[Freeipa-devel] [freeipa PR#355][comment] Set up DS TLS on replica in CA-less topology

2016-12-22 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/355
Title: #355: Set up DS TLS on replica in CA-less topology

jcholast commented:
"""
@mbasti-rh, `ipa-certupdate` has to be run on *all* systems in the domain after 
installing a CA. How do you propose we do that from `ipa-ca-install`? Anyway, 
the behavior @tomaskrizek is observing happens if you don't run 
`ipa-certupdate` *before* `ipa-ca-install` *on replica* and is caused by 
`ipa-ca-install` using local files rather than LDAP when looking for CA 
certificates.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/355#issuecomment-268741247
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#360][opened] x509: use PyASN1 to parse PKCS#7

2016-12-21 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/360
Author: jcholast
 Title: #360: x509: use PyASN1 to parse PKCS#7
Action: opened

PR body:
"""
Use PyASN1 with the PKCS#7 definitions from `pyasn1_modules` to parse
PKCS#7 in `pkcs7_to_pems()` instead of calling `openssl pkcs7` in a
subprocess.

https://fedorahosted.org/freeipa/ticket/6550
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/360/head:pr360
git checkout pr360
From e795b5d53d1a58ea1247668e13be9b45e0652298 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Wed, 21 Dec 2016 14:05:57 +0100
Subject: [PATCH] x509: use PyASN1 to parse PKCS#7

Use PyASN1 with the PKCS#7 definitions from `pyasn1_modules` to parse
PKCS#7 in `pkcs7_to_pems()` instead of calling `openssl pkcs7` in a
subprocess.

https://fedorahosted.org/freeipa/ticket/6550
---
 ipalib/x509.py | 48 +++-
 1 file changed, 31 insertions(+), 17 deletions(-)

diff --git a/ipalib/x509.py b/ipalib/x509.py
index 851af5a..13327c1 100644
--- a/ipalib/x509.py
+++ b/ipalib/x509.py
@@ -42,21 +42,13 @@
 import cryptography.x509
 from pyasn1.type import univ, char, namedtype, tag
 from pyasn1.codec.der import decoder, encoder
-from pyasn1_modules import rfc2459
+from pyasn1_modules import rfc2315, rfc2459
 import six
 
 from ipalib import api
 from ipalib import util
 from ipalib import errors
 from ipapython.dn import DN
-from ipapython import ipautil
-
-try:
-from ipaplatform.paths import paths
-except ImportError:
-OPENSSL = '/usr/bin/openssl'
-else:
-OPENSSL = paths.OPENSSL
 
 if six.PY3:
 unicode = str
@@ -160,16 +152,38 @@ def pkcs7_to_pems(data, datatype=PEM):
 Extract certificates from a PKCS #7 object.
 
 Return a ``list`` of X.509 PEM strings.
+"""
+if datatype == PEM:
+match = re.match(
+r'-BEGIN PKCS7-(.*?)-END PKCS7-',
+data,
+re.DOTALL)
+if not match:
+raise ValueError("not a valid PKCS#7 PEM")
 
-May throw ``ipautil.CalledProcessError`` on invalid data.
+data = base64.b64decode(match.group(1))
 
-"""
-cmd = [
-OPENSSL, "pkcs7", "-print_certs",
-"-inform", "PEM" if datatype == PEM else "DER",
-]
-result = ipautil.run(cmd, stdin=data, capture_output=True)
-return PEM_REGEX.findall(result.output)
+content_info, tail = decoder.decode(data, rfc2315.ContentInfo())
+if tail:
+raise ValueError("not a valid PKCS#7 message")
+
+if content_info['contentType'] != rfc2315.signedData:
+raise ValueError("not a PKCS#7 signed data message")
+
+signed_data, tail = decoder.decode(bytes(content_info['content']),
+   rfc2315.SignedData())
+if tail:
+raise ValueError("not a valid PKCS#7 signed data message")
+
+result = []
+
+for certificate in signed_data['certificates']:
+certificate = encoder.encode(certificate)
+certificate = base64.b64encode(certificate)
+certificate = make_pem(certificate)
+result.append(certificate)
+
+return result
 
 
 def is_self_signed(certificate, datatype=PEM):
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#348][synchronized] ca: fix ca-find with --pkey-only

2016-12-21 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/348
Author: jcholast
 Title: #348: ca: fix ca-find with --pkey-only
Action: synchronized

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/348/head:pr348
git checkout pr348
From fde228a0e0cffe754c7b420a3a1d87af46f7d995 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Fri, 16 Dec 2016 14:19:00 +0100
Subject: [PATCH] ca: fix ca-find with --pkey-only

Since commit 32b1743e5fb318b226a602ec8d9a4b6ef2a25c9d, ca-find will fail
with internal error if --pkey-only is specified, because the code to
look up the CA certificate and certificate chain assumes that the ipaCAId
attribute is always present in the result.

Fix this by not attempting to lookup the certificate / chain at all when
--pkey-only is specified.

https://fedorahosted.org/freeipa/ticket/6178
---
 ipaserver/plugins/ca.py | 10 +++---
 1 file changed, 7 insertions(+), 3 deletions(-)

diff --git a/ipaserver/plugins/ca.py b/ipaserver/plugins/ca.py
index 2510a79..f02c144 100644
--- a/ipaserver/plugins/ca.py
+++ b/ipaserver/plugins/ca.py
@@ -162,7 +162,10 @@ class ca(LDAPObject):
 
 
 def set_certificate_attrs(entry, options, want_cert=True):
-ca_id = entry['ipacaid'][0]
+try:
+ca_id = entry['ipacaid'][0]
+except KeyError:
+return
 full = options.get('all', False)
 want_chain = options.get('chain', False)
 
@@ -192,8 +195,9 @@ class ca_find(LDAPSearch):
 def execute(self, *keys, **options):
 ca_enabled_check()
 result = super(ca_find, self).execute(*keys, **options)
-for entry in result['result']:
-set_certificate_attrs(entry, options, want_cert=False)
+if not options.get('pkey_only', False):
+for entry in result['result']:
+set_certificate_attrs(entry, options, want_cert=False)
 return result
 
 
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#298][comment] ipaldap: handle binary encoding option transparently

2016-12-21 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/298
Title: #298: ipaldap: handle binary encoding option transparently

jcholast commented:
"""
>  If `ipaldap` is a generic LDAP client, it should obey the RFCs and always 
> transfer the relevant attributes (`userCertificate`, `cACertificate`, etc) 
> with the `;binary` encoding option, and it should expect to see it when 
> reading the relevant attributes from the server.

No, it should respect whatever is defined on the server, otherwise it's not a 
generic LDAP client. If the server does something wrong, it has to be fixed 
there, on the server. The goal of `ipaldap` is not to make buggy or non-LDAPv3 
(e.g. AD) servers look like they are LDAPv3-compliant, the goal is to interpret 
attributes according to the server-defined schema.

> IMO `ipaldap` should handle this transparently because it is part of the LDAP 
> protocol.

Nowhere in the RFCs is it mandated that a compliant client cannot request the 
attributes without the option, nor that it must not accept the attributes 
without the option in server responses. If this was true, it would have to be 
fixed in OpenLDAP libs anyway, not in `ipaldap`.

> There is no 389DS-specific hack in my proposed change (but I'm curious about 
> what part of it you feel is).

The part where you implicitly add the binary transfer option to attribute names 
(although not mandated on clients by any RFC) without knowing how the attribute 
types are defined on the server (although mandated only on attribute types with 
the certificate syntax by RFC 4523) .

> This would also avoid inconsistent handling of relevant attributes between 
> different plugins, which is the situation we currently have.

This is because of historical reasons (the original implementation of `host` 
and `service` plugins used `userCertificate` instead of 
`userCertificate;binary`) and will have to stay this way at least until all of 
the buggy 389 DS / IPA releases go out of support.

> But apart from the inconsisency (which is a nusiance) we have a bigger 
> problem - in several plugins we specifically try to read `userCertificate`, 
> but a RFC 4522 compliant server (which 389DS is not now, but hopefully one 
> day will be) will always return `userCertificate;binary`. So, our current 
> code breaks if/when that happens. Furthermore, other RFC 4522-compliant 
> programs that correctly use the ;binary transfer encoding option to, e.g. 
> write certificates to user entries, will cause those certificates to be 
> unreadable by current IPA plugin code. This is not good enough.

We can easily fix the plugins to read from `userCertificate;binary` in addition 
to `userCertificate`. We have to continue to write to `userCertificate` only 
though, because of backward compatibility with older servers.

> 389DS does not behave correctly; it's treatment of `;binary` is wrong in 
> several ways, apart from the incorrect attribute syntax for relevant 
> attributes.

Not enforcing `;binary` on attribute types with octet string syntax *is* 
correct. I was not trying to imply anything else.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/298#issuecomment-268505078
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#359][opened] dogtag: search past the first 100 certificates

2016-12-21 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/359
Author: jcholast
 Title: #359: dogtag: search past the first 100 certificates
Action: opened

PR body:
"""
Dogtag requires a size limit to be specified when searching for
certificates. When no limit is specified in the dogtag plugin, a limit of
100 entries is assumed. As a result, an unlimited certificate search
returns data only for a maximum of 100 certificates.

Raise the "unlimited" limit to the maximum value Dogtag accepts.

https://fedorahosted.org/freeipa/ticket/6564
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/359/head:pr359
git checkout pr359
From 9281047feaf12ae484223a68f15af85b67406033 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Wed, 21 Dec 2016 09:55:40 +0100
Subject: [PATCH] dogtag: search past the first 100 certificates

Dogtag requires a size limit to be specified when searching for
certificates. When no limit is specified in the dogtag plugin, a limit of
100 entries is assumed. As a result, an unlimited certificate search
returns data only for a maximum of 100 certificates.

