e.g. binary,
> base64, PEM) I think it would be good if we just put a stake in the
> ground and said "certificates are always PEM encoded" and be done with
> all these problems we keep having with the data type of certificates.
>
> As an aside I'm also skeptical of the robustness of allowing binary
> data at all in our implementation. Trying to support binary data has
> been nothing but a headache and a source of many many bugs. Do we
> really need it?
>
Yeah, a good Friday afternoon problem to solve...
+1 to your recommendations, though I am not a specialist, but suggestion
seems logical.

-- 
Thank you,
Dmitri Pal

Engineering Manager IPA project,
Red Hat Inc.


---
Looking to carve out IT costs?
www.redhat.com/carveoutcosts/

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


[Freeipa-devel] JSON problems (the woes of binary data)

2010-02-26 Thread John Dennis

The Problem:


I've been looking at the encoding exception which is being thrown when 
you click on the "Services" menu item in our current implementation. By 
default we seem to be using JSON as our RPC mechanism. The exception is 
being thrown when the JSON encoder hits a certificate. Recall that we 
store certificates in LDAP as binary data and in our implementation we 
distinguish binary data from text by Python object type, text is 
*always* a unicode object and binary data is *always* a str object. 
However in Python 2.x str objects are believed to be text and are 
subject to encoding/decoding in many parts of the Python world.


Unlike XML-RPC JSON does *not* have a binary type. In JSON there are 
*only* unicode strings. So what is happening is that that when the JSON 
encoder sees our certificate data in a str object it says "str objects 
are text and we have to produce a UTF-8 unicode encoding from that str 
object". There's the problem! It's completely nonsensical to try and 
encode binary to to UTF-8.


The right way to handle this is to encode the binary data to base64 
ASCII text and then hand it to JSON. FWIW our XML-RPC handler does this 
already because XML-RPC knows about binary data and elects to 
encode/decode it to base64 as it's marshaled and unmarshaled. But JSON 
can't do this during marhasling and unmarshaling because the JSON 
protocol has no concept of binary data.


The python JSON encoder class does give us the option to hook into the 
encoder and check if the object is a str object and then base64 encode. 
But that doesn't help us at the opposite end. How would we know when 
unmarshaling that a given string is supposed to be base64 decoded back 
into binary data? We could prepend a special string and hope that string 
never gets used by normal text (yuck). Keeping a list of what needs 
base64 decoding is not an option within JSON because at the time of 
decoding we have no information available about the context of the JSON 
objects.


That means if we want to use JSON we really should push the base64 
encode/decode to the parts of the code which have a priori knowledge 
about the objects they're pushing through the command interface. This 
would mean any command which passes a certificate should base64 encode 
it prior to sending it and base64 decode after it come back from a 
command result. Actually it would be preferable to use PEM encoding, and 
by the way, the whole reason why PEM encodings for certificates was 
developed was exactly for this scenario: transporting a certificate 
through a text based interchange mechanism!


Possible Solutions:
---

As I see it we have these options in front of us for how to deal with 
this problem:


* Drop support for JSON, only use XML-RPC

* Once we read a certificate from LDAP immediately convert it to PEM 
format. Adopt the convention that anytime we exchange certificates it 
will be in PEM format. Only convert from PEM format when the target 
demands binary (e.g. storing it in LDAP, passing it to a library 
expecting DER encoded data, etc.).


* Come up with some hacky protocol on top of JSON which signals "this 
string is really binary" and check for it on every JSON encode/decode 
and cross our fingers no one tries to send a legitimate string which 
would trigger the encode/decode.


Question: Are certificates the one and only example of binary data we 
exchange?


Recommendation:
---

My personal recommendation is we adopt the convention that certificates 
are always PEM encoded. We've already run into many problems trying to 
deduce what format a certificate is (e.g. binary, base64, PEM) I think 
it would be good if we just put a stake in the ground and said 
"certificates are always PEM encoded" and be done with all these 
problems we keep having with the data type of certificates.


As an aside I'm also skeptical of the robustness of allowing binary data 
at all in our implementation. Trying to support binary data has been 
nothing but a headache and a source of many many bugs. Do we really need it?


--
John Dennis 

Looking to carve out IT costs?
www.redhat.com/carveoutcosts/

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] commit policy for translations (.po files)

2010-02-26 Thread Jason Gerard DeRose
On Fri, 2010-02-26 at 13:19 -0500, John Dennis wrote:
> I'd like to propose that for translations (e.g. .po files) we skip the 
> review process on the patch and just push them to master. Realistically 
> few of us will be able to verify whether the string translations are 
> correct or not.

