[Freeipa-devel] [freeipa PR#688][comment] Update get_attr_filter in LDAPSearch to handle nsaccountlock user searches

2017-04-24 Thread HonzaCholasta
  URL: https://github.com/freeipa/freeipa/pull/688
Title: #688: Update get_attr_filter in LDAPSearch to handle nsaccountlock user 
searches

HonzaCholasta commented:
"""
I guess it should. Could you please file a ticket?
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/688#issuecomment-296931927
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#714][comment] fix minor typo in ipa-adtrust-install.1

2017-04-24 Thread stlaz
  URL: https://github.com/freeipa/freeipa/pull/714
Title: #714: fix minor typo in ipa-adtrust-install.1

stlaz commented:
"""
Thanks, now this is ready to be pushed :)
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/714#issuecomment-296920348
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#714][+ack] fix minor typo in ipa-adtrust-install.1

2017-04-24 Thread stlaz
  URL: https://github.com/freeipa/freeipa/pull/714
Title: #714: fix minor typo in ipa-adtrust-install.1

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#694][comment] RFC: implement local PKINIT deployment in server/replica install

2017-04-24 Thread HonzaCholasta
  URL: https://github.com/freeipa/freeipa/pull/694
Title: #694: RFC: implement local PKINIT deployment in server/replica install

HonzaCholasta commented:
"""
@martbab, this sounds like a typical instance of a we will do it later = we 
will do it never situation. IMO we should remove the superfluous check right 
away, as that would give us more incentive to actually implement the test.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/694#issuecomment-296916627
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#714][comment] fix minor typo in ipa-adtrust-install.1

2017-04-24 Thread realsobek
  URL: https://github.com/freeipa/freeipa/pull/714
Title: #714: fix minor typo in ipa-adtrust-install.1

realsobek commented:
"""
It was my fault. I knew how to squash two unpushed commits, but squashing two 
pushed commits was beyond me.
Thanks for your comment in #716 I had a look again and I managed it this time. 
:)
I squashed the last two commits (see `git log`) in my branch with `git rebase 
--interactive HEAD~2` and pushed the result to my fork with `git push origin 
master --force`
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/714#issuecomment-296823122
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#714][synchronized] fix minor typo in ipa-adtrust-install.1

2017-04-24 Thread realsobek
   URL: https://github.com/freeipa/freeipa/pull/714
Author: realsobek
 Title: #714: fix minor typo in ipa-adtrust-install.1
Action: synchronized

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/714/head:pr714
git checkout pr714
From 3ab52cf1d04eb8e0e4a52bfe12ee6d1adaf90e06 Mon Sep 17 00:00:00 2001
From: realsobek 
Date: Sat, 15 Apr 2017 13:52:44 +0200
Subject: [PATCH] fix minor typos in ipa-adtrust-install.1

---
 install/tools/man/ipa-adtrust-install.1 | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/install/tools/man/ipa-adtrust-install.1 b/install/tools/man/ipa-adtrust-install.1
index ef3c23b..5924d16 100644
--- a/install/tools/man/ipa-adtrust-install.1
+++ b/install/tools/man/ipa-adtrust-install.1
@@ -26,7 +26,7 @@ Adds all necessary objects and configuration to allow an IPA server to create a
 trust to an Active Directory domain. This requires that the IPA server is
 already installed and configured.
 
-Please note you will not be able to estabilish an trust to an Active Directory
+Please note you will not be able to establish a trust to an Active Directory
 domain unless the realm name of the IPA server matches its domain name.
 
 ipa\-adtrust\-install can be run multiple times to reinstall deleted objects or
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#728][opened] ipa-cacert-manage: add --external-ca-type

2017-04-24 Thread HonzaCholasta
   URL: https://github.com/freeipa/freeipa/pull/728
Author: HonzaCholasta
 Title: #728: ipa-cacert-manage: add --external-ca-type
Action: opened

PR body:
"""
**server upgrade: always fix certmonger tracking request**

Fix certmonger tracking requests on every run of ipa-server-upgrade rather
than only when the tracking configuration has changed and the requests have
not yet been updated.

This allows fixing broken tracking requests just by re-running
ipa-server-upgrade.

**cainstance: use correct profile for lightweight CA certificates**

Use Dogtag's `caCACert` CA certificate profile rather than the
`ipaCACertRenewal` virtual profile for lightweight CA certificates.

The `ipaCACertRenewal` virtual profile adds special handling of externally
signed CA certificates and LDAP replication of issued certificates on top
of `caCACert`, neither of which is relevant for lightweight CA
certificates.

Remove all of the special casing of lightweight CA certificates from
dogtag-ipa-ca-renew-agent-submit.

Make sure existing lightweight CA certmonger tracking requests are updated
on server upgrade.

**renew agent: allow reusing existing certs**

Add a switch which makes `dogtag-ipa-ca-renew-agent-submit` reuse the
existing certificate rather than request a new one from the CA while
maintaining LDAP replication of the certificate.

Make this available as a new `dogtag-ipa-ca-renew-agent-reuse` certmonger
CA.

This allows redoing the LDAP replication and reexecuting pre- and post-save
commands of a tracking request without reissuing the certificate.

**renew agent: always export CSR on IPA CA certificate renewal**

Make sure a CSR is exported for the IPA CA whenever certmonger detects that
the CA certificate is about to expire.

This is a pre-requisite for using the `dogtag-ipa-ca-renew-agent-reuse` CA
instead of the `ipaCSRExport` virtual profile to export the CSR.

**renew agent: get rid of virtual profiles**

Replace all uses of virtual profiles with `dogtag-ipa-ca-renew-agent-reuse`
and remove profile from the IPA CA certificate tracking request.

This prevents virtual profiles from making their way into CSRs and in turn
being rejected by certain CAs. This affected the IPA CA CSR with Microsoft
CS in particular.

**ipa-cacert-manage: add --external-ca-type**

Add the `--external-ca-type`, as known from `ipa-server-install` and
`ipa-ca-install`, to `ipa-cacert-manage`.

This allows creating IPA CA CSRs suitable for use with Microsoft CS using
`ipa-cacert-manage`:

```
ipa-cacert-manage renew --external-ca --external-ca-type=ms-cs
```

https://pagure.io/freeipa/issue/5799
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/728/head:pr728
git checkout pr728
From b7ead617441712d6d7286ac66a2b2feea97f72af Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Mon, 24 Apr 2017 05:24:24 +
Subject: [PATCH 1/7] renew agent: respect CA renewal master setting

Do not bypass the renewal master check when a non-virtual profile is used
in dogtag-ipa-ca-renew-agent-submit.

This fixes dogtag-ipa-ca-renew-agent not respecting the CA renewal master
setting for certificates tracked with a real profile. (Note that there
currently aren't any such certificates tracked by us.)

Request the RA certificate using dogtag-submit rather than
dogtag-ipa-ca-renew-agent-submit as the CA renewal master setting is not
available so early in the install process.

https://pagure.io/freeipa/issue/5799
---
 install/certmonger/dogtag-ipa-ca-renew-agent-submit | 2 +-
 ipaserver/install/cainstance.py | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/install/certmonger/dogtag-ipa-ca-renew-agent-submit b/install/certmonger/dogtag-ipa-ca-renew-agent-submit
index 7a3d955..f253fd9 100755
--- a/install/certmonger/dogtag-ipa-ca-renew-agent-submit
+++ b/install/certmonger/dogtag-ipa-ca-renew-agent-submit
@@ -535,7 +535,7 @@ def main():
 
 profile = os.environ.get('CERTMONGER_CA_PROFILE')
 if is_replicated():
-if profile or is_renewal_master():
+if is_renewal_master():
 handler = request_and_store_cert
 else:
 handler = retrieve_cert_continuous
diff --git a/ipaserver/install/cainstance.py b/ipaserver/install/cainstance.py
index 84d60bf..336299c 100644
--- a/ipaserver/install/cainstance.py
+++ b/ipaserver/install/cainstance.py
@@ -823,7 +823,7 @@ def __request_ra_certificate(self):
  "-out", chain_file.name,
  ], stdin=data, capture_output=False)
 
-agent_args = [paths.DOGTAG_IPA_CA_RENEW_AGENT_SUBMIT,
+agent_args = [paths.CERTMONGER_DOGTAG_SUBMIT,
   "--dbdir", self.tmp_agent_db,
   "--nickname", "ipa-ca-agent",
   "--cafile", chain_file.name,

From 6a64cc75f17ce029b487ff6c5bdd46bcd05c645d Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Tue, 28 Feb 2017 10:55:54 +
Subject:

[Freeipa-devel] [freeipa PR#711][+pushed] Compat-plugin related fixes

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/711
Title: #711: Compat-plugin related fixes

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#711][comment] Compat-plugin related fixes

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/711
Title: #711: Compat-plugin related fixes

MartinBasti commented:
"""
master:

* 0c0af8cf7adf61ef03ba1240ecbdecef7fa15275 compat-manage: behave the same for 
all users
* ddbbb1c58e8a4fec8129e7d1e941c54660af6a69 Move the compat plugin setup at the 
end of install
* 645615958d4b0f9e6dd8a5ff2541952abb588d55 compat: ignore 
cn=topology,cn=ipa,cn=etc subtree
* 68c8ddf1871efe7ef78ce153573d522aefecfdfa compat plugin: Update link to 
slapi-nis project


ipa-4-5:

* 4fa7718c6ad03a7cf534313d5c50d78d4863fe6e compat-manage: behave the same for 
all users
* 7364c1360c4e2271667f3a08d8d504b3cd813e2f Move the compat plugin setup at the 
end of install
* e691877c24e722d4fc91fed34cd31cc102879c1a compat: ignore 
cn=topology,cn=ipa,cn=etc subtree
* efe096040aefdeea37afcf2671506982d8522f47 compat plugin: Update link to 
slapi-nis project


"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/711#issuecomment-296700686
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#711][closed] Compat-plugin related fixes

2017-04-24 Thread MartinBasti
   URL: https://github.com/freeipa/freeipa/pull/711
Author: stlaz
 Title: #711: Compat-plugin related fixes
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/711/head:pr711
git checkout pr711
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#727][closed] Regenerate ASN.1 code with asn1c 0.9.28

2017-04-24 Thread MartinBasti
   URL: https://github.com/freeipa/freeipa/pull/727
Author: tiran
 Title: #727: Regenerate ASN.1 code with asn1c 0.9.28
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/727/head:pr727
git checkout pr727
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#727][+pushed] Regenerate ASN.1 code with asn1c 0.9.28

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/727
Title: #727: Regenerate ASN.1 code with asn1c 0.9.28

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#727][comment] Regenerate ASN.1 code with asn1c 0.9.28

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/727
Title: #727: Regenerate ASN.1 code with asn1c 0.9.28

MartinBasti commented:
"""
master:

* ad0843047779b55848425eaba0385034d6893446 Regenerate ASN.1 code with asn1c 
0.9.28
* 9b443b908fe6fb9c11f9b76552bf4fef2c3b2be5 Replace _BSD_SOURCE with 
_DEFAULT_SOURCE


"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/727#issuecomment-296699132
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#727][+ack] Regenerate ASN.1 code with asn1c 0.9.28

2017-04-24 Thread simo5
  URL: https://github.com/freeipa/freeipa/pull/727
Title: #727: Regenerate ASN.1 code with asn1c 0.9.28

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#711][+ack] Compat-plugin related fixes

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/711
Title: #711: Compat-plugin related fixes

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#720][+ack] tox: use pylint 1.6.x for now

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/720
Title: #720: tox: use pylint 1.6.x for now

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#720][synchronized] tox: use pylint 1.6.x for now

2017-04-24 Thread tiran
   URL: https://github.com/freeipa/freeipa/pull/720
Author: tiran
 Title: #720: tox: use pylint 1.6.x for now
Action: synchronized

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/720/head:pr720
git checkout pr720
From c629f1ac97f73e3c4d4a23bcde5b769319368e74 Mon Sep 17 00:00:00 2001
From: Christian Heimes 
Date: Wed, 19 Apr 2017 10:58:11 +0200
Subject: [PATCH] tox: use pylint 1.6.x for now

FreeIPA is not yet compatible with pylint 1.7.1+. Enforce pylint 1.6.x
until all issues have been addressed.

Related: https://pagure.io/freeipa/issue/6874
Signed-off-by: Christian Heimes 
---
 .wheelconstraints.in | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/.wheelconstraints.in b/.wheelconstraints.in
index eba4ec9..ba37de7 100644
--- a/.wheelconstraints.in
+++ b/.wheelconstraints.in
@@ -9,3 +9,5 @@ ipapython == @VERSION@
 ipaserver == @VERSION@
 ipatests == @VERSION@
 
+# see https://pagure.io/freeipa/issue/6874
+pylint < 1.7
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#720][comment] tox: use pylint 1.6.x for now

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/720
Title: #720: tox: use pylint 1.6.x for now

MartinBasti commented:
"""
pylint and pylint3 targets are failing
```
MAKEFLAGS= /tmp/freeipa/.tox/pylint2/bin/python -m pip wheel \
--disable-pip-version-check \
--constraint .wheelconstraints \
--find-links ./dist/wheels \
--find-links ./dist/bundle \
--wheel-dir ./dist/bundle \
ipaclient ipalib ipapython ipaclient ipapython[certmonger] pylint < 1.7
/bin/sh: 1.7: No such file or directory
Makefile:1249: recipe for target 'wheel_bundle' failed
make: *** [wheel_bundle] Error 1
make: Leaving directory '/tmp/freeipa'
```
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/720#issuecomment-296624447
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#724][+pushed] upgrade: adtrust update_tdo_gidnumber plugin must check if adtrust is…

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/724
Title: #724: upgrade: adtrust update_tdo_gidnumber plugin must check if adtrust 
is…

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#724][closed] upgrade: adtrust update_tdo_gidnumber plugin must check if adtrust is…

2017-04-24 Thread MartinBasti
   URL: https://github.com/freeipa/freeipa/pull/724
Author: flo-renaud
 Title: #724: upgrade: adtrust update_tdo_gidnumber plugin must check if 
adtrust is…
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/724/head:pr724
git checkout pr724
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#724][comment] upgrade: adtrust update_tdo_gidnumber plugin must check if adtrust is…

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/freeipa/pull/724
Title: #724: upgrade: adtrust update_tdo_gidnumber plugin must check if adtrust 
is…

MartinBasti commented:
"""
master:

* 434d9e539d24fe0110c5d6bf4a4342daf40d15d5 upgrade: adtrust 
update_tdo_gidnumber plugin must check if adtrust is installed


ipa-4-5:

* c05bd60585fb80e061b8582a648a65204c709f51 upgrade: adtrust 
update_tdo_gidnumber plugin must check if adtrust is installed


"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/724#issuecomment-296617979
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [bind-dyndb-ldap PR#17][comment] settings: skip unconfigured values

2017-04-24 Thread MartinBasti
  URL: https://github.com/freeipa/bind-dyndb-ldap/pull/17
Title: #17: settings: skip unconfigured values

MartinBasti commented:
"""
LGTM
"""

See the full comment at 
https://github.com/freeipa/bind-dyndb-ldap/pull/17#issuecomment-296617030
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#694][comment] RFC: implement local PKINIT deployment in server/replica install

2017-04-24 Thread martbab
  URL: https://github.com/freeipa/freeipa/pull/694
Title: #694: RFC: implement local PKINIT deployment in server/replica install

martbab commented:
"""
I have rewritten the PKINIT state reporting code as agreed with @abbra and also 
re-factored the installation/upgrade logic. @HonzaCholasta also requested to 
remove the local PKINIT check completely and have a test suite for that. On the 
one hand I tend to agree, on the other I would keep the check there for now 
until the password authentication test is implemented. Then remove the checks 
once we have coverage for it.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/694#issuecomment-296613316
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#694][synchronized] RFC: implement local PKINIT deployment in server/replica install

2017-04-24 Thread martbab
   URL: https://github.com/freeipa/freeipa/pull/694
Author: martbab
 Title: #694: RFC: implement local PKINIT deployment in server/replica install
Action: synchronized

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/694/head:pr694
git checkout pr694
From f3f48aa15587eccc8046f36d62397fee634f7090 Mon Sep 17 00:00:00 2001
From: Martin Babinsky 
Date: Fri, 31 Mar 2017 15:06:46 +0200
Subject: [PATCH 1/8] Allow for configuration of all three PKINIT variants when
 deploying KDC

The PKINIT setup code now can configure PKINIT using IPA CA signed
certificate, 3rd party certificate and local PKINIT with self-signed
keypair. The local PKINIT is also selected as a fallback mechanism if
the CSR is rejected by CA master or `--no-pkinit` is used.

http://www.freeipa.org/page/V4/Kerberos_PKINIT
https://pagure.io/freeipa/issue/6830
---
 ipaserver/install/krbinstance.py | 143 +--
 1 file changed, 91 insertions(+), 52 deletions(-)

diff --git a/ipaserver/install/krbinstance.py b/ipaserver/install/krbinstance.py
index 6c105f7..a86cd16 100644
--- a/ipaserver/install/krbinstance.py
+++ b/ipaserver/install/krbinstance.py
@@ -38,6 +38,7 @@
 from ipalib.install import certmonger
 from ipapython.ipa_log_manager import root_logger
 from ipapython.dn import DN
+from ipapython.dogtag import KDC_PROFILE
 
 from ipaserver.install import replication
 from ipaserver.install import ldapupdate
@@ -354,61 +355,80 @@ def _wait_for_replica_kdc_entry(self):
 remote_ldap.gssapi_bind()
 replication.wait_for_entry(remote_ldap, kdc_dn, timeout=60)
 
-def setup_pkinit(self):
-if self.pkcs12_info:
-certs.install_pem_from_p12(self.pkcs12_info[0],
-   self.pkcs12_info[1],
-   paths.KDC_CERT)
-certs.install_key_from_p12(self.pkcs12_info[0],
-   self.pkcs12_info[1],
-   paths.KDC_KEY)
-else:
-subject = str(DN(('cn', self.fqdn), self.subject_base))
-krbtgt = "krbtgt/" + self.realm + "@" + self.realm
-certpath = (paths.KDC_CERT, paths.KDC_KEY)
+def _call_certmonger(self, certmonger_ca='IPA'):
+subject = str(DN(('cn', self.fqdn), self.subject_base))
+krbtgt = "krbtgt/" + self.realm + "@" + self.realm
+certpath = (paths.KDC_CERT, paths.KDC_KEY)
 