Raise the "unlimited" limit to the maximum value Dogtag accepts.

https://fedorahosted.org/freeipa/ticket/6564
---
 ipaserver/plugins/dogtag.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ipaserver/plugins/dogtag.py b/ipaserver/plugins/dogtag.py
index 73c14ed..f5f9ebe 100644
--- a/ipaserver/plugins/dogtag.py
+++ b/ipaserver/plugins/dogtag.py
@@ -1914,7 +1914,7 @@ def convert_time(value):
 
 url = 'http://%s/ca/rest/certs/search?size=%d' % (
 ipautil.format_netloc(self.ca_host, 8080),
-options.get('sizelimit', 100))
+options.get('sizelimit', 0x7fff))
 
 opener = urllib.request.build_opener()
 opener.addheaders = [('Accept-Encoding', 'gzip, deflate'),
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#298][comment] ipaldap: handle binary encoding option transparently

2016-12-20 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/298
Title: #298: ipaldap: handle binary encoding option transparently

jcholast commented:
"""
`ipaldap` is not the proper place to handle this - it implements a (almost) 
generic LDAP client, not a 389 DS client, and as such should not contain any 
389 DS specific hacks. The premise is that the server gets exactly what the 
user of `ipaldap` requested, and the user gets exactly what the server returned.

The binary transfer option is currently handled in code of the affected 
commands. The next layer below is `baseldap`, which is where the handling 
should be moved to make it generic for all commands.

Also note that the real bug in 389 DS is that it defines the attribute types to 
use octet string syntax, rather than the certificate syntax as defined in RFC 
4523. It actually behaves correctly, not enforcing the binary transfer option 
on attribute types with octet string syntax.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/298#issuecomment-268451076
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#355][comment] Set up DS TLS on replica in CA-less topology

2016-12-20 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/355
Title: #355: Set up DS TLS on replica in CA-less topology

jcholast commented:
"""
This is basically the same as 89de60c5d8ba64d619101a7498b8c4469b6e50ae which 
had to be reverted because it is not the proper fix.

I would rather wait for the proper fix (#41), which has not been merged yet 
because it is blocked by https://bugzilla.redhat.com/show_bug.cgi?id=1377413.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/355#issuecomment-268255672
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#356][opened] server install: fix KRA agent PEM file not being created

2016-12-20 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/356
Author: jcholast
 Title: #356: server install: fix KRA agent PEM file not being created
Action: opened

PR body:
"""
In commit 822e1bc82af3a6c1556546c4fbe96eeafad45762 the call to create the
KRA agent PEM file was accidentally removed from the server installer.

Call into the KRA installer from the server installer to create the file
again.

https://fedorahosted.org/freeipa/ticket/6392
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/356/head:pr356
git checkout pr356
From 032dd28fcc4e435c11db55255c22399e08a5a969 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Tue, 20 Dec 2016 14:51:40 +0100
Subject: [PATCH] server install: fix KRA agent PEM file not being created

In commit 822e1bc82af3a6c1556546c4fbe96eeafad45762 the call to create the
KRA agent PEM file was accidentally removed from the server installer.

Call into the KRA installer from the server installer to create the file
again.

https://fedorahosted.org/freeipa/ticket/6392
---
 ipaserver/install/ipa_kra_install.py | 1 +
 ipaserver/install/kra.py | 2 +-
 ipaserver/install/server/install.py  | 2 ++
 3 files changed, 4 insertions(+), 1 deletion(-)

diff --git a/ipaserver/install/ipa_kra_install.py b/ipaserver/install/ipa_kra_install.py
index a545f2b..340a993 100644
--- a/ipaserver/install/ipa_kra_install.py
+++ b/ipaserver/install/ipa_kra_install.py
@@ -181,6 +181,7 @@ def run(self):
 
 self.options.dm_password = self.options.password
 self.options.setup_ca = False
+self.options.setup_kra = True
 
 api.Backend.ldap2.connect()
 
diff --git a/ipaserver/install/kra.py b/ipaserver/install/kra.py
index e7e11dd..0d1ed8e 100644
--- a/ipaserver/install/kra.py
+++ b/ipaserver/install/kra.py
@@ -77,7 +77,7 @@ def install(api, replica_config, options):
 
 pkcs12_info = None
 master_host = None
-ra_only = False
+ra_only = not options.setup_kra
 promote = False
 else:
 krafile = os.path.join(replica_config.dir, 'kracert.p12')
diff --git a/ipaserver/install/server/install.py b/ipaserver/install/server/install.py
index b5b9cb4..fc319d9 100644
--- a/ipaserver/install/server/install.py
+++ b/ipaserver/install/server/install.py
@@ -609,6 +609,7 @@ def install_check(installer):
 
 if setup_ca:
 ca.install_check(False, None, options)
+kra.install_check(api, None, options)
 
 if options.setup_dns:
 dns.install_check(False, api, False, options, host_name)
@@ -809,6 +810,7 @@ def install(installer):
 
 if setup_ca:
 ca.install_step_1(False, None, options)
+kra.install(api, None, options)
 
 # The DS instance is created before the keytab, add the SSL cert we
 # generated
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#350][opened] spec file: revert to the previous Release tag

2016-12-19 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/350
Author: jcholast
 Title: #350: spec file: revert to the previous Release tag
Action: opened

PR body:
"""
Revert from the current Release tag value `upstream` to the previously used
`0%{?dist}`, because:

* `0` sorts before `1`, which is usually used as the initial release number
  in downstream packages,

* the information provided by `%{?dist}` is useful, as packages built on
  one OS are not always installable on another OS.

https://fedorahosted.org/freeipa/ticket/6418
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/350/head:pr350
git checkout pr350
From 0c8451d3e9b86b7e397b49a7dd25b9b3e5a0a222 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Mon, 5 Dec 2016 12:18:54 +0100
Subject: [PATCH] spec file: revert to the previous Release tag

Revert from the current Release tag value `upstream` to the previously used
`0%{?dist}`, because:

* `0` sorts before `1`, which is usually used as the initial release number
  in downstream packages,

* the information provided by `%{?dist}` is useful, as packages built on
  one OS are not always installable on another OS.

https://fedorahosted.org/freeipa/ticket/6418
---
 freeipa.spec.in | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/freeipa.spec.in b/freeipa.spec.in
index fbb3945..c58c057 100644
--- a/freeipa.spec.in
+++ b/freeipa.spec.in
@@ -41,7 +41,7 @@
 
 Name:   freeipa
 Version:%{IPA_VERSION}
-Release:upstream
+Release:0%{?dist}
 Summary:The Identity, Policy and Audit system
 
 Group:  System Environment/Base
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#349][opened] spec file: do not define with_lint inside a comment

2016-12-19 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/349
Author: jcholast
 Title: #349: spec file: do not define with_lint inside a comment
Action: opened

PR body:
"""
RPM expands macros even inside comments in spec files, so the with_lint
macro is unintentionally always defined.

Escape the percent sign in '%global' in the comment to prevent this.

https://fedorahosted.org/freeipa/ticket/6418
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/349/head:pr349
git checkout pr349
From 8c3b11e059e32c826694a39d8b886ca1230ea6a8 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Mon, 5 Dec 2016 12:17:54 +0100
Subject: [PATCH] spec file: do not define with_lint inside a comment

RPM expands macros even inside comments in spec files, so the with_lint
macro is unintentionally always defined.

Escape the percent sign in '%global' in the comment to prevent this.

https://fedorahosted.org/freeipa/ticket/6418
---
 freeipa.spec.in | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/freeipa.spec.in b/freeipa.spec.in
index fbb3945..831df4f 100644
--- a/freeipa.spec.in
+++ b/freeipa.spec.in
@@ -9,7 +9,7 @@
 %endif
 
 # lint is not executed during rpmbuild
-# %global with_lint 1
+# %%global with_lint 1
 
 %global alt_name ipa
 %if 0%{?rhel}
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#348][opened] ca: fix ca-find with --pkey-only

2016-12-19 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/348
Author: jcholast
 Title: #348: ca: fix ca-find with --pkey-only
Action: opened

PR body:
"""
Since commit 32b1743e5fb318b226a602ec8d9a4b6ef2a25c9d, ca-find will fail
with internal error if --pkey-only is specified, because the code to
look up the CA certificate and certificate chain assumes that the ipaCAId
attribute is always present in the result.

Fix this by not attempting to lookup the certificate / chain at all when
--pkey-only is specified.

https://fedorahosted.org/freeipa/ticket/6178
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/348/head:pr348
git checkout pr348
From dda67fc7ed2d45bf90ee795a7e20edd41931ceb1 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Fri, 16 Dec 2016 14:19:00 +0100
Subject: [PATCH] ca: fix ca-find with --pkey-only

Since commit 32b1743e5fb318b226a602ec8d9a4b6ef2a25c9d, ca-find will fail
with internal error if --pkey-only is specified, because the code to
look up the CA certificate and certificate chain assumes that the ipaCAId
attribute is always present in the result.

Fix this by not attempting to lookup the certificate / chain at all when
--pkey-only is specified.

https://fedorahosted.org/freeipa/ticket/6178
---
 ipaserver/plugins/ca.py | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/ipaserver/plugins/ca.py b/ipaserver/plugins/ca.py
index 2510a79..72f5443 100644
--- a/ipaserver/plugins/ca.py
+++ b/ipaserver/plugins/ca.py
@@ -192,8 +192,9 @@ class ca_find(LDAPSearch):
 def execute(self, *keys, **options):
 ca_enabled_check()
 result = super(ca_find, self).execute(*keys, **options)
-for entry in result['result']:
-set_certificate_attrs(entry, options, want_cert=False)
+if not options.get('pkey_only', False):
+for entry in result['result']:
+set_certificate_attrs(entry, options, want_cert=False)
 return result
 
 
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#336][comment] [py3] pki: add missing depedency pki-base[-python3]

2016-12-15 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/336
Title: #336: [py3] pki: add missing depedency pki-base[-python3]

jcholast commented:
"""
@mbasti-rh, please don't bump BuildRequires unless it is actually necessary for 
the build to not fail. Raising the version does not guarantee that the package 
version used during build and checked by pylint will be the same as the version 
used during run time anyway, so the change achieves nothing.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/336#issuecomment-267532993
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#336][comment] [py3] pki: add missing depedency pki-base[-python3]

2016-12-15 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/336
Title: #336: [py3] pki: add missing depedency pki-base[-python3]

jcholast commented:
"""
@mbasti-rh, please don't bump BuildRequires unless it is actually necessary for 
the build to not fail. Raising the version does not guarantee that the package 
version used during build will be the same as the version used during run time 
anyway, so the change achieves nothing.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/336#issuecomment-267532993
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#62][+pushed] Configure Anonymous PKINIT on server install

2016-12-12 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/62
Title: #62: Configure Anonymous PKINIT on server install

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#62][closed] Configure Anonymous PKINIT on server install

2016-12-12 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/62
Author: simo5
 Title: #62: Configure Anonymous PKINIT on server install
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/62/head:pr62
git checkout pr62
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#62][comment] Configure Anonymous PKINIT on server install

2016-12-12 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/62
Title: #62: Configure Anonymous PKINIT on server install

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/ca4e6c1fdfac9b545b26f885dc4865f22ca36ae6
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/62#issuecomment-266420855
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][closed] Add options to write lightweight CA cert or chain to file

2016-12-12 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/177
Author: frasertweedale
 Title: #177: Add options to write lightweight CA cert or chain to file
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/177/head:pr177
git checkout pr177
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][+pushed] Add options to write lightweight CA cert or chain to file

2016-12-12 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][comment] Add options to write lightweight CA cert or chain to file

2016-12-12 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/c7ea56c049ec8ab1a5500852eca6faf750b1479f
https://fedorahosted.org/freeipa/changeset/cc5b88e5d4ac1171374be9ae8e6e60730243dd3d
https://fedorahosted.org/freeipa/changeset/32b1743e5fb318b226a602ec8d9a4b6ef2a25c9d
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/177#issuecomment-266414213
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][+ack] Add options to write lightweight CA cert or chain to file

2016-12-12 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][comment] Add options to write lightweight CA cert or chain to file

2016-12-11 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

jcholast commented:
"""
@frasertweedale, I'm afraid we can't do that. As I said in the comment, you 
cannot unconditionally import from `ipaplatform` to `ipalib` anymore, so you 
either have to make the change to PyASN1, or make the import conditional:
```python
try:
from ipaplatform.paths import paths
except ImportError:
OPENSSL = '/usr/bin/openssl'
else:
OPENSSL = paths.OPENSSL
```
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/177#issuecomment-266359452
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][comment] Add options to write lightweight CA cert or chain to file

2016-12-11 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

jcholast commented:
"""
@frasertweedale, thanks. What about 
[this](https://github.com/freeipa/freeipa/pull/177/files#r91243228)?
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/177#issuecomment-266353770
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#321][closed] certdb: fix PKCS#12 import with empty password

2016-12-11 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/321
Author: jcholast
 Title: #321: certdb: fix PKCS#12 import with empty password
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/321/head:pr321
git checkout pr321
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#321][+pushed] certdb: fix PKCS#12 import with empty password

2016-12-11 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/321
Title: #321: certdb: fix PKCS#12 import with empty password

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#321][comment] certdb: fix PKCS#12 import with empty password

2016-12-11 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/321
Title: #321: certdb: fix PKCS#12 import with empty password

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/a35f5181c0af459e9f054838805628f31316cbe9
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/321#issuecomment-266352292
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#321][opened] certdb: fix PKCS#12 import with empty password

2016-12-08 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/321
Author: jcholast
 Title: #321: certdb: fix PKCS#12 import with empty password
Action: opened

PR body:
"""
Since commit f919ab4ee0ec26d77ee6978e75de5daba4073402, a temporary file is
used to give passwords to pk12util. When a password is empty, the temporary
will be empty as well, which pk12util does not like.

Add new line after the password in the temporary file to please pk12util.

https://fedorahosted.org/freeipa/ticket/6541
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/321/head:pr321
git checkout pr321
From 5fdd380fce3ad6527a5a980f723f6552f0a70a9d Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Thu, 8 Dec 2016 12:26:06 +0100
Subject: [PATCH] certdb: fix PKCS#12 import with empty password

Since commit f919ab4ee0ec26d77ee6978e75de5daba4073402, a temporary file is
used to give passwords to pk12util. When a password is empty, the temporary
will be empty as well, which pk12util does not like.

Add new line after the password in the temporary file to please pk12util.

https://fedorahosted.org/freeipa/ticket/6541
---
 ipapython/certdb.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ipapython/certdb.py b/ipapython/certdb.py
index af98a77..4e05b78 100644
--- a/ipapython/certdb.py
+++ b/ipapython/certdb.py
@@ -168,7 +168,7 @@ def import_pkcs12(self, pkcs12_filename, db_password_filename,
 "-k", db_password_filename, '-v']
 pkcs12_password_file = None
 if pkcs12_passwd is not None:
-pkcs12_password_file = ipautil.write_tmp_file(pkcs12_passwd)
+pkcs12_password_file = ipautil.write_tmp_file(pkcs12_passwd + '\n')
 args = args + ["-w", pkcs12_password_file.name]
 try:
 ipautil.run(args)
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#209][comment] Enumerate available options in IPA installer

2016-12-07 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/209
Title: #209: Enumerate available options in IPA installer

jcholast commented:
"""
@Akasurde, `Knob()` already handles metavar properly, you need to work on the 
interface between the installer and `optparse` - `ipapython.install.cli`.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/209#issuecomment-265447065
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#318][opened] server install: fix external CA install

2016-12-07 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/318
Author: jcholast
 Title: #318: server install: fix external CA install
Action: opened

PR body:
"""
Replace the dual definitions of domain_name, dm_password and admin_password
knobs in server install with single definitions using the original names
without the 'new_' prefix.

This fixes the options read from the installer option cache in step 2 of
external CA install to use the correct knob names.

https://fedorahosted.org/freeipa/ticket/6392
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/318/head:pr318
git checkout pr318
From ae5f464174f3ade82336a58a860b275a464095a6 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Wed, 30 Nov 2016 13:55:38 +0100
Subject: [PATCH] server install: fix external CA install

Replace the dual definitions of domain_name, dm_password and admin_password
knobs in server install with single definitions using the original names
without the 'new_' prefix.

This fixes the options read from the installer option cache in step 2 of
external CA install to use the correct knob names.

https://fedorahosted.org/freeipa/ticket/6392
---
 ipaclient/install/client.py |   3 +
 ipalib/install/service.py   |   4 --
 ipaserver/install/ca.py |   1 -
 ipaserver/install/ipa_server_install.py |  10 ++--
 ipaserver/install/server/__init__.py| 100 +++-
 ipaserver/install/server/install.py |   3 -
 6 files changed, 54 insertions(+), 67 deletions(-)

diff --git a/ipaclient/install/client.py b/ipaclient/install/client.py
index 0954c2b..0eec5bd 100644
--- a/ipaclient/install/client.py
+++ b/ipaclient/install/client.py
@@ -3571,6 +3571,9 @@ class ClientInstall(ClientInstallInterface,
 Client installer
 """
 
+replica_file = None
+dm_password = None
+
 ca_cert_files = knob(
 bases=ClientInstallInterface.ca_cert_files,
 )
diff --git a/ipalib/install/service.py b/ipalib/install/service.py
index 2544e5b..fc430fb 100644
--- a/ipalib/install/service.py
+++ b/ipalib/install/service.py
@@ -146,7 +146,6 @@ def domain_name(self, value):
 str, None,
 description="a file generated by ipa-replica-prepare",
 )
-replica_file = enroll_only(replica_file)
 replica_file = replica_install_only(replica_file)
 
 dm_password = knob(
@@ -154,8 +153,6 @@ def domain_name(self, value):
 sensitive=True,
 description="Directory Manager password (for the existing master)",
 )
-dm_password = enroll_only(dm_password)
-dm_password = replica_install_only(dm_password)
 
 
 class ServiceAdminInstallInterface(ServiceInstallInterface):
@@ -175,4 +172,3 @@ class ServiceAdminInstallInterface(ServiceInstallInterface):
 sensitive=True,
 )
 admin_password = enroll_only(admin_password)
-admin_password = replica_install_only(admin_password)
diff --git a/ipaserver/install/ca.py b/ipaserver/install/ca.py
index efc8c87..4f64d99 100644
--- a/ipaserver/install/ca.py
+++ b/ipaserver/install/ca.py
@@ -338,7 +338,6 @@ class CAInstallInterface(dogtag.DogtagInstallInterface,
 ['-w']),
 )
 admin_password = enroll_only(admin_password)
-admin_password = replica_install_only(admin_password)
 
 external_ca = knob(
 None,
diff --git a/ipaserver/install/ipa_server_install.py b/ipaserver/install/ipa_server_install.py
index 3b6cb81..e708040 100644
--- a/ipaserver/install/ipa_server_install.py
+++ b/ipaserver/install/ipa_server_install.py
@@ -15,16 +15,16 @@ class CompatServerMasterInstall(ServerMasterInstall):
 no_sudo = False
 request_cert = False
 
-new_dm_password = knob(
+dm_password = knob(
 # pylint: disable=no-member
-bases=ServerMasterInstall.new_dm_password,
+bases=ServerMasterInstall.dm_password,
 cli_names=['--ds-password', '-p'],
 )
 
-new_admin_password = knob(
+admin_password = knob(
 # pylint: disable=no-member
-bases=ServerMasterInstall.new_admin_password,
-cli_names=(list(ServerMasterInstall.new_admin_password.cli_names) +
+bases=ServerMasterInstall.admin_password,
+cli_names=(list(ServerMasterInstall.admin_password.cli_names) +
['-a']),
 )
 
diff --git a/ipaserver/install/server/__init__.py b/ipaserver/install/server/__init__.py
index c518ec9..0237702 100644
--- a/ipaserver/install/server/__init__.py
+++ b/ipaserver/install/server/__init__.py
@@ -21,7 +21,6 @@
 prepares,
 prepare_only,
 replica_install_only)
-from ipalib.util import validate_domain_name
 from ipapython import ipautil
 from ipapython.dnsutil import check_zone_overlap
 from ipapython.

[Freeipa-devel] [freeipa PR#209][comment] Enumerate available options in IPA installer

2016-12-07 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/209
Title: #209: Enumerate available options in IPA installer

jcholast commented:
"""
@mbasti-rh, I don't care as long as it's done right (i.e. without hardcoding 
`cli_metavar` in knob definitions).
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/209#issuecomment-265432383
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][comment] Add options to write lightweight CA cert or chain to file

2016-12-07 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

jcholast commented:
"""
@frasertweedale, yep, I'm aware of that - `cert-find` does the same. Not a big 
deal IMO since it has to be explicitly requested by the user. But tickets are 
certainly a good idea.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/177#issuecomment-265420461
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][comment] Add options to write lightweight CA cert or chain to file

2016-12-07 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

jcholast commented:
"""
Could you make `ca-find` return the cert/chain as well if (and only if) `--all` 
is specified? Do not add the `--chain` and `--certificate-out` options to it 
though. This is for consistency with `cert-find`, `host-find`, `service-find`, 
etc. Not a blocker.

Also see inline comments.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/177#issuecomment-265386388
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][comment] Add options to write lightweight CA cert or chain to file

2016-12-07 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

jcholast commented:
"""
But could you make `ca-find` return the cert/chain as well if (and only if) 
`--all` is specified? Do not add the `--chain` and `--certificate-out` options 
to it though. This is for consistency with `cert-find`, `host-find`, 
`service-find`, etc. Not a blocker.

Also see inline comments.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/177#issuecomment-265386388
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#305][closed] Fetch correct exception in IPA_CONFDIR test

2016-12-05 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/305
Author: tiran
 Title: #305: Fetch correct exception in IPA_CONFDIR test
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/305/head:pr305
git checkout pr305
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#305][+pushed] Fetch correct exception in IPA_CONFDIR test

2016-12-05 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/305
Title: #305: Fetch correct exception in IPA_CONFDIR test

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#305][comment] Fetch correct exception in IPA_CONFDIR test

2016-12-05 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/305
Title: #305: Fetch correct exception in IPA_CONFDIR test

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/34bd2b6332f3dabc0eb36f7021238df286a6
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/305#issuecomment-264823975
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#305][+ack] Fetch correct exception in IPA_CONFDIR test

2016-12-05 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/305
Title: #305: Fetch correct exception in IPA_CONFDIR test

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
Pushed with #302.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-264460352
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][+ack] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][closed] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/182
Author: tiran
 Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/182/head:pr182
git checkout pr182
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][+pushed] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#302][closed] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/302
Author: pvoborni
 Title: #302: Use env var IPA_CONFDIR to get confdir for 'cli' context 
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/302/head:pr302
git checkout pr302
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#302][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/302
Title: #302: Use env var IPA_CONFDIR to get confdir for 'cli' context 

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/d4916254e995be1118ab8dbce5b60091305f97fe
https://fedorahosted.org/freeipa/changeset/c2934aaa7eacb8390209a38029145b1c240d864c
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/302#issuecomment-264460061
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#302][+pushed] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/302
Title: #302: Use env var IPA_CONFDIR to get confdir for 'cli' context 

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#302][+ack] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/302
Title: #302: Use env var IPA_CONFDIR to get confdir for 'cli' context 

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
@pvoborni, yes, although it should not inherit from 'InvocationError`, since it 
does not happen during command invocation, but way before, during API 
initialization. I would inherit it directly from `PublicError` and put it into 
the 900-1000 errno range.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-264447620
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
@pvoborni, yes, although it should not inherit from `InvocationError`, since it 
does not happen during command invocation, but way before, during API 
initialization. I would inherit it directly from `PublicError` and put it into 
the 900-1000 errno range.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-264447620
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#301][opened] scripts, tests: explicitly set confdir in the rest of server code

2016-12-02 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/301
Author: jcholast
 Title: #301: scripts, tests: explicitly set confdir in the rest of server code
Action: opened

PR body:
"""
Commit 1e6a204b4372bbbfb722a00370a5ce4e34406b9f added explicit confdir
setting to api.bootstrap() calls of a randomly selected portion of
server-side scripts and tests. This commit adds it to the rest of
server-side code for consistency.

https://fedorahosted.org/freeipa/ticket/6389
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/301/head:pr301
git checkout pr301
From 23f6d46675b9614cc654bd17c1cc3377d2539211 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Fri, 2 Dec 2016 09:10:41 +0100
Subject: [PATCH] scripts, tests: explicitly set confdir in the rest of server
 code

Commit 1e6a204b4372bbbfb722a00370a5ce4e34406b9f added explicit confdir
setting to api.bootstrap() calls of a randomly selected portion of
server-side scripts and tests. This commit adds it to the rest of
server-side code for consistency.

https://fedorahosted.org/freeipa/ticket/6389
---
 doc/guide/wsgi.py.txt   | 6 --
 install/tools/ipa-compat-manage | 5 -
 install/tools/ipa-csreplica-manage  | 6 +-
 install/tools/ipa-managed-entries   | 3 ++-
 ipaserver/advise/base.py| 9 +++--
 ipaserver/dnssec/ldapkeydb.py   | 4 +++-
 ipaserver/install/ipa_cacert_manage.py  | 2 +-
 ipaserver/install/ipa_kra_install.py| 2 +-
 ipaserver/install/ipa_otptoken_import.py| 3 ++-
 ipaserver/install/ipa_replica_prepare.py| 2 +-
 ipaserver/install/ipa_server_certinstall.py | 2 +-
 ipatests/test_ipaserver/test_ldap.py| 3 ++-
 ipatests/test_ipaserver/test_serverroles.py | 5 -
 13 files changed, 37 insertions(+), 15 deletions(-)

diff --git a/doc/guide/wsgi.py.txt b/doc/guide/wsgi.py.txt
index 8566a25..1b72516 100644
--- a/doc/guide/wsgi.py.txt
+++ b/doc/guide/wsgi.py.txt
@@ -1,3 +1,4 @@
+from ipaplatform.paths import paths
 from ipalib import api
 from ipalib.config import Env
 from ipalib.constants import DEFAULT_CONFIG
@@ -6,11 +7,12 @@ from ipalib.constants import DEFAULT_CONFIG
 # by reading in the configuration file(s). The server always reads
 # default.conf and will also read in `context'.conf.
 env = Env()
-env._bootstrap(context='server', log=None)
+env._bootstrap(context='server', log=None, confdir=paths.ETC_IPA)
 env._finalize_core(**dict(DEFAULT_CONFIG))
 
 # Initialize the API with the proper debug level
-api.bootstrap(context='server', debug=env.debug, log=None) (ref:wsgi-app-bootstrap)
+api.bootstrap(context='server', confdir=paths.ETC_IPA,
+  debug=env.debug, log=None) (ref:wsgi-app-bootstrap)
 try:
 api.finalize() (ref:wsgi-app-finalize)
 except Exception as e:
diff --git a/install/tools/ipa-compat-manage b/install/tools/ipa-compat-manage
index 77468b4..a29a92f 100755
--- a/install/tools/ipa-compat-manage
+++ b/install/tools/ipa-compat-manage
@@ -100,7 +100,10 @@ def main():
 if dirman_password is None:
 sys.exit("Directory Manager password required")
 
-api.bootstrap(context='cli', in_server=True, debug=options.debug)
+api.bootstrap(context='cli',
+  in_server=True,
+  debug=options.debug,
+  confdir=paths.ETC_IPA)
 api.finalize()
 api.Backend.ldap2.connect()
 
diff --git a/install/tools/ipa-csreplica-manage b/install/tools/ipa-csreplica-manage
index f494380..990ec38 100755
--- a/install/tools/ipa-csreplica-manage
+++ b/install/tools/ipa-csreplica-manage
@@ -413,7 +413,11 @@ def main():
 api_env['log'] = None # turn off logging for non-root
 
 api.bootstrap(
-context='cli', in_server=True, verbose=options.verbose, **api_env
+context='cli',
+in_server=True,
+verbose=options.verbose,
+confdir=paths.ETC_IPA,
+**api_env
 )
 api.finalize()
 
diff --git a/install/tools/ipa-managed-entries b/install/tools/ipa-managed-entries
index 59f14fc..efcf3ec 100755
--- a/install/tools/ipa-managed-entries
+++ b/install/tools/ipa-managed-entries
@@ -24,6 +24,7 @@ import re
 import sys
 from optparse import OptionParser  # pylint: disable=deprecated-module
 
+from ipaplatform.paths import paths
 from ipapython import config
 from ipaserver.install import installutils
 from ipalib import api, errors
@@ -72,7 +73,7 @@ def main():
 sys.exit("Unrecognized action [" + args[0] + "]")
 standard_logging_setup(None, debug=options.debug)
 
-api.bootstrap(context='cli', debug=options.debug)
+api.bootstrap(context='cli', debug=options.debug, confdir=paths.ETC_IPA)
 api.finalize()
 api.Backend.ldap2.connect(bind_pw=options.dirman_password

[Freeipa-devel] [freeipa PR#280][closed] Set explicit confdir option for global contexts

2016-12-02 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/280
Author: tiran
 Title: #280: Set explicit confdir option for global contexts
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/280/head:pr280
git checkout pr280
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#280][+pushed] Set explicit confdir option for global contexts

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/280
Title: #280: Set explicit confdir option for global contexts

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#280][comment] Set explicit confdir option for global contexts

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/280
Title: #280: Set explicit confdir option for global contexts

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/1e6a204b4372bbbfb722a00370a5ce4e34406b9f
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/280#issuecomment-264397268
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#280][+ack] Set explicit confdir option for global contexts

2016-12-02 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/280
Title: #280: Set explicit confdir option for global contexts

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#291][+pushed] replica install: track the RA agent certificate again

2016-11-30 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/291
Title: #291: replica install: track the RA agent certificate again

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#291][comment] replica install: track the RA agent certificate again

2016-11-30 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/291
Title: #291: replica install: track the RA agent certificate again

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/4221266562778806f02748fee2dfbd814261f2b4
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/291#issuecomment-263867421
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#291][closed] replica install: track the RA agent certificate again

2016-11-30 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/291
Author: jcholast
 Title: #291: replica install: track the RA agent certificate again
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/291/head:pr291
git checkout pr291
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#291][opened] replica install: track the RA agent certificate again

2016-11-30 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/291
Author: jcholast
 Title: #291: replica install: track the RA agent certificate again
Action: opened

PR body:
"""
During the rebase of commit 822e1bc82af3a6c1556546c4fbe96eeafad45762 on top
of commit 808b1436b4158cb6f926ac2b5bd0979df6ea7e9f, the call to track the
RA agent certificate with certmonger was accidentally removed from
ipa-replica-install.

Put the call back so that the certificate is tracked after replica install.

https://fedorahosted.org/freeipa/ticket/6392
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/291/head:pr291
git checkout pr291
From 0de63c3588c09bde309a409ba57fd7778663850a Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Wed, 30 Nov 2016 12:25:24 +0100
Subject: [PATCH] replica install: track the RA agent certificate again

During the rebase of commit 822e1bc82af3a6c1556546c4fbe96eeafad45762 on top
of commit 808b1436b4158cb6f926ac2b5bd0979df6ea7e9f, the call to track the
RA agent certificate with certmonger was accidentally removed from
ipa-replica-install.

Put the call back so that the certificate is tracked after replica install.

https://fedorahosted.org/freeipa/ticket/6392
---
 ipaserver/install/cainstance.py | 6 +-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/ipaserver/install/cainstance.py b/ipaserver/install/cainstance.py
index 1aa6b8d..6b2b272 100644
--- a/ipaserver/install/cainstance.py
+++ b/ipaserver/install/cainstance.py
@@ -647,7 +647,7 @@ def enable_pkix(self):
'NSS_ENABLE_PKIX_VERIFY', '1',
quotes=False, separator='=')
 
-def import_ra_cert(self, rafile, configure_renewal=True):
+def import_ra_cert(self, rafile):
 """
 Cloned RAs will use the same RA agent cert as the master so we
 need to import from a PKCS#12 file.
@@ -663,11 +663,15 @@ def import_ra_cert(self, rafile, configure_renewal=True):
 finally:
 os.remove(agent_name)
 
+self.configure_agent_renewal()
+
 def __import_ra_key(self):
 custodia = custodiainstance.CustodiaInstance(host_name=self.fqdn,
  realm=self.realm)
 custodia.import_ra_key(self.master_host)
 
+self.configure_agent_renewal()
+
 def __create_ca_agent(self):
 """
 Create CA agent, assign a certificate, and add the user to
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#228][comment] cert-request: allow directoryName in SAN extension

2016-11-29 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/228
Title: #228: cert-request: allow directoryName in SAN extension

jcholast commented:
"""
Ok,

> Why do you see a relationship between the subject DN of a X.509 and the 
> directoryName general name in SAN X.509v3 extension?

According to RFC 5280 section 4.1.2.6 the subject DN and SANs are equivallent 
in terms of identifying the subject entity:
> The subject field identifies the entity associated with the public
> key stored in the subject public key field.  The subject name MAY be
> carried in the subject field and/or the subjectAltName extension.

Compare how the subject DN is defined in RFC 5280 section 4.1.2.6:
> Where it is non-empty, the subject field MUST contain an X.500
> distinguished name (DN).  The DN MUST be unique for each subject
> entity certified by the one CA as defined by the issuer field.  A CA
> MAY issue more than one certificate with the same DN to the same
> subject entity.

... with how the DN SAN is defined in RFC 5280 section 4.2.1.6:
> When the subjectAltName extension contains a DN in the directoryName,
> the encoding rules are the same as those specified for the issuer
> field in Section 4.1.2.4.  The DN MUST be unique for each subject
> entity certified by the one CA as defined by the issuer field.  A CA
> MAY issue more than one certificate with the same DN to the same
> subject entity.

See that there is no mention of any semantical difference between them as means 
of identifying the subject entity.

Further specifications such as the name constraints extension also treat them 
equally. RFC 5280 section 4.2.1.10:
> Restrictions of the form directoryName MUST be applied to the subject
> field in the certificate (when the certificate includes a non-empty
> subject field) and to any names of type directoryName in the
> subjectAltName extension.

> The subject follows different rules, e.g. a disjunct set of RDN attributes.

I could not find any mention of this in RFC 5280 nor the X.500 series of 
standards. I'm assuming it's because it's not there.

> Attributes like DC, UID etc. are not commonly found in a X.509 cert's subject.

Neither RFC 5280 nor the X.500 series of standards impose any restrictions on 
the attributes used. However, RFC 5280 section 4.1.2.4 says:
> In addition, **implementations of this specification MUST be prepared**
> **to receive the domainComponent attribute**, as defined in [RFC4519].

> With multiple SubCAs (e.g. for VPN, client cert auth, host certs) we end up 
> with different subject DNs but with the same directoryName GN SAN entry.

Currently we in fact end up with the same subject DN. Which is just fine, as 
they refer to the same subject entity.

> The directoryName is designed to hold a LDAP DN.

I don't think that's true, as there is no mention of this in the directoryName 
SAN specification (see above).

> A certificate's Subject DN is not really a distinguishing name in the sense 
> of a unique identifier.

Let me quote RFC 5280 section 4.1.2.6 again:
> Where it is non-empty, the subject field MUST contain an X.500
> distinguished name (DN).  **The DN MUST be unique for each subject**
> **entity certified by the one CA as defined by the issuer field**.  A CA
> MAY issue more than one certificate with the same DN to the same
> subject entity.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/228#issuecomment-263574255
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#280][comment] Set explicit confdir option for global contexts

2016-11-29 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/280
Title: #280: Set explicit confdir option for global contexts

jcholast commented:
"""
Please explain, all of the affected scripts are server-only and thus not 
related to the integration effort and most probably won't work correctly with 
non-server configuration anyway.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/280#issuecomment-263540749
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#228][comment] cert-request: allow directoryName in SAN extension

2016-11-29 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/228
Title: #228: cert-request: allow directoryName in SAN extension

jcholast commented:
"""
@tiran, could you please stay on topic? I haven't said anything about it being 
mandatory, and it's not the point anyway (consistency between subject DN and DN 
SAN validation is). About CA being allowed to issue multiple certs with the 
same subject DN, thanks for stating the obvious, but again, not the point here.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/228#issuecomment-263539133
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#228][comment] cert-request: allow directoryName in SAN extension

2016-11-29 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/228
Title: #228: cert-request: allow directoryName in SAN extension

jcholast commented:
"""
@frasertweedale, if the subject DN need not match the LDAP DN, then DN SANs 
need not match it as well - both the subject DN and DN SANs are supposed to 
identify the subject in the directory, and for us the directory is LDAP. There 
should be no special casing one way or the other, if something is allowed for 
the subject DN it must be allowed for DN SANs and vice-versa (with the 
exception of the special handling of the most specific CN in subject DN of 
server certificates). The fact that we currently require a non-LDAP subject DN 
in `cert-request` is a different issue. All I'm asking for is consistency. If 
we first allowed the subject DN to match the LDAP DN I would be perfectly happy 
with this PR.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/228#issuecomment-263521018
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#280][comment] Set explicit confdir option for global contexts

2016-11-29 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/280
Title: #280: Set explicit confdir option for global contexts

jcholast commented:
"""
You missed a few:
```
daemons/dnssec/ipa-dnskeysync-replica:124:ipalib.api.bootstrap(in_server=True, 
log=None)  # no logging to file
daemons/dnssec/ipa-dnskeysyncd:23:api.bootstrap(in_server=True, log=None)  # no 
logging to file
daemons/dnssec/ipa-ods-exporter:618:ipalib.api.bootstrap(in_server=True, 
log=None)  # no logging to file
doc/guide/wsgi.py.txt:9:env._bootstrap(context='server', log=None)
doc/guide/wsgi.py.txt:13:api.bootstrap(context='server', debug=env.debug, 
log=None) (ref:wsgi-app-bootstrap)
install/restart_scripts/renew_ra_cert:39:api.bootstrap(in_server=True, 
context='restart')
install/tools/ipa-adtrust-install:269:api.bootstrap(**cfg)
install/tools/ipa-ca-install:262:api.bootstrap(in_server=True, 
ra_plugin='dogtag')
install/tools/ipa-compat-manage:105:api.bootstrap(context='cli', 
in_server=True, debug=options.debug)
install/tools/ipa-csreplica-manage:418:api.bootstrap(**api_env)
install/tools/ipa-dns-install:139:api.bootstrap(**cfg)
install/tools/ipa-managed-entries:75:api.bootstrap(context='cli', 
debug=options.debug)
install/tools/ipa-nis-manage:118:api.bootstrap(context='cli', 
debug=options.debug, in_server=True)
install/tools/ipa-replica-manage:1512:api.bootstrap(**api_env)
ipapython/dnssec/ldapkeydb.py:417:ipalib.api.bootstrap(in_server=True, 
log=None)  # no logging to file
ipaserver/advise/base.py:238:api.bootstrap(in_server=False, 
context='cli')
ipaserver/advise/base.py:240:advise_api.bootstrap(in_server=False, 
context='cli')
ipaserver/install/ipa_cacert_manage.py:99:api.bootstrap(in_server=True)
ipaserver/install/ipa_kra_install.py:80:api.bootstrap(in_server=True)
ipaserver/install/ipa_otptoken_import.py:512:
api.bootstrap(in_server=True)
ipaserver/install/ipa_replica_prepare.py:183:
api.bootstrap(in_server=True)
ipaserver/install/ipa_server_certinstall.py:102:
api.bootstrap(in_server=True)
ipatests/test_ipaserver/test_ldap.py:114:myapi.bootstrap(context='cli', 
in_server=True)
ipatests/test_ipaserver/test_serverroles.py:472:
test_api.bootstrap(in_server=True, ldap_uri=api.env.ldap_uri)
lite-server.py:130:(options, args) = 
api.bootstrap_with_global_options(parser, context='lite')
```
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/280#issuecomment-263513330
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#266][edited] ipapython: simplify Env object initialization

2016-11-29 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/266
Author: jcholast
 Title: #266: ipapython: simplify Env object initialization
Action: edited

 Changed field: body
Original value:
"""
Fully initialize Env objects in Env() instead of having to call their
private methods to complete the initialization later.

Do not use custom Env instance to determine the debug level to use for the
IPA API object - the IPA API object can properly determining the
configured debug level on its own.

Remove locking and related code from Env as it is never used.
"""

-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#266][comment] ipapython: simplify Env object initialization

2016-11-29 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/266
Title: #266: ipapython: simplify Env object initialization

jcholast commented:
"""
Yes, my above comment is wrong (sorry).
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/266#issuecomment-263505232
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#271][comment] Remove hard dependency on ipaplatform from ipapython, ipalib and ipaclient

2016-11-25 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/271
Title: #271: Remove hard dependency on ipaplatform from ipapython, ipalib and 
ipaclient

jcholast commented:
"""
@stlaz, [this thread at 
freeipa-devel](https://www.redhat.com/archives/freeipa-devel/2016-November/msg00776.html)
 should answer your question.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/271#issuecomment-262918453
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#177][comment] Add options to write lightweight CA cert or chain to file

2016-11-25 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/177
Title: #177: Add options to write lightweight CA cert or chain to file

jcholast commented:
"""
To continue the discussion from the mailing list:

>> My point exactly - ca-show output should be equivalent to cert-show on the
>> CA certificate, as far as the certificate and chain are concerned.
>> 
> I reused `BaseCertObject.takes_params' and `BaseCertObject._parse'
> to define the params and do most of the work.  There is some overlap
> with what `BaseCertObject' defines and fields of the `ca' LDAP
> attribute so these are ignored/removed.

What I actually meant is that `cert-show` should also have a `chain` option and 
`certificate_chain` param in the future, which should work the same as in 
`ca-show`. Adding everything from BaseCertObject is an overkill IMHO, and out 
of the scope of ticket 6178.

>> I think I would prefer if the certificate was always returned by the server,
>> but the chain only if --chain (or --all) is specified.
>> 
>> Additionally, ca-add should also get the new options and do all of this.
>> 
> I've implemented this.  `--chain' implies `--all' but otherwise
> remains a client-side only param.

This does not scale well - if a new unrelated attribute is added to the CA LDAP 
entry, or if a new param is added to the CA object, `--chain` will imply 
retrieving them, which is not something we want. It should really be the other 
way around and `--all` should imply `--chain`, which also means `--chain` has 
to be defined on the server side.

>> Generator expressions are generally preferred over map():
>> 
>> data = '\n'.join(to_pem(der) for der in ders)
>> 
> Preferred by whom? ;)

Pythonistas, I believe :)
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/177#issuecomment-262916556
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#271][comment] Remove hard dependency on ipaplatform from ipapython, ipalib and ipaclient

2016-11-24 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/271
Title: #271: Remove hard dependency on ipaplatform from ipapython, ipalib and 
ipaclient

jcholast commented:
"""
@tiran, how much granular PRs would you prefer? As @stlaz pointed out, there 
isn't actually much going on in this PR besides moving stuff around.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/271#issuecomment-262798189
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#258][comment] Break ipaplatform / ipalib import cycle of hell

2016-11-24 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/258
Title: #258: Break ipaplatform / ipalib import cycle of hell

jcholast commented:
"""
I'm OK with it.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/258#issuecomment-262797665
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#266][edited] ipapython: simplify Env object initialization

2016-11-23 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/266
Author: jcholast
 Title: #266: ipapython: simplify Env object initialization
Action: edited

 Changed field: body
Original value:
"""
Fully initialize Env objects in Env() instead of having to call their
private methods to complete the initialization later.

Do not use custom Env instance to determine the debug level to use for the
IPA API object - the IPA API object can properly determining the
configured debug level on its own.

Remove locking and related code from Env as it is never used.

https://fedorahosted.org/freeipa/ticket/6408
"""

-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#266][comment] ipapython: simplify Env object initialization

2016-11-23 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/266
Title: #266: ipapython: simplify Env object initialization

jcholast commented:
"""
Only now I have noticed that this won't actually help fixing [ticket 
6482](https://fedorahosted.org/freeipa/ticket/6482).

Nevermind this PR then.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/266#issuecomment-262507414
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#266][opened] ipapython: simplify Env object initialization

2016-11-23 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/266
Author: jcholast
 Title: #266: ipapython: simplify Env object initialization
Action: opened

PR body:
"""
Fully initialize Env objects in Env() instead of having to call their
private methods to complete the initialization later.

Do not use custom Env instance to determine the debug level to use for the
IPA API object - the IPA API object can properly determining the
configured debug level on its own.

Remove locking and related code from Env as it is never used.

https://fedorahosted.org/freeipa/ticket/6408
"""

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/266/head:pr266
git checkout pr266
From 1f3bfa0bd13af4e8cba51b8149c397ceeccdcf14 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Tue, 22 Nov 2016 12:42:40 +0100
Subject: [PATCH 1/3] wsgi, oddjob: remove needless uses of Env

Do not use custom Env instance to determine the debug level to use for the
IPA API object - the IPA API object can properly determining the
configured debug level on its own.

https://fedorahosted.org/freeipa/ticket/6408
---
 doc/guide/wsgi.py.txt | 12 +---
 install/oddjob/com.redhat.idm.trust-fetch-domains |  9 +
 install/share/wsgi.py | 12 +---
 3 files changed, 3 insertions(+), 30 deletions(-)

diff --git a/doc/guide/wsgi.py.txt b/doc/guide/wsgi.py.txt
index 8566a25..71d7a2b 100644
--- a/doc/guide/wsgi.py.txt
+++ b/doc/guide/wsgi.py.txt
@@ -1,16 +1,6 @@
 from ipalib import api
-from ipalib.config import Env
-from ipalib.constants import DEFAULT_CONFIG
 
-# Determine what debug level is configured. We can only do this
-# by reading in the configuration file(s). The server always reads
-# default.conf and will also read in `context'.conf.
-env = Env()
-env._bootstrap(context='server', log=None)
-env._finalize_core(**dict(DEFAULT_CONFIG))
-
-# Initialize the API with the proper debug level
-api.bootstrap(context='server', debug=env.debug, log=None) (ref:wsgi-app-bootstrap)
+api.bootstrap(context='server', log=None) (ref:wsgi-app-bootstrap)
 try:
 api.finalize() (ref:wsgi-app-finalize)
 except Exception as e:
diff --git a/install/oddjob/com.redhat.idm.trust-fetch-domains b/install/oddjob/com.redhat.idm.trust-fetch-domains
index b663daa..e053474 100755
--- a/install/oddjob/com.redhat.idm.trust-fetch-domains
+++ b/install/oddjob/com.redhat.idm.trust-fetch-domains
@@ -5,8 +5,6 @@ from ipaserver.install.installutils import is_ipa_configured, ScriptError
 from ipapython import config, ipautil
 from ipalib import api
 from ipapython.dn import DN
-from ipalib.config import Env
-from ipalib.constants import DEFAULT_CONFIG
 from ipapython.ipautil import kinit_keytab
 from ipaplatform.constants import constants
 import sys
@@ -89,12 +87,7 @@ if len(args) != 1:
 
 trusted_domain = ipautil.fsdecode(args[0]).lower()
 
-env = Env()
-env._bootstrap(debug=options.debug, log=None)
-env._finalize_core(**dict(DEFAULT_CONFIG))
-
-# Initialize the API with the proper debug level
-api.bootstrap(in_server=True, debug=env.debug, log=None, context='server')
+api.bootstrap(in_server=True, debug=options.debug, log=None, context='server')
 api.finalize()
 
 # Only import trust plugin after api is initialized or internal imports
diff --git a/install/share/wsgi.py b/install/share/wsgi.py
index ee9311e..88316f6 100644
--- a/install/share/wsgi.py
+++ b/install/share/wsgi.py
@@ -24,18 +24,8 @@
 WSGI appliction for IPA server.
 """
 from ipalib import api
-from ipalib.config import Env
-from ipalib.constants import DEFAULT_CONFIG
 
-# Determine what debug level is configured. We can only do this
-# by reading in the configuration file(s). The server always reads
-# default.conf and will also read in `context'.conf.
-env = Env()
-env._bootstrap(context='server', log=None)
-env._finalize_core(**dict(DEFAULT_CONFIG))
-
-# Initialize the API with the proper debug level
-api.bootstrap(context='server', debug=env.debug, log=None)
+api.bootstrap(context='server', log=None)
 try:
 api.finalize()
 except Exception as e:

From 5c9290bcc6dda2dc8582f45e9cf6baaafa663309 Mon Sep 17 00:00:00 2001
From: Jan Cholasta 
Date: Tue, 22 Nov 2016 12:46:17 +0100
Subject: [PATCH 2/3] ipapython: simplify Env object initialization

Fully initialize Env objects in Env() instead of having to call their
private methods to complete the initialization later.

https://fedorahosted.org/freeipa/ticket/6408
---
 install/tools/ipa-pki-retrieve-key |  1 -
 ipaclient/install/client.py|  5 +
 ipalib/config.py   |  6 ++---
 ipalib/plugable.py |  5 +
 ipaserver/install/server/replicainstall.py |  4 +---
 ipatests/test_ipalib/test_config.py| 35 ++
 6

[Freeipa-devel] [freeipa PR#235][comment] Remove unused Knob function

2016-11-22 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/235
Title: #235: Remove unused Knob function

jcholast commented:
"""
There was no reason, I just forgot, so go ahead.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/235#issuecomment-262290033
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#244][comment] Add templating to ipaplatform path [RFC]

2016-11-21 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/244
Title: #244: Add templating to ipaplatform path [RFC]

jcholast commented:
"""
Also LGTM.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/244#issuecomment-262162424
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#258][comment] Break ipaplatform / ipalib import cycle of hell

2016-11-21 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/258
Title: #258: Break ipaplatform / ipalib import cycle of hell

jcholast commented:
"""
The original code is broken by design IMO. The API object is used only to get 
the configured service startup timeout and to guess our DS instance name. None 
of this is platform specific, so I would prefer if we removed this from 
`ipaplatform` altogether instead of "just" fixing the import issue.

Anyway, given that the current plan is to make `ipaclient` _not_ depend on 
`ipaplatform`, is this change still necessary?
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/258#issuecomment-262161616
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#247][comment] Add 'ipa local-env' subcommand

2016-11-21 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/247
Title: #247: Add 'ipa local-env' subcommand

jcholast commented:
"""
Reopened 6490.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/247#issuecomment-261881844
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#247][comment] Add 'ipa local-env' subcommand

2016-11-21 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/247
Title: #247: Add 'ipa local-env' subcommand

jcholast commented:
"""
Sorry, but this is wrong. `ipa env` is supposed to return local settings unless 
run with `--server`. Why was it not fixed instead of adding a new redundant 
command?
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/247#issuecomment-261878779
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#113][comment] ipalib.constants: Remove default domain, realm, basedn, xmlrpc_uri, ldap_uri

2016-11-21 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/113
Title: #113: ipalib.constants: Remove default domain, realm, basedn, 
xmlrpc_uri, ldap_uri

jcholast commented:
"""
Actually it should be created from domain name, which is the primary identifier 
of an IPA domain, not from realm name.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/113#issuecomment-261875920
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#209][comment] Enumerate available options in IPA installer

2016-11-21 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/209
Title: #209: Enumerate available options in IPA installer

jcholast commented:
"""
@mbasti-rh: `knob()` already handles choices, it's the built-in `optparse` 
module which does not display them. Once the installer code is migrated to 
`argparse`, this problem will go away.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/209#issuecomment-261873288
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#232][comment] Installer refactoring

2016-11-11 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/232
Title: #232: Installer refactoring

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/eac6f52957c361c219ad6048b515ddb62da31154
https://fedorahosted.org/freeipa/changeset/83e72d704630b9cc5a1f713dfee30601950eb5e9
https://fedorahosted.org/freeipa/changeset/7279ef1d0f28dae9f3203362ca9e2245e56e111f
https://fedorahosted.org/freeipa/changeset/2fdc2d0cb7fa98992fe6c2070cb5dc34c500ac09
https://fedorahosted.org/freeipa/changeset/b1283c1e56976a3019c81c3be88fa821431ac6a6
https://fedorahosted.org/freeipa/changeset/8a7e79a7a6fad8dc87c8f148cb5098434f988ea3
https://fedorahosted.org/freeipa/changeset/0e232b5f526168af6bb0b52244f79dfacb43a9b7
https://fedorahosted.org/freeipa/changeset/dc38d53de1eff71570ec5ef55db6de2c6f9b5bbd
https://fedorahosted.org/freeipa/changeset/0933e080aa9635bba12efc53d904d524b309027f
https://fedorahosted.org/freeipa/changeset/f98faec47847022879b8bceb63839fcfd6e45402
https://fedorahosted.org/freeipa/changeset/5c16608a0d5d4abe98319a077917f5424b72d031
https://fedorahosted.org/freeipa/changeset/49f201e2b2523c83fa2b20fe91c91733e2ee947f
https://fedorahosted.org/freeipa/changeset/cc6efb97985bb93e3cdb2a6c2943d45e1132e122
https://fedorahosted.org/freeipa/changeset/c30b45ab157f611312c0cd0f4f7c3a12d7a02c11
https://fedorahosted.org/freeipa/changeset/1c9267803c6f41cc7d7485024f8864fbd62c9128
https://fedorahosted.org/freeipa/changeset/31a9ef4f8b8e2d6bb11f68ce34a7575ced9816aa
https://fedorahosted.org/freeipa/changeset/2dedfe5d33062fc7121bf36be12d7b423b62120a
https://fedorahosted.org/freeipa/changeset/cf1c4e84e74ea15fe5cf7219872cf131bd53281e
https://fedorahosted.org/freeipa/changeset/bddd4fac462c07458297d1cea5272bde97fb3707
https://fedorahosted.org/freeipa/changeset/822e1bc82af3a6c1556546c4fbe96eeafad45762
https://fedorahosted.org/freeipa/changeset/89bb5ed1ebc0b5952a1d5eae34e0f39c5ba540d7
https://fedorahosted.org/freeipa/changeset/8e36e030910a4a6ec5ddb37cc19824f37b25ab51
https://fedorahosted.org/freeipa/changeset/3d5161d7e943fc6d4d092d18fc980fd40d21a59f
https://fedorahosted.org/freeipa/changeset/a6ec37255441294285fac58c9bf08129db110fac
https://fedorahosted.org/freeipa/changeset/19912796edf5d6427920ff67c33e6288223e0466
https://fedorahosted.org/freeipa/changeset/33537f555636db935dd809b62498e2415d765e8e
https://fedorahosted.org/freeipa/changeset/2c226ebc27e2a4e2677549003c4c70a94296
https://fedorahosted.org/freeipa/changeset/3f690a0a3a7e039183eca1578a3cb13f2c0632ef
https://fedorahosted.org/freeipa/changeset/fcea3b3fb88ede0e9414f83ac2372e000e728587
https://fedorahosted.org/freeipa/changeset/83fe6b626fd2fb7f43ddf3568aaffca1ce569079
https://fedorahosted.org/freeipa/changeset/1f65c07524c8cf80996de9f6250a4e19c3a043c9
https://fedorahosted.org/freeipa/changeset/8cbbb5359155446be22a5efb1e2372e527d2d745
https://fedorahosted.org/freeipa/changeset/bbad08900bbe8f76e59b159cd2af800f5c089ca1
https://fedorahosted.org/freeipa/changeset/b3786730e50080fa4dadeffa86388592c10b3a62
https://fedorahosted.org/freeipa/changeset/c38ce49e8d280e52c61f722b0e5ad7aa9f53cc1a
https://fedorahosted.org/freeipa/changeset/5249eb817efbb5708d097173a8d5f1e322fb201e
https://fedorahosted.org/freeipa/changeset/847b6eddab00973740413b4c46f86940cb73d25a
https://fedorahosted.org/freeipa/changeset/0914a3aeb778986dea4020ddf8ca550ebef02bad
https://fedorahosted.org/freeipa/changeset/990e1acb1a667b90619e7799bb96e2cd81e97e61
https://fedorahosted.org/freeipa/changeset/b068d3336ad65748881d0dc74505f41dac9f0f13
https://fedorahosted.org/freeipa/changeset/a3c9def4e982bcc90e9ece0900993ace53777906
https://fedorahosted.org/freeipa/changeset/8cb315af627d712dd21396164cfa2b5d03ccb466
https://fedorahosted.org/freeipa/changeset/87c3c1abecdfb8b5eb227239eeacfbee386a7ed7
https://fedorahosted.org/freeipa/changeset/bde1d82ebe32be339c30c85048fd18e1ce99867d
https://fedorahosted.org/freeipa/changeset/ba4df6449aaa0843ab43a1a2b3cb1df8bb022c24
https://fedorahosted.org/freeipa/changeset/1fc128b05fd13a3f400346cc6d2e7fb5f66875ac
https://fedorahosted.org/freeipa/changeset/500327b7754e032738ab88ae19fad287f2d8cdab
https://fedorahosted.org/freeipa/changeset/2de43e7aca7d4d4873ad3e5053ad75311e81dc68
https://fedorahosted.org/freeipa/changeset/e40d6a2a53a931b4d2be3e45c84da99950e60a84
https://fedorahosted.org/freeipa/changeset/0b68899779e4500d231e974f11e428f8a3577538
https://fedorahosted.org/freeipa/changeset/928a4aa6f281df55e0f655d5cbf5a327794507b6
https://fedorahosted.org/freeipa/changeset/606cac1c9e85633f54b1cc1c9fc1351e6d1a545f
https://fedorahosted.org/freeipa/changeset/835923750bff4f26d9b90df9870a961d16728488
https://fedorahosted.org/freeipa/changeset/bc2e3386e7fa30211a46c0c2284d901cc2509147
https://fedorahosted.org/freeipa/changeset/37578cfc2bbec99d75b19c94c337c406bf6a6ef7
https://fedorahosted.org/freeipa/changeset/1e6366bc9f10de66de84b9506341f021fb3650d9
https://fedorahosted.org/freeipa/changeset/15f282cf2c4a5315aa3e259bd923718685d88245
https://fedorahosted.org/fr

[Freeipa-devel] [freeipa PR#232][closed] Installer refactoring

2016-11-11 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/232
Author: jcholast
 Title: #232: Installer refactoring
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/232/head:pr232
git checkout pr232
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#232][+pushed] Installer refactoring

2016-11-11 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/232
Title: #232: Installer refactoring

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#232][+ack] Installer refactoring

2016-11-11 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/232
Title: #232: Installer refactoring

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#214][comment] ipaldap: remove do_bind from LDAPClient

2016-11-11 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/214
Title: #214: ipaldap: remove do_bind from LDAPClient

jcholast commented:
"""
DM password may be `None` in `dns_container_exists()` and 
`dnssec_container_exists()` (for example in `BindInstance.setup()`), so you 
can't simple bind unconditionally.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/214#issuecomment-259916767
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#214][reopened] ipaldap: remove do_bind from LDAPClient

2016-11-11 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/214
Author: tomaskrizek
 Title: #214: ipaldap: remove do_bind from LDAPClient
Action: reopened

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/214/head:pr214
git checkout pr214
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#173][+pushed] Ensure correct IPA CA nickname in DS and HTTP NSSDBs

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/173
Title: #173: Ensure correct IPA CA nickname in DS and HTTP NSSDBs

Label: +pushed
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#173][comment] Ensure correct IPA CA nickname in DS and HTTP NSSDBs

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/173
Title: #173: Ensure correct IPA CA nickname in DS and HTTP NSSDBs

jcholast commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/cdd41e06e6ef97efafd36ee9e4c8d3be9e4099e7
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/173#issuecomment-259887677
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#173][closed] Ensure correct IPA CA nickname in DS and HTTP NSSDBs

2016-11-10 Thread jcholast
   URL: https://github.com/freeipa/freeipa/pull/173
Author: frasertweedale
 Title: #173: Ensure correct IPA CA nickname in DS and HTTP NSSDBs
Action: closed

To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/173/head:pr173
git checkout pr173
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#219][comment] Refactor installer code requesting certificates

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/219
Title: #219: Refactor installer code requesting certificates

jcholast commented:
"""
Turns out the request does not time out in certmonger, but the 60 seconds wait 
in `request_and_wait_for_cert()` it too short.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/219#issuecomment-259692618
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#219][+ack] Refactor installer code requesting certificates

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/219
Title: #219: Refactor installer code requesting certificates

Label: +ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#229][comment] Remove the renewal lock file upon uninstall

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/229
Title: #229: Remove the renewal lock file upon uninstall

jcholast commented:
"""
The file is owned by the server, not the client, so it should be deleted in 
`ipa-server-install --uninstall`, not in `ipa-client-install --uninstall`.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/229#issuecomment-259683231
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#143][comment] Issue6386 nss dir

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/143
Title: #143: Issue6386 nss dir

jcholast commented:
"""
For example, if your `IPA_CONFDIR` PR was merged, setting the variable could 
break `ipa-client-install`, because the hard coded half of it assumes that the 
configuration directory is always `/etc/ipa`, but the API half would use 
something else.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/143#issuecomment-259681181
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
Sorry, but I just don't see an explanation in the comment you linked, just that 
you think it's easier to set an environment variable rather than an argument. 
Yes, it is easier, but it also make the configuration implicit - say this PR 
was merged, now look at this:
```
$ ipa ping
```
Can you tell me which configuration directory will this command use? The fact 
is you can't, as opposed to:
```
$ ipa -e confdir=/path/to/confdir
```
where it is clear just by looking at the command. This is the part I have a 
problem with.

The links you posted only show that environment variables are used to override 
configuration in a few pieces of software, not that it is a standard like you 
say. I could as easily compile a list of software which _doesn't_ do it.

All of the examples are doable by setting `confdir` explicitly in `ipa -e` or 
`api.bootstrap()` as well. I would like to see something more concrete.

I will read your proposal once you send it to freeipa-devel for review.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-259679930
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#219][comment] Refactor installer code requesting certificates

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/219
Title: #219: Refactor installer code requesting certificates

jcholast commented:
"""
Can we fix this in a separate PR to unblock the merge of this one?
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/219#issuecomment-259671468
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
Care to point me to some actual standard which recommends this? Using explicit 
configuration via library initialization arguments is no NIH, everyone else 
does it as well and it is a solution we already have in place.

Still zero examples to support you claim that environment variable is a must.

EDIT: There is no link to your proposal here nor is there a thread on 
freeipa-devel. I would be glad to read it but please follow our process for new 
feature designs.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-259670126
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#143][comment] Issue6386 nss dir

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/143
Title: #143: Issue6386 nss dir

jcholast commented:
"""
Sure, just please keep this in mind for your other changes.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/143#issuecomment-259670294
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
Care to point me to some actual standard which recommends this? Using explicit 
configuration via library initialization arguments is no NIH, everyone else 
does it as well and it is a solution we already have in place.

Still zero examples to support you claim that environment variable is a must.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-259670126
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#180][comment] Make api.env.nss_dir relative to api.env.confdir

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/180
Title: #180: Make api.env.nss_dir relative to api.env.confdir

jcholast commented:
"""
See my comment on #143.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/180#issuecomment-259663799
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#143][comment] Issue6386 nss dir

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/143
Title: #143: Issue6386 nss dir

jcholast commented:
"""
OK, but you should at least make sure that where the code depends on hard-coded 
paths, the API is bootstrapped with a hard coded `confdir` as well, otherwise 
things might break.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/143#issuecomment-259663631
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
"Everyone else does it" is not really a good argument to anything. Just saying.

Also you still haven't provided a single example of where explicitly setting 
confdir can't be used and thus the environment variable must be used, and just 
keep repeating how required it is, so sorry I'm a little bit sceptical.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-259662631
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
@tiran, setting `confdir` explicitly is not a hack, but the proper way to set 
the config directory path and there is nothing that makes the environment 
variable better as an API for integrators. I would argue that it's actually 
worse, because it is implicit and optimized towards the less common usage 
(everyone who wants to use the default path has to unset the variable now to 
make sure that's what they actually get), and while some software does indeed 
allow changing configuration using environment variables, there is other 
software (such as GNU grep) which is actually deprecating this way of changing 
configuration.

If majority of people think it is a good idea, I won't push back, but NACK on 
respecting the variable only in certain contexts.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-259635859
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][comment] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

jcholast commented:
"""
@tiran, setting `confdir` explicitly is not a hack, but the proper way to set 
the config directory path and there is nothing that makes the environment 
variable better as an API for integrators. I would argue that it's actually 
worse, because it is implicit and optimized towards the less common usage 
(everyone who wants to use the default path has to unset the variable now to 
make sure that's what they actually get), and while some software does indeed 
allow changing configuration using environment variables, there is other 
software (such as GNU grep) which is actually deprecating this way of changing 
configuration.

If majority of people think it is a good idea, I won't push back, but NACK on 
respecting the variable only in specific contexts.
"""

See the full comment at 
https://github.com/freeipa/freeipa/pull/182#issuecomment-259635859
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

[Freeipa-devel] [freeipa PR#182][-ack] Use env var IPA_CONFDIR to get confdir for 'cli' context

2016-11-10 Thread jcholast
  URL: https://github.com/freeipa/freeipa/pull/182
Title: #182: Use env var IPA_CONFDIR to get confdir for 'cli' context

Label: -ack
-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

  1   2   >