+1.  Whoever pushes it can just make sure it isn't touching anything
code related and push the patch.

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


[Freeipa-devel] commit policy for translations (.po files)

2010-02-26 Thread John Dennis
I'd like to propose that for translations (e.g. .po files) we skip the 
review process on the patch and just push them to master. Realistically 
few of us will be able to verify whether the string translations are 
correct or not.

--
John Dennis 

Looking to carve out IT costs?
www.redhat.com/carveoutcosts/

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


[Freeipa-devel] [PATCH] More Kannada translations

2010-02-26 Thread John Dennis

More Kannada translations

Current translation status:

ipa.pot has 133 messages. There are 6 po translation files.
bn_IN:14/133  10.5%  106 po untranslated,   13 missing,  119 
untranslated
es:  133/133 100.0%0 po untranslated,0 missing,0 
untranslated
id:  107/133  80.5%   13 po untranslated,   13 missing,   26 
untranslated
kn:  133/133 100.0%0 po untranslated,0 missing,0 
untranslated
pl:  133/133 100.0%0 po untranslated,0 missing,0 
untranslated
ru:  120/133  90.2%0 po untranslated,   13 missing,   13 
untranslated


--
John Dennis 

Looking to carve out IT costs?
www.redhat.com/carveoutcosts/
>From 4bad89e6adae4c7e7369c5d73db3e042c9b98f6e Mon Sep 17 00:00:00 2001
From: John Dennis 
Date: Fri, 26 Feb 2010 12:58:37 -0500
Subject: [PATCH] More Kannada translations
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit

---
 install/po/kn.po |  269 --
 1 files changed, 138 insertions(+), 131 deletions(-)

diff --git a/install/po/kn.po b/install/po/kn.po
index 0710f23..433ea18 100644
--- a/install/po/kn.po
+++ b/install/po/kn.po
@@ -2,13 +2,13 @@
 # Copyright (C) 2010 Red Hat
 # This file is distributed under the same license as the PACKAGE package.
 # gundachandru , 2010.
-# 
+#
 msgid ""
 msgstr ""
 "Project-Id-Version: ipa\n"
 "Report-Msgid-Bugs-To: https://hosted.fedoraproject.org/projects/freeipa/newticket\n";
 "POT-Creation-Date: 2010-02-15 14:55-0500\n"
-"PO-Revision-Date: 2010-02-14 22:37+0530\n"
+"PO-Revision-Date: 2010-02-26 23:05+0530\n"
 "Last-Translator: gundachandru \n"
 "Language-Team: Kannada \n"
 "MIME-Version: 1.0\n"
@@ -107,542 +107,549 @@ msgstr "%(values)r ನಲ್ಲಿ ಒಂದು ಆಗಿರಲೇಬೇಕು"
 #: ../../ipalib/cli.py:505
 #, python-format
 msgid "Enter %(label)s again to verify: "
-msgstr "ಮತ್ತೊಮ್ಮೆ ಪರಿಶೀಲಿಸಲು %(label)s ಎಂಟರ್ ಮಾಡಿ"
+msgstr "ಮತ್ತೊಮ್ಮೆ ಪರಿಶೀಲಿಸಲು %(label)s ಎಂಟರ್ ಮಾಡಿ:"
 
 #: ../../ipalib/cli.py:509
 msgid "Passwords do not match!"
-msgstr ""
+msgstr "ಗುಪ್ತಪದಗಳು ಹೊಂದಾಣಿಕೆಯಾಗುತ್ತಿಲ್ಲ!"
 
 #: ../../ipalib/cli.py:514
 msgid "Cancelled."
-msgstr ""
+msgstr "ರದ್ದುಗೊಳಿಸಲಾಗಿದೆ."
 
 #: ../../ipalib/frontend.py:377
 msgid "Results are truncated, try a more specific search"
-msgstr ""
+msgstr "ಫಲಿತಾಂಶಗಳು ಕತ್ತರಿಸಲ್ಪಟ್ಟಿವೆ, ಹೆಚ್ಚ್ಹು ನಿರ್ದಿಷ್ಟವಾದ ಶೋಧನೆ ಪ್ರಯತ್ನಿಸಿ"
 
 #: ../../ipalib/errors.py:297
 #, python-format
 msgid "%(cver)s client incompatible with %(sver)s server at %(server)r"
-msgstr ""
+msgstr "%(server)r ನಲ್ಲಿ ಕ್ಲೈಂಟ್ %(cver)s ಸರ್ವರ್‌ %(sver)s ನೊಂದಿಗೆ ಹೊಂದಿಕೆಯಾಗುತ್ತಿಲ್ಲ"
 
