URL: https://github.com/freeipa/freeipa/pull/625
Author: HonzaCholasta
Title: #625: [RFC] remote plugins: add option to force compat plugins
Action: closed
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/625/head:pr625
git
URL: https://github.com/freeipa/freeipa/pull/859
Author: frasertweedale
Title: #859: Add CommonNameToSANDefault to default cert profile
Action: closed
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/859/head:pr859
git checkout
URL: https://github.com/freeipa/freeipa/pull/863
Author: frasertweedale
Title: #863: [ipa-4-5] Add CommonNameToSANDefault to default cert profile
Action: closed
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/863/head:pr863
git
URL: https://github.com/freeipa/freeipa/pull/833
Title: #833: Fixes traceback in log and corrects console output
HonzaCholasta commented:
"""
NACK. Please don't "fix" the framework with workarounds for ill-behaved
commands, this needs to be fixed in the trust plu
URL: https://github.com/freeipa/freeipa/pull/833
Title: #833: Fixes traceback in log and corrects console output
Label: -ack
___
FreeIPA-devel mailing list -- freeipa-devel@lists.fedorahosted.org
To unsubscribe send an email to freeipa-devel-le...@list
URL: https://github.com/freeipa/freeipa/pull/852
Author: HonzaCholasta
Title: #852: pkinit manage: introduce ipa-pkinit-manage
Action: opened
PR body:
"""
**server certinstall: update KDC master entry**
After the KDC certificate is installed, add the PKINIT enabled flag to
URL: https://github.com/freeipa/freeipa/pull/812
Title: #812: [WIP] Refactoring cert-find to use API call directly instead of
using
HonzaCholasta commented:
"""
@felipevolpone, that is a bad idea. Calling the API instead of doing a direct
LDAP search would degrade perfor
URL: https://github.com/freeipa/freeipa/pull/801
Author: HonzaCholasta
Title: #801: httpinstance: wait until the service entry is replicated
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/801/head:pr801
URL: https://github.com/freeipa/freeipa/pull/801
Author: HonzaCholasta
Title: #801: httpinstance: wait until the service entry is replicated
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/801/head:pr801
URL: https://github.com/freeipa/freeipa/pull/812
Title: #812: Refactoring cert-find to use API call directly instead of using
HonzaCholasta commented:
"""
@simo5, it will. Same for hosts.
@felipevolpone, one possible correct fix would be to modify `cert._owners` to:
```python
URL: https://github.com/freeipa/freeipa/pull/804
Title: #804: krb5: make sure KDC certificate is readable
Label: +ack
___
FreeIPA-devel mailing list -- freeipa-devel@lists.fedorahosted.org
To unsubscribe send an email to freeipa-devel-le...@lists.fedor
URL: https://github.com/freeipa/freeipa/pull/771
Author: stlaz
Title: #771: cert-show: check if certificate_out is in options
Action: closed
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/771/head:pr771
git checkout pr771
URL: https://github.com/freeipa/freeipa/pull/771
Title: #771: cert-show: check if certificate_out is in options
HonzaCholasta commented:
"""
master:
* 1ed1717e9956ba5a3baa9d0992e14fd2d4a2dd6a ca/cert-show: check certificate_out
in options
ipa-4-5:
* 9ce5d6bf36e669f40099a8468
URL: https://github.com/freeipa/freeipa/pull/771
Title: #771: cert-show: check if certificate_out is in options
Label: +pushed
___
FreeIPA-devel mailing list -- freeipa-devel@lists.fedorahosted.org
To unsubscribe send an email to freeipa-devel-le...@li
URL: https://github.com/freeipa/freeipa/pull/771
Title: #771: cert-show: check if certificate_out is in options
Label: +ack
___
FreeIPA-devel mailing list -- freeipa-devel@lists.fedorahosted.org
To unsubscribe send an email to freeipa-devel-le...@lists
URL: https://github.com/freeipa/freeipa/pull/804
Title: #804: krb5: make sure KDC certificate is readable
HonzaCholasta commented:
"""
No problem, thank you.
"""
See the full comment at
https://github.com/freeipa/freeipa/p
URL: https://github.com/freeipa/freeipa/pull/623
Title: #623: client install: do not assume /etc/krb5.conf.d exists
HonzaCholasta commented:
"""
@frozencemetery, this is *not* for the sake of Debian. We will still have to
worry about this for operating systems which are not Fe
URL: https://github.com/freeipa/freeipa/pull/804
Title: #804: krb5: make sure KDC certificate is readable
HonzaCholasta commented:
"""
I have already "solved" this by changing the permissions of the cert file in
the `renew_kdc_cert` restart script. Your solution is
URL: https://github.com/freeipa/freeipa/pull/804
Title: #804: krb5: make sure KDC certificate is readable
HonzaCholasta commented:
"""
I have already "solved" this by changing the permissions of the cert file in
the `renew_kdc_cert`. Your solution is definitely better,
URL: https://github.com/freeipa/freeipa/pull/804
Title: #804: krb5: make sure KDC certificate is readable
Label: -ack
___
FreeIPA-devel mailing list -- freeipa-devel@lists.fedorahosted.org
To unsubscribe send an email to freeipa-devel-le...@lists.fedor
URL: https://github.com/freeipa/freeipa/pull/623
Author: HonzaCholasta
Title: #623: client install: do not assume /etc/krb5.conf.d exists
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/623/head:pr623
git
URL: https://github.com/freeipa/freeipa/pull/801
Author: HonzaCholasta
Title: #801: httpinstance: wait until the service entry is replicated
Action: opened
PR body:
"""
Wait until the local HTTP service entry is replicated to the remote master
before requesting the server cer
URL: https://github.com/freeipa/freeipa/pull/798
Author: HonzaCholasta
Title: #798: [4.5] install: fix CA-less PKINIT
Action: opened
PR body:
"""
**certdb: add named trust flag constants**
Add named constants for common trust flag combinations.
Use the named constants instead
URL: https://github.com/freeipa/freeipa/pull/758
Author: HonzaCholasta
Title: #758: install: fix CA-less PKINIT
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/758/head:pr758
git checkout pr758
From
URL: https://github.com/freeipa/freeipa/pull/758
Author: HonzaCholasta
Title: #758: install: fix CA-less PKINIT
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/758/head:pr758
git checkout pr758
From
URL: https://github.com/freeipa/freeipa/pull/769
Title: #769: test_caless: add pkinit option and test it
HonzaCholasta commented:
"""
@stlaz & @Rezney, kind permission given.
"""
See the full comment at
https://github.com/freeipa/freei
URL: https://github.com/freeipa/freeipa/pull/758
Author: HonzaCholasta
Title: #758: install: fix CA-less PKINIT
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/758/head:pr758
git checkout pr758
From
URL: https://github.com/freeipa/freeipa/pull/758
Title: #758: install: fix CA-less PKINIT
HonzaCholasta commented:
"""
Fixed kdc.conf upgrade.
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/758#issuecomment-302308896
_
URL: https://github.com/freeipa/freeipa/pull/758
Author: HonzaCholasta
Title: #758: install: fix CA-less PKINIT
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/758/head:pr758
git checkout pr758
From
29 matches
Mail list logo