URL: https://github.com/SSSD/sssd/pull/855
Title: #855: nss: Fix command 'endservent' resetting wrong struct member
jhrozek commented:
"""
ok to test
"""
See the full comment at
https://github.com/SSSD/sssd/pull/855#issuecomment-515186167
___
sssd-de
URL: https://github.com/SSSD/sssd/pull/855
Title: #855: nss: Fix command 'endservent' resetting wrong struct member
centos-ci commented:
"""
Can one of the admins verify this patch?
"""
See the full comment at
https://github.com/SSSD/sssd/pull/855#issuecomment-515096164
___
URL: https://github.com/SSSD/sssd/pull/855
Author: scabrero
Title: #855: nss: Fix command 'endservent' resetting wrong struct member
Action: opened
PR body:
"""
Signed-off-by: Samuel Cabrero
"""
To pull the PR as Git branch:
git remote add ghsssd https://github.com/SSSD/sssd
git fetch ghsssd
URL: https://github.com/SSSD/sssd/pull/854
Title: #854: LDAP: Do not require START_TLS for loopback connections
simo5 commented:
"""
@scabrero To be honest I would prefer to write a tool that simply generates a
local certificate, adds it to the local machine trust store and gives it to the
LDA
URL: https://github.com/SSSD/sssd/pull/854
Title: #854: LDAP: Do not require START_TLS for loopback connections
scabrero commented:
"""
@simo5, as you said the idea is to avoid having to set up certificates (or
undocumented options) when sssd and ldap run in the same machine. I understand
the