-try:
-prev_helper = None
-if self.master_fqdn is None:
-ca_args = [
-paths.CERTMONGER_DOGTAG_SUBMIT,
-'--ee-url', 'https://%s:8443/ca/ee/ca' % self.fqdn,
-'--certfile', paths.RA_AGENT_PEM,
-'--keyfile', paths.RA_AGENT_KEY,
-'--cafile', paths.IPA_CA_CRT,
-'--agent-submit'
-]
-helper = " ".join(ca_args)
-prev_helper = certmonger.modify_ca_helper('IPA', helper)
-else:
-self._wait_for_replica_kdc_entry()
-
-certmonger.request_and_wait_for_cert(
-certpath,
-subject,
-krbtgt,
-dns=self.fqdn,
-storage='FILE',
-profile='KDCs_PKINIT_Certs')
-except dbus.DBusException as e:
-# if the certificate is already tracked, ignore the error
-name = e.get_dbus_name()
-if name != 'org.fedorahosted.certmonger.duplicate':
-root_logger.error("Failed to initiate the request: %s", e)
-return
-finally:
-if prev_helper is not None:
-certmonger.modify_ca_helper('IPA', prev_helper)
-
-# Finally copy the cacert in the krb directory so we don't
-# have any selinux issues with the file context
+try:
+prev_helper = None
+# on the first CA-ful master without '--no-pkinit', we issue the
+# certificate by contacting Dogtag directly
+use_dogtag_submit = all(
+[self.master_fqdn is None,
+ self.pkcs12_info is None,
+ self.config_pkinit])
+
+if use_dogtag_submit:
+ca_args = [
+paths.CERTMONGER_DOGTAG_SUBMIT,
+'--ee-url', 'https://%s:8443/ca/ee/ca' % self.fqdn,
+'--certfile', paths.RA_AGENT_PEM,
+'--keyfile', paths.RA_AGENT_KEY,
+'--cafile', paths.IPA_CA_CRT,
+'--agent-submit'
+]
+helper = " ".join(ca_args)
+prev_helper = certmonger.modify_ca_helper(certmonger_ca, helper)
+
+certmonger.req

[Freeipa-devel] [freeipa PR#712][+ack] WebUI: Coverity fixes

2017-04-24 Thread tomaskrizek
  URL: https://github.com/freeipa/freeipa/pull/712
Title: #712: WebUI: Coverity fixes

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#727][opened] Regenerate ASN.1 code with asn1c 0.9.28

2017-04-24 Thread tiran
   URL: https://github.com/freeipa/freeipa/pull/727
Author: tiran
 Title: #727: Regenerate ASN.1 code with asn1c 0.9.28
Action: opened

PR body:
"""
Regenerate ASN.1 code with asn1c 0.9.28

https://pagure.io/freeipa/issue/6818
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/727/head:pr727
git checkout pr727
From 6468a24595250eaec25d49ac80c0883a4892e093 Mon Sep 17 00:00:00 2001
From: Christian Heimes 
Date: Mon, 24 Apr 2017 11:12:42 +0200
Subject: [PATCH 1/2] Regenerate ASN.1 code with asn1c 0.9.28

Closes: https://pagure.io/freeipa/issue/6818
Signed-off-by: Christian Heimes 
---
 asn1/asn1c/BIT_STRING.c |  26 +-
 asn1/asn1c/GKCurrentKeys.c  |   8 ++--
 asn1/asn1c/GKCurrentKeys.h  |   4 +-
 asn1/asn1c/GKNewKeys.c  |  10 ++--
 asn1/asn1c/GKNewKeys.h  |   4 +-
 asn1/asn1c/GKReply.c|  10 ++--
 asn1/asn1c/GKReply.h|   4 +-
 asn1/asn1c/GetKeytabControl.c   |   6 +--
 asn1/asn1c/GetKeytabControl.h   |   4 +-
 asn1/asn1c/INTEGER.c|  72 ++--
 asn1/asn1c/INTEGER.h|   8 ++--
 asn1/asn1c/Int32.c  |  10 ++--
 asn1/asn1c/Int32.h  |   4 +-
 asn1/asn1c/KrbKey.c |   8 ++--
 asn1/asn1c/KrbKey.h |   4 +-
 asn1/asn1c/NativeEnumerated.c   |  54 ++---
 asn1/asn1c/NativeInteger.c  |  16 +++
 asn1/asn1c/OCTET_STRING.c   | 103 ++--
 asn1/asn1c/OCTET_STRING.h   |   2 +-
 asn1/asn1c/TypeValuePair.c  |   8 ++--
 asn1/asn1c/TypeValuePair.h  |   4 +-
 asn1/asn1c/asn_application.h|   6 +--
 asn1/asn1c/asn_codecs.h |  14 +++---
 asn1/asn1c/asn_codecs_prim.c|  16 +++
 asn1/asn1c/asn_internal.h   |  68 +-
 asn1/asn1c/asn_system.h |  14 --
 asn1/asn1c/ber_decoder.c|   4 +-
 asn1/asn1c/ber_tlv_length.c |   2 +-
 asn1/asn1c/constr_CHOICE.c  |  94 ++--
 asn1/asn1c/constr_CHOICE.h  |   4 +-
 asn1/asn1c/constr_SEQUENCE.c|  91 ++-
 asn1/asn1c/constr_SEQUENCE.h|   6 +--
 asn1/asn1c/constr_SEQUENCE_OF.c |  36 +++---
 asn1/asn1c/constr_SET_OF.c  |  47 +-
 asn1/asn1c/constr_SET_OF.h  |   2 +-
 asn1/asn1c/constr_TYPE.c|   2 +-
 asn1/asn1c/constr_TYPE.h|  18 +++
 asn1/asn1c/constraints.h|   8 ++--
 asn1/asn1c/der_encoder.c|  18 +++
 asn1/asn1c/per_decoder.c|   8 ++--
 asn1/asn1c/per_encoder.c|   4 +-
 asn1/asn1c/per_opentype.c   |  24 +-
 asn1/asn1c/per_support.c|   8 ++--
 asn1/asn1c/per_support.h|   8 ++--
 asn1/asn1c/xer_decoder.c|  17 ---
 asn1/asn1c/xer_decoder.h|   7 +--
 asn1/asn1c/xer_encoder.c|   8 ++--
 asn1/asn1c/xer_support.c|  16 ++-
 48 files changed, 474 insertions(+), 445 deletions(-)

diff --git a/asn1/asn1c/BIT_STRING.c b/asn1/asn1c/BIT_STRING.c
index 9b98271..997ff41 100644
--- a/asn1/asn1c/BIT_STRING.c
+++ b/asn1/asn1c/BIT_STRING.c
@@ -9,7 +9,7 @@
 /*
  * BIT STRING basic type description.
  */
-static ber_tlv_tag_t asn_DEF_BIT_STRING_tags[] = {
+static const ber_tlv_tag_t asn_DEF_BIT_STRING_tags[] = {
 	(ASN_TAG_CLASS_UNIVERSAL | (3 << 2))
 };
 static asn_OCTET_STRING_specifics_t asn_DEF_BIT_STRING_specs = {
@@ -52,13 +52,13 @@ BIT_STRING_constraint(asn_TYPE_descriptor_t *td, const void *sptr,
 	if(st && st->buf) {
 		if((st->size == 0 && st->bits_unused)
 		|| st->bits_unused < 0 || st->bits_unused > 7) {
-			_ASN_CTFAIL(app_key, td, sptr,
+			ASN__CTFAIL(app_key, td, sptr,
 "%s: invalid padding byte (%s:%d)",
 td->name, __FILE__, __LINE__);
 			return -1;
 		}
 	} else {
-		_ASN_CTFAIL(app_key, td, sptr,
+		ASN__CTFAIL(app_key, td, sptr,
 			"%s: value not given (%s:%d)",
 			td->name, __FILE__, __LINE__);
 		return -1;
@@ -86,7 +86,7 @@ BIT_STRING_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
 	uint8_t *end;
 
 	if(!st || !st->buf)
-		_ASN_ENCODE_FAILED;
+		ASN__ENCODE_FAILED;
 
 	er.encoded = 0;
 
@@ -101,9 +101,9 @@ BIT_STRING_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
 		int nline = xcan?0:(((buf - st->buf) % 8) == 0);
 		if(p >= scend || nline) {
 			er.encoded += p - scratch;
-			_ASN_CALLBACK(scratch, p - scratch);
+			ASN__CALLBACK(scratch, p - scratch);
 			p = scratch;
-			if(nline) _i_ASN_TEXT_INDENT(1, ilevel);
+			if(nline) ASN__TEXT_INDENT(1, ilevel);
 		}
 		memcpy(p + 0, _bit_pattern[v >> 4], 4);
 		memcpy(p + 4, _bit_pattern[v & 0x0f], 4);
@@ -111,9 +111,9 @@ BIT_STRING_encode_xer(asn_TYPE_descriptor_t *td, void *sptr,
 	}
 
 	if(!xcan && ((buf - st->buf) % 8) == 0)
-		_i_ASN_TEXT_INDENT(1, ilevel);
+		ASN__TEXT_INDENT(1, ilevel);
 	er.encoded += p - scratch;
-	_ASN_CALLBACK(scratch, p - scratch);
+	ASN__CALLBACK(scratch, p - scratch);
 	p = scratch;
 
 	if(buf == end) {
@@ -123,14 +123,14 

[Freeipa-devel] [freeipa PR#726][synchronized] Add check for directory name

2017-04-24 Thread Akasurde
   URL: https://github.com/freeipa/freeipa/pull/726
Author: Akasurde
 Title: #726: Add check for directory name
Action: synchronized

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/726/head:pr726
git checkout pr726
From dfe0c85ae908b4afbbd014cbf8bcf4e9b81c066d Mon Sep 17 00:00:00 2001
From: Abhijeet Kasurde 
Date: Fri, 21 Apr 2017 10:11:38 +0530
Subject: [PATCH] Add check for directory name

Fix adds check to verify if user provided input is not
a directory when filename is required.

Fixes: https://pagure.io/freeipa/issue/6883

Signed-off-by: Abhijeet Kasurde 
---
 ipalib/util.py | 4 
 1 file changed, 4 insertions(+)

diff --git a/ipalib/util.py b/ipalib/util.py
index e9d4105..f0d9401 100644
--- a/ipalib/util.py
+++ b/ipalib/util.py
@@ -170,6 +170,10 @@ def check_writable_file(filename):
 """
 if filename is None:
 raise errors.FileError(reason=_('Filename is empty'))
+
+if not os.path.isfile(filename):
+raise errors.FileError(reason=_('Expected file but %(fname)s is not a '
+'regular file' % dict(fname=filename)))
 try:
 if os.path.exists(filename):
 if not os.access(filename, os.W_OK):
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#726][comment] Add check for directory name

2017-04-24 Thread Akasurde
  URL: https://github.com/freeipa/freeipa/pull/726
Title: #726: Add check for directory name

Akasurde commented:
"""
@tiran Do you think we should allow only files here ?
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/726#issuecomment-296579941
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#714][comment] fix minor typo in ipa-adtrust-install.1

2017-04-24 Thread stlaz
  URL: https://github.com/freeipa/freeipa/pull/714
Title: #714: fix minor typo in ipa-adtrust-install.1

stlaz commented:
"""
Ah, I did not notice you made a second commit for this. Please, squash them.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/714#issuecomment-296573574
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#714][-ack] fix minor typo in ipa-adtrust-install.1

2017-04-24 Thread stlaz
  URL: https://github.com/freeipa/freeipa/pull/714
Title: #714: fix minor typo in ipa-adtrust-install.1

Label: -ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#726][comment] Add check for directory name

2017-04-24 Thread tiran
  URL: https://github.com/freeipa/freeipa/pull/726
Title: #726: Add check for directory name

tiran commented:
"""
What about other types that might cause trouble, e.g. socket, fifo, device 
files, dangling symlinks?
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/726#issuecomment-296572324
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code