 #: ../../ipalib/errors.py:315
 #, python-format
 msgid "unknown error %(code)d from %(server)s: %(error)s"
-msgstr ""
+msgstr "%(server)s ಸರ್ವರ್‌ನಿಂದ ಅಜ್ಞಾತ ದೋಷ %(code)d: %(error)s"
 
 #: ../../ipalib/errors.py:331
 msgid "an internal error has occurred"
-msgstr ""
+msgstr "ಆಂತರಿಕ ದೋಷ ಉಂಟಾಗಿದೆ"
 
 #: ../../ipalib/errors.py:353
 #, python-format
 msgid "an internal error has occurred on server at %(server)r"
-msgstr ""
+msgstr "%(server)r ನಲ್ಲಿ ಸರ್ವರ್‌ನಲ್ಲಿ ಆಂತರಿಕ ದೋಷ ಉಂಟಾಗಿದೆ"
 
 #: ../../ipalib/errors.py:369
 #, python-format
 msgid "unknown command %(name)r"
-msgstr ""
+msgstr "ಅಜ್ಞಾತ ಆಜ್ಞೆ(ಕಮ್ಯಾಂಡ್) %(name)r "
 
-#: ../../ipalib/errors.py:386 ../../ipalib/errors.py:411
+#: ../../ipalib/errors.py:386
+#: ../../ipalib/errors.py:411
 #, python-format
 msgid "error on server %(server)r: %(error)s"
-msgstr ""
+msgstr "%(server)r ಸರ್ವರ್‌ನಲ್ಲಿ ದೋಷ: %(error)s"
 
 #: ../../ipalib/errors.py:402
 #, python-format
 msgid "cannot connect to %(uri)r: %(error)s"
-msgstr ""
+msgstr "%(uri)r ಗೆ ಸಂಪರ್ಕಿಸಲು ಆಗುತ್ತಿಲ್ಲ: %(error)s"
 
 #: ../../ipalib/errors.py:420
 #, python-format
 msgid "Invalid JSON-RPC request: %(error)s"
-msgstr ""
+msgstr "ಅಸಿಂಧುವಾದ JSON-RPC ಬೇಡಿಕೆ: %(error)s"
 
 #: ../../ipalib/errors.py:448
 #, python-format
 msgid "Kerberos error: %(major)s/%(minor)s"
-msgstr ""
+msgstr "Kerberos ದೋಷ: %(major)s/%(minor)s"
 
 #: ../../ipalib/errors.py:465
 msgid "did not receive Kerberos credentials"
-msgstr ""
+msgstr "Kerberos ಯೋಗ್ಯತಾಪತ್ರಗಳನ್ನು ಪಡೆದಿಲ್ಲ"
 
 #: ../../ipalib/errors.py:481
 #, python-format
 msgid "Service %(service)r not found in Kerberos database"
-msgstr ""
+msgstr "Kerberos ಡೇಟಾಬೇಸà³

[Freeipa-devel] [Transifex] File submitted via email to FreeIPA | master

2010-02-26 Thread admin
Hello freeipa, this is Transifex at http://www.transifex.net.

The following attached files were submitted to FreeIPA | master by gundachandru 
 

Please, visit Transifex at 
http://www.transifex.net/projects/p/freeipa/c/master/ in order to see the 
component page.

Thank you,
Transifex
# Kannada translations for ipa-server package.
# Copyright (C) 2010 Red Hat
# This file is distributed under the same license as the PACKAGE package.
# gundachandru , 2010.
#
msgid ""
msgstr ""
"Project-Id-Version: ipa\n"
"Report-Msgid-Bugs-To: 
https://hosted.fedoraproject.org/projects/freeipa/newticket\n";
"POT-Creation-Date: 2010-02-15 14:55-0500\n"
"PO-Revision-Date: 2010-02-26 23:05+0530\n"
"Last-Translator: gundachandru \n"
"Language-Team: Kannada \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"

#: ../../ipalib/parameters.py:224
msgid "incorrect type"
msgstr "ಸರಿಯಲ್ಲದ ಬಗೆ"

#: ../../ipalib/parameters.py:227
msgid "Only one value is allowed"
msgstr "ಕೇವಲ ಒಂದು ಬೆಲೆ ಮಾತ್ರ ಅನುಮೋದಿಸಲಾಗಿದೆ"

#: ../../ipalib/parameters.py:791
msgid "must be True or False"
msgstr "ನಿಜ (True) ಅಥವಾ ಸುಳ್ಳು (False) ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:892
msgid "must be an integer"
msgstr "ಇನ್ಟೀಜರ್ ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:943
#, python-format
msgid "must be at least %(minvalue)d"
msgstr "ಕನಿಷ್ಠವಾಗಿ %(minvalue)d ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:953
#, python-format
msgid "can be at most %(maxvalue)d"
msgstr "ಗರಿಷ್ಠವಾಗಿ %(maxvalue)d ಆಗಿರಬಹುದು"

#: ../../ipalib/parameters.py:963
msgid "must be a decimal number"
msgstr "ದಶಾಂಶ ಸಂಖ್ಯೆ ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:985
#, python-format
msgid "must be at least %(minvalue)f"
msgstr "ಕನಿಷ್ಠವಾಗಿ %(minvalue)f ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:995
#, python-format
msgid "can be at most %(maxvalue)f"
msgstr "ಗರಿಷ್ಠವಾಗಿ %(maxvalue)f ಆಗಿರಬಹುದು"

#: ../../ipalib/parameters.py:1055
#, python-format
msgid "must match pattern \"%(pattern)s\""
msgstr "ನಮೂನೆ \"%(pattern)s\" ಹೊಂದಾಣಿಕೆಯಾಗಲೇಬೇಕು"

#: ../../ipalib/parameters.py:1073
msgid "must be binary data"
msgstr "ಬೈನರಿ ಡಾಟಾ ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:1088
#, python-format
msgid "must be at least %(minlength)d bytes"
msgstr "ಕನಿಷ್ಠವಾಗಿ %(minlength)d ಬೈಟ್ಸ್ ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:1098
#, python-format
msgid "can be at most %(maxlength)d bytes"
msgstr "ಗರಿಷ್ಠವಾಗಿ %(maxlength)d ಬೈಟ್ಸ್ ಆಗಿರಬಹುದು"

#: ../../ipalib/parameters.py:1108
#, python-format
msgid "must be exactly %(length)d bytes"
msgstr "ನಿಖರವಾಗಿ %(length)d ಬೈಟ್ಸ್ ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:1126
msgid "must be Unicode text"
msgstr "ಯುನಿಕೋಡ್ ಪಠ್ಯ ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:1156
#, python-format
msgid "must be at least %(minlength)d characters"
msgstr "ಕನಿಷ್ಠವಾಗಿ %(minlength)d ಅಕ್ಷರಗಳು ಇರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:1166
#, python-format
msgid "can be at most %(maxlength)d characters"
msgstr "ಗರಿಷ್ಠವಾಗಿ %(maxlength)d ಅಕ್ಷರಗಳು ಇರಬಹುದು"

#: ../../ipalib/parameters.py:1176
#, python-format
msgid "must be exactly %(length)d characters"
msgstr "ನಿಖರವಾಗಿ %(length)d ಅಕ್ಷರಗಳು ಇರಲೇಬೇಕು"

#: ../../ipalib/parameters.py:1215
#, python-format
msgid "must be one of %(values)r"
msgstr "%(values)r ನಲ್ಲಿ ಒಂದು ಆಗಿರಲೇಬೇಕು"

#: ../../ipalib/cli.py:505
#, python-format
msgid "Enter %(label)s again to verify: "
msgstr "ಮತ್ತೊಮ್ಮೆ ಪರಿಶೀಲಿಸಲು %(label)s ಎಂಟರ್ ಮಾಡಿ:"

#: ../../ipalib/cli.py:509
msgid "Passwords do not match!"
msgstr "ಗುಪ್ತಪದಗಳು ಹೊಂದಾಣಿಕೆಯಾಗುತ್ತಿಲ್ಲ!"

#: ../../ipalib/cli.py:514
msgid "Cancelled."
msgstr "ರದ್ದುಗೊಳಿಸಲಾಗಿದೆ."

#: ../../ipalib/frontend.py:377
msgid "Results are truncated, try a more specific search"
msgstr "ಫಲಿತಾಂಶಗಳು ಕತ್ತರಿಸಲ್ಪಟ್ಟಿವೆ, ಹೆಚ್ಚ್ಹು ನಿರ್ದಿಷ್ಟವಾದ ಶೋಧನೆ ಪ್ರಯತ್ನಿಸಿ"

#: ../../ipalib/errors.py:297
#, python-format
msgid "%(cver)s client incompatible with %(sver)s server at %(server)r"
msgstr "%(server)r ನಲ್ಲಿ ಕ್ಲೈಂಟ್ %(cver)s ಸರ್ವರ್‌ %(sver)s ನೊಂದಿಗೆ 
ಹೊಂದಿಕೆಯಾಗುತ್ತಿಲ್ಲ"

#: ../../ipalib/errors.py:315
#, python-format
msgid "unknown error %(code)d from %(server)s: %(error)s"
msgstr "%(server)s ಸರ್ವರ್‌ನಿಂದ ಅಜ್ಞಾತ ದೋಷ %(code)d: %(error)s"

#: ../../ipalib/errors.py:331
msgid "an internal error has occurred"
msgstr "ಆಂತರಿಕ ದೋಷ ಉಂಟಾಗಿದೆ"

#: ../../ipalib/errors.py:353
#, python-format
msgid "an internal error has occurred on server at %(server)r"
msgstr "%(server)r ನಲ್ಲಿ ಸರ್ವರ್‌ನಲ್ಲಿ ಆಂತರಿಕ ದೋಷ ಉಂಟಾಗಿದೆ"

#: ../../ipalib/errors.py:369
#, python-format
msgid "unknown command %(name)r"
msgstr "ಅಜ್ಞಾತ ಆಜ್ಞೆ(ಕಮ್ಯಾಂಡ್) %(name)r "

#: ../../ipalib/errors.py:386
#: ../../ipalib/errors.py:411
#, python-format
msgid "error on server %(server)r: %(error)s"
msgstr "%(server)r ಸರ್ವರ್‌ನಲ್ಲಿ ದೋಷ: %(error)s"

#: ../../ipalib/errors.py:402
#, python-format
msgid "cannot connect to %(uri)r: %(error)s"
msgstr "%(uri)r ಗೆ ಸಂಪರ್ಕಿಸಲು ಆಗುತ್ತಿಲ್ಲ: %(error)s"

#: ../../ipalib/errors.py:420
#, python-format
msgid "Invalid JSON-RPC request: %(error)s"
msgstr "ಅಸಿಂಧುವಾದ JSON-RPC ಬೇಡಿಕೆ: %(error)s"

Re: [Freeipa-devel] [PATCH] 387 fix test failures

2010-02-26 Thread Rob Crittenden

Pavel Zůna wrote:

Rob Crittenden wrote:
This fixes the failures in the Env due to switching to unicode 
internally. Now that --all works this also adds the dn to the output 
in the XML-RPC tests.


rob


ack.

Pavel


pushed to master

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Re: [Freeipa-devel] [PATCH] 387 fix test failures

2010-02-26 Thread Rob Crittenden

Pavel Zůna wrote:

Rob Crittenden wrote:
This fixes the failures in the Env due to switching to unicode 
internally. Now that --all works this also adds the dn to the output 
in the XML-RPC tests.


rob


ack.

Pavel


pushed to master

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Re: [Freeipa-devel] [PATCH] Add more Spanish translations

2010-02-26 Thread Rob Crittenden

John Dennis wrote:

Add more Spanish translations:

Current translation status:

ipa.pot has 133 messages. There are 6 po translation files.
bn_IN:14/133  10.5%  106 po untranslated,   13 missing,  119 
untranslated
es:  124/133  93.2%9 po untranslated,0 missing,9 
untranslated
id:  107/133  80.5%   13 po untranslated,   13 missing,   26 
untranslated
kn:   20/133  15.0%  113 po untranslated,0 missing,  113 
untranslated
pl:  133/133 100.0%0 po untranslated,0 missing,0 
untranslated
ru:  120/133  90.2%0 po untranslated,   13 missing,   13 
untranslated




ack, pushed to master

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 385 don't try to revoke revoked certs

2010-02-26 Thread Rob Crittenden

John Dennis wrote:

On 02/19/2010 01:33 PM, Rob Crittenden wrote:

Check the status of a certificate before trying to revoke it. We get an
error thrown when we revoke a revoked cert that is difficult to
distinguish between a real error and "this is already revoked".


Conditional ACK. Please try to remember to localize all labels. That's a 
1 line change so it falls into the "make the fix & commit" category.




Fixed. At the time I did this patch GetText was not a valid data type 
for labels.


pushed to master.

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


[Freeipa-devel] [PATCH] 392 retrieve schema using kerberos credentials

2010-02-26 Thread Rob Crittenden

Retrieve the LDAP schema using kerberos credentials.

This is required so we can disable anonymous access in 389-ds.

rob


freeipa-392-bind.patch
Description: application/mbox
___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel