[Freeipa-interest] FreeIPA 4.9.8

Antonio Torres antorres at redhat.com
Thu Nov 25 18:42:49 UTC 2021


The FreeIPA team would like to announce FreeIPA 4.9.8 release!

It can be downloaded from http://www.freeipa.org/page/Downloads. Builds
for Fedora distributions will be available from the official repository
soon.

== Highlights in 4.9.8

* 8397: Cannot remove First master server with KRA after the server hard
disk failed ( destructed)

    The KRA role search was too narrow resulting in false positives when
    trying to delete a server with a KRA, resulting in an error that the
    last KRA was being removed when this was not the case.


* 8492: RFE: Include the server schema version in communication with the
client

    IPA clients store a copy of the server command schema, with a TTL of
    1 hour by default. During plugin development command options,
    labels, etc may change and because some values are cached, new
    values will not display until the cache expires. This change adds a
    new configuration option, schema_ttl, so that a user can control how
    long the data is cached. A setting of 0 disables the cache. Tuning
    this is not recommended on production servers.


* 8962: Info about searchrecordslimit set search limit to 10,000 after
upgrade

    Set the server-side search size limit to 10,000 entries. By default
    the client side will still be 100. Consider carefully when
    increasing the client side value as it adds additional load on the
    server to retrieve more entries.


* 8968: Add URI records for KDC

    FreeIPA DNS integration now provides URI records for a dynamic
    discovery of Kerberos KDCs. This allows automatic discover and use
    of MS-KKDCP proxies. URI records are also Kubernetes-friendly as
    Kubernetes does not support SRV records with the same name and
    different protocols.


* 8974: RHEL 8.5 IPA Replica setup fails against a RHEL 7.9 IPA server

    When creating a new replica against an older existing server that
    lacks the sanToCNDefaultImpl capability, the ACME certificate
    profile cannot be added. Running ipa-server-upgrade manually after
    ipa-replica-install has completed will correctly add in the missing
    profile.


* 8980: Nightly test failure in
pki-fedora/test_integration/test_backup_and_restore

    Make Dogtag return XML for ipa cert-find


* 8986: ipa cert-request replaces user certificate instead of adding

    By default IPA caches LDAP entries within a given request. Entries
    with a userCertificate value are not cached because the attribute
    may be represented with or without a ;binary tag and this confuses
    the cache. This will be revisted in the future but for now we are
    favoring correctness over speed.


* 8995: Integrate SID configuration into base IPA installers

    New installations of IPA now configure the server to generate SIDs
    by default. Previously, this setup was executed as part of the
    ipa-adtrust-install command.


* 9031: Harden FreeIPA KDC processing of PAC buffers

    FreeIPA now implements PAC structure hardening as coordinated with
    Samba Team and Microsoft in CVE-2020-25719 and CVE-2021-42287
    correspondingly.


* 9038: Concerns regarding 'ipa pwpolicy-mod --minlife 24 --maxlife 1'

    ipa pwpolicy-mod --minlife $min --maxlife $max accepts $max >= $min,
    yet the error message says: "Maximum password life must be greater
    than minimum." Change the error message so that it conveys the
    actual logic.


=== Enhancements

* 8492: RFE: Include the server schema version in communication with the
client

    IPA clients store a copy of the server command schema, with a TTL of
    1 hour by default. During plugin development command options,
    labels, etc may change and because some values are cached, new
    values will not display until the cache expires. This change adds a
    new configuration option, schema_ttl, so that a user can control how
    long the data is cached. A setting of 0 disables the cache. Tuning
    this is not recommended on production servers.


* 8968: Add URI records for KDC

    FreeIPA DNS integration now provides URI records for a dynamic
    discovery of Kerberos KDCs. This allows automatic discover and use
    of MS-KKDCP proxies. URI records are also Kubernetes-friendly as
    Kubernetes does not support SRV records with the same name and
    different protocols.


* 8995: Integrate SID configuration into base IPA installers

    New installations of IPA now configure the server to generate SIDs
    by default. Previously, this setup was executed as part of the
    ipa-adtrust-install command.


* 9031: Harden FreeIPA KDC processing of PAC buffers

    FreeIPA now implements PAC structure hardening as coordinated with
    Samba Team and Microsoft in CVE-2020-25719 and CVE-2021-42287
    correspondingly.


=== Known Issues

* 8700: ipa-server-install --auto-reverse does not create reverse DNS
zone in Fedora 33

    Previously, systemd-resolved presented reverse record for host's IP
    address which made ipa-server-install skip creation of reverse zone.
    The issue was fixed in systemd on Fedora 35 and is not a problem
    anymore.


* 9026: Missing bind-pkcs11-utils causing failures in OpenDNSSec

    OpenDNSSec integration: depend on bind-dnssec-utils on all Fedora
    releases and RHEL == 9+. Switch to "/usr/sbin/dnssec-keyfromlabel -E
    pkcs11" instead of "/usr/sbin/dnssec-keyfromlabel-pkcs11" there too.


=== Bug fixes

FreeIPA 4.9.8 is a stabilization release for the features delivered as a
part of 4.9.0 version series.

There are more than 30 bug-fixes since FreeIPA 4.9.7 release. Details of
the bug-fixes can be seen in the list of resolved tickets below.

== Upgrading

Upgrade instructions are available on Upgrade page.

== Feedback

Please provide comments, bugs and other feedback via the freeipa-users
mailing list
(https://lists.fedoraproject.org/archives/list/freeipa-users@lists.fedorahosted.org/)
or #freeipa channel on libera.chat.

== Resolved tickets

* https://pagure.io/freeipa/issue/7885[#7885]
(https://bugzilla.redhat.com/show_bug.cgi?id=1690191[rhbz#1690191]) RFE:
wrapper for Dogtag cert-fix command
* https://pagure.io/freeipa/issue/8353[#8353] Sporadic: Nightly test
failure in
test_adtrust_install.py::TestIpaAdTrustInstall::test_add_agent_not_allowed
- kinit: Password has expired while getting initial credentials
* https://pagure.io/freeipa/issue/8397[#8397]
(https://bugzilla.redhat.com/show_bug.cgi?id=1985069[rhbz#1985069])
Cannot remove First master server with KRA after the server hard disk
failed ( destructed)
* https://pagure.io/freeipa/issue/8492[#8492] RFE: Include the server
schema version in communication with the client
* https://pagure.io/freeipa/issue/8687[#8687]
(https://bugzilla.redhat.com/show_bug.cgi?id=1980356[rhbz#1980356])
Nightly failure (rawhide/f34) reinstalling samba client: winbindd
coredump
* https://pagure.io/freeipa/issue/8700[#8700] ipa-server-install
--auto-reverse does not create reverse DNS zone in Fedora 33
* https://pagure.io/freeipa/issue/8755[#8755]
(https://bugzilla.redhat.com/show_bug.cgi?id=1921007[rhbz#1921007])
ipa-server-install : No such file or directory:
'/etc/authselect/user-nsswitch.conf'
* https://pagure.io/freeipa/issue/8815[#8815] Nightly test failure in
new test test_ipa_cert_fix.py::TestCertFixReplica
* https://pagure.io/freeipa/issue/8846[#8846] Nightly test failure in
test_webui_policy::test_selinuxusermap::test_undo_refresh_reset_update_cancel
* https://pagure.io/freeipa/issue/8932[#8932] ipatests: move_date is
defined twice
* https://pagure.io/freeipa/issue/8953[#8953]
test_certmonger_ipa_responder_jsonrpc random failure
* https://pagure.io/freeipa/issue/8954[#8954] Issues in commands of
`schema` plugin
* https://pagure.io/freeipa/issue/8955[#8955] Unstable fingerprints for
the same API schema
* https://pagure.io/freeipa/issue/8961[#8961] [azure] inconsistent
results for `Quick code style check` and `Lint` tasks
* https://pagure.io/freeipa/issue/8962[#8962]
(https://bugzilla.redhat.com/show_bug.cgi?id=1966289[rhbz#1966289]) Info
about searchrecordslimit set search limit to 10,000 after upgrade
* https://pagure.io/freeipa/issue/8965[#8965]
(https://bugzilla.redhat.com/show_bug.cgi?id=2000261[rhbz#2000261])
extdom: LDAP_INVALID_SYNTAX returned instead of LDAP_NO_SUCH_OBJECT
* https://pagure.io/freeipa/issue/8966[#8966] Invoke pkispawn with
--log-file
* https://pagure.io/freeipa/issue/8968[#8968] Add URI records for KDC
* https://pagure.io/freeipa/issue/8972[#8972]
(https://bugzilla.redhat.com/show_bug.cgi?id=1998129[rhbz#1998129]) AVC
denied \{ read } comm="ipa-custodia" on aarch64 during installation of
ipa-server
* https://pagure.io/freeipa/issue/8974[#8974]
(https://bugzilla.redhat.com/show_bug.cgi?id=1999142[rhbz#1999142]) RHEL
8.5 IPA Replica setup fails against a RHEL 7.9 IPA server
* https://pagure.io/freeipa/issue/8975[#8975] Nightly test failure in
test_integration/test_commands.py/TestIPACommand/test_reset_password_unlock
* https://pagure.io/freeipa/issue/8979[#8979] Nightly test failure
(rawhide) in
test_trust.py::TestTrust::test_establish_forest_trust_with_shared_secret
* https://pagure.io/freeipa/issue/8980[#8980] Nightly test failure in
pki-fedora/test_integration/test_backup_and_restore
* https://pagure.io/freeipa/issue/8983[#8983] [azure] tar sometimes
fails on changed in process files
* https://pagure.io/freeipa/issue/8984[#8984]
(https://bugzilla.redhat.com/show_bug.cgi?id=1999992[rhbz#1999992]) ipa
migrate-ds command fails to warn when compat plugin is enabled
* https://pagure.io/freeipa/issue/8985[#8985] [azure] docs build fails
with Pygments 2.8.0+
* https://pagure.io/freeipa/issue/8986[#8986]
(https://bugzilla.redhat.com/show_bug.cgi?id=1999893[rhbz#1999893]) ipa
cert-request replaces user certificate instead of adding
* https://pagure.io/freeipa/issue/8987[#8987] Nightly test failure in
test_integration/test_trust.py/TestTrust/test_extdom_plugin
* https://pagure.io/freeipa/issue/8989[#8989] Nightly failure (rawhide)
in tasks.run_ssh_cmd
* https://pagure.io/freeipa/issue/8995[#8995] Integrate SID
configuration into base IPA installers
* https://pagure.io/freeipa/issue/8999[#8999] Nightly failure (rawhide)
in
test_ipahealthcheck.py::TestIpaHealthCheckWithExternalCA::test_ipahealthcheck_ipaopensslchainvalidation
* https://pagure.io/freeipa/issue/9000[#9000] Nightly failure (rawhide)
in
test_ipahealthcheck.py::TestIpaHealthCheck::test_sosreport_includes_healthcheck
* https://pagure.io/freeipa/issue/9006[#9006] Nightly failure in
test_commands.py::TestIPACommand::test_cacert_manage
* https://pagure.io/freeipa/issue/9008[#9008] [azure] clone3 and glibc
2.34 in container
* https://pagure.io/freeipa/issue/9009[#9009] Nightly failure (rawhide)
in webui_tests: yaml.load() now requires Loader
* https://pagure.io/freeipa/issue/9011[#9011] [azure] pip's builddir
* https://pagure.io/freeipa/issue/9013[#9013] [ipatests]
test_external_ca.py::TestMultipleExternalCA::test_master_install_ca1
fails
* https://pagure.io/freeipa/issue/9026[#9026]
(https://bugzilla.redhat.com/show_bug.cgi?id=2020207[rhbz#2020207])
Missing bind-pkcs11-utils causing failures in OpenDNSSec
* https://pagure.io/freeipa/issue/9029[#9029] Nightly webui test failure
(rawhide): selenium issue
* https://pagure.io/freeipa/issue/9031[#9031] Harden FreeIPA KDC
processing of PAC buffers
* https://pagure.io/freeipa/issue/9036[#9036]
(https://bugzilla.redhat.com/show_bug.cgi?id=2009114[rhbz#2009114])
Invalid PTR records created when navigated from host details page
* https://pagure.io/freeipa/issue/9038[#9038]
(https://bugzilla.redhat.com/show_bug.cgi?id=1825010[rhbz#1825010])
Concerns regarding 'ipa pwpolicy-mod --minlife 24 --maxlife 1'
* https://pagure.io/freeipa/issue/9046[#9046] Stacktrace when using 'ipa
server-del' in non-English locale

== Detailed changelog since 4.9.7

=== Armando Neto (2)

* ipatests: Fix UI_driver method after Selenium upgrade
https://pagure.io/freeipa/c/bb5ef716070cb564b3455ddf7a6656de5e228d0e[commit]
https://pagure.io/freeipa/issue/9029[#9029]
* ipatests: Bump PR-CI latest templates to Fedora 35
https://pagure.io/freeipa/c/d97250fac563c4a41dc0c4dddc84502c0af16ff6[commit]

=== Alexander Bokovoy (12)

* freeipa.spec.in: -server subpackage should require samba-client-libs
https://pagure.io/freeipa/c/c850cd52dcee8d2e5107af5ddf33e79b4e33527f[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: validate domain SID in incoming PAC for trusted domains for
S4U
https://pagure.io/freeipa/c/5213c1e42cdedf4a862bf7173d7c632d0c1460b5[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: honor SID from the host or service entry
https://pagure.io/freeipa/c/a95ccd908f9e04375380f5dba1110f6c55a93638[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* SMB: switch IPA domain controller role
https://pagure.io/freeipa/c/693c165ce83df9e21a4928cde64bdea9f997d1a6[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: Use proper account flags for Kerberos principal in PAC
https://pagure.io/freeipa/c/adf5ab7344b810106cb4b493c798af597d14a080[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: add PAC_ATTRIBUTES_INFO PAC buffer support
https://pagure.io/freeipa/c/b71467e2fe5942688d2d988999340ef398b97a29[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: add support for PAC_REQUESTER_SID buffer
https://pagure.io/freeipa/c/879ef1b1a69ed187fcfa8fff007ab95ec72a1a65[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: add support for PAC_UPN_DNS_INFO_EX
https://pagure.io/freeipa/c/4cafdac1dfbd95087c3d0510cbf2638fc31c4d94[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: S4U2Proxy target should use a service name without realm
https://pagure.io/freeipa/c/8b5e496101963c7059fac2a4a5c8b5e15ad9f726[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: use entry DN to compare aliased entries in S4U operations
https://pagure.io/freeipa/c/eb5a93ddbe0ab17c36d5c78e5c0fcf020745484a[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: enforce SID checks when generating PAC
https://pagure.io/freeipa/c/9ecbdd8e5968b1b4033bedb90fccdd0f05720b40[commit]
https://pagure.io/freeipa/issue/9031[#9031]
* ipa-kdb: store SID in the principal entry
https://pagure.io/freeipa/c/9ded98b66ed62a2edc7b27c02e0b94a6e6fa8ae9[commit]
https://pagure.io/freeipa/issue/9031[#9031]

=== Antonio Torres (4)

* Back to git snapshots
https://pagure.io/freeipa/c/8042bdc90c0ca8080f94c9baf54b713e08873232[commit]
* Become IPA 4.9.8
https://pagure.io/freeipa/c/a9620a5d7171de49f176a9504d1bb32db2d9650e[commit]
* Update list of contributors
https://pagure.io/freeipa/c/b4f9026e80cd936f2e21420a9b6d233f53cb894a[commit]
* Update translations to FreeIPA ipa-4-9 state
https://pagure.io/freeipa/c/c587db883df9ae28a6d2500dbe32de14c6c4c119[commit]

=== Christian Heimes (1)

* Add URI system records for KDC
https://pagure.io/freeipa/c/2cf0ad5cfd2d558c844bc9640c121fa35ebb1c30[commit]
https://pagure.io/freeipa/issue/8968[#8968]

=== Chris Kelley (1)

* Make Dogtag return XML for ipa cert-find
https://pagure.io/freeipa/c/bbda3590bb20a2915261f2fd9b8a8e0b169f93f4[commit]
https://pagure.io/freeipa/issue/8980[#8980]

=== Endi Sukma Dewata (1)

* Specify PKI installation log paths
https://pagure.io/freeipa/c/5abf1bc79f8b32c6638ff98fbe2e4a8dec9a5010[commit]
https://pagure.io/freeipa/issue/8966[#8966]

=== François Cami (6)

* freeipa.spec: depend on bind-dnssec-utils
https://pagure.io/freeipa/c/f89d59b6e18b54967682f6a37ce92ae67ab3fcda[commit]
https://pagure.io/freeipa/issue/9026[#9026]
* pwpolicy: change lifetime error message
https://pagure.io/freeipa/c/76afa643f4afd0167fd670142aa70369d91d7af2[commit]
https://pagure.io/freeipa/issue/9038[#9038]
* subid: subid-match: display the owner's ID not DN
https://pagure.io/freeipa/c/4785a90946ec694ccc082f062b2181b23c7099e3[commit]
* ipatests: refactor test_ipa_cert_fix with tasks
https://pagure.io/freeipa/c/4a3a15f45aad016730252c09e3e173a18184603e[commit]
https://pagure.io/freeipa/issue/8932[#8932]
* freeipa.spec.in: update 389-DS version
https://pagure.io/freeipa/c/210c53dd41a85b7619eb7a2ad427055c994ee1e5[commit]
* Back to git snapshots
https://pagure.io/freeipa/c/60745116a2bc71bef508be5a7a2e1f6082f24bca[commit]

=== Florence Blanc-Renaud (27)

* ipatests: remove xfail on f35+ for test_number_of_zones
https://pagure.io/freeipa/c/a9c080734cb533d7a494b7259ac8d1ef89394d2c[commit]
https://pagure.io/freeipa/issue/8700[#8700]
* ipatests: mark test_installation_TestInstallWithCA_DNS3 as xfail
https://pagure.io/freeipa/c/8ca5b094f829f47b0629301c23818096a5834609[commit]
https://pagure.io/freeipa/issue/8700[#8700]
* ipatests: fix get_user_result method
https://pagure.io/freeipa/c/421e12468d3ebaf8e259789bdba173a785c9e5d4[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* ipatests: update the expected output of user-add cmd
https://pagure.io/freeipa/c/009a8cdfcba78ab6153e132ef653792018e1662b[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* User plugin: do not return the SID on user creation
https://pagure.io/freeipa/c/61f42aefe35d60432d5542ed5fa3f546e6d71f0b[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* Webui tests: new idrange now requires base RID
https://pagure.io/freeipa/c/9c7e8c669740528812a06f9af73fe927313270c9[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* ipatests: backup-reinstall-restore needs to clear sssd cache
https://pagure.io/freeipa/c/c6fd0d00bacf56f1c3bffb2674042058a4608f10[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* User lifecycle: ignore SID when moving from preserved to staged
https://pagure.io/freeipa/c/86d1683e0966a5d33e570b9cc2bb032e9af98bf0[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* ipatests: adapt expected output with SID
https://pagure.io/freeipa/c/efc9df086725a151e15fc93b7550bc01df8d1151[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* ipatests: interactive install prompts for netbios name
https://pagure.io/freeipa/c/31d095eac1aa7158761de29aa4f3c42604e83f17[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* ipatests: add test ensuring SIDs are generated for new installs
https://pagure.io/freeipa/c/5bb56f910c39b3db762b6802a6dfaa25a0e77c76[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* ipa config: add --enable-sid option
https://pagure.io/freeipa/c/b98ecabba196107c692825e081fd1c7a6123c2aa[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* adtrust install: define constants for rid bases
https://pagure.io/freeipa/c/a91e6712e80a19070cb9f201b2d2f15ac8b28ff4[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* Installers: configure sid generation in server/replica installer
https://pagure.io/freeipa/c/e527857d000e558b3288a7a210400abaf2171237[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* SID generation: define SIDInstallInterface
https://pagure.io/freeipa/c/dd07db29eec92b421569a194a1d2294852cd6a5c[commit]
https://pagure.io/freeipa/issue/8995[#8995]
* ipa-server-install uninstall: remove tdb files
https://pagure.io/freeipa/c/6302769b83af75f267c76fe6f854d5b42b6b80f5[commit]
https://pagure.io/freeipa/issue/8687[#8687]
* ipa-client-samba uninstall: remove tdb files
https://pagure.io/freeipa/c/82eaa2eac454aed75a498d2c6ccd9e921f9c8a89[commit]
https://pagure.io/freeipa/issue/8687[#8687]
* ipatests: Update the subca used in TestIPACommand::test_cacert_manage
https://pagure.io/freeipa/c/34d6f51fb8ddc97d21470db9a638386127c4c581[commit]
https://pagure.io/freeipa/issue/9006[#9006]
* webui test: close notification after selinux user map update
https://pagure.io/freeipa/c/b706483c827a971aeae855199b9d4ce6005e53b1[commit]
https://pagure.io/freeipa/issue/8846[#8846]
* ipatests: increase sosreport verbosity
https://pagure.io/freeipa/c/fc384b0773c92e1743152b6c04af12b0f17e842b[commit]
https://pagure.io/freeipa/issue/9000[#9000]
* ipatests: update expected error message for openssl verify
https://pagure.io/freeipa/c/01dfce68d97f373c92dd82e355392e5123df8f07[commit]
https://pagure.io/freeipa/issue/8999[#8999]
* ipatests: fix expected msg in tasks.run_ssh_cmd
https://pagure.io/freeipa/c/ef58efe7e4c3f8ed3e31623035eba2a3bdba6e46[commit]
https://pagure.io/freeipa/issue/8989[#8989]
* ipatests: fix logic waiting for repl in TestIPACommand
https://pagure.io/freeipa/c/4f569c68cde408865389c61f9befb2ea23bd6d30[commit]
https://pagure.io/freeipa/issue/8975[#8975]
* migrate-ds: workaround to detect compat tree
https://pagure.io/freeipa/c/3c4f9e7347965ff9a887147df34e720224ffa7cc[commit]
https://pagure.io/freeipa/issue/8984[#8984]
* ipatests: rpcclient now uses --use-kerberos=desired
https://pagure.io/freeipa/c/395b0d26d0b042d5384bc8e7272f0121db0989ed[commit]
https://pagure.io/freeipa/issue/8979[#8979]
* selinux policy: allow custodia to access /proc/cpuinfo
https://pagure.io/freeipa/c/07e2bf732f54f936cccc4e0c7b468d77f97e911a[commit]
https://pagure.io/freeipa/issue/8972[#8972]
* ipatests: use whole date for journalctl --since
https://pagure.io/freeipa/c/b5036b5ce9ae4fab011e57fe2b37a35fdd098a70[commit]
https://pagure.io/freeipa/issue/8953[#8953]

=== Jochen Kellner (1)

* Remove duplicate _() in the error path
https://pagure.io/freeipa/c/1660cfa3d2ec4a27c0456b3545a40eadbae45cfb[commit]
https://pagure.io/freeipa/issue/9046[#9046]

=== Michal Polovka (1)

* ipatests: webui: Specify configuration loader
https://pagure.io/freeipa/c/17ba2732f90a69b860f70662133e6904d7373b04[commit]
https://pagure.io/freeipa/issue/9009[#9009]

=== Mohammad Rizwan (4)

* ipatests: remove redundant kinit from test
https://pagure.io/freeipa/c/d3edc039419e9a944ee37dd9e02edfd6a627db5a[commit]
* ipatests: update the timemout for test_ipa_cert_fix.py in nightlies
https://pagure.io/freeipa/c/1b38afc0487efde57f04cf4a8c15f03be46971f3[commit]
* ipatests: wait while http/ldap/pkinit cert get renew on replica
https://pagure.io/freeipa/c/a620e5e9e152defe144705913521c3cf556faa0e[commit]
https://pagure.io/freeipa/issue/8815[#8815]
* ipatests: test to renew certs on replica using ipa-cert-fix
https://pagure.io/freeipa/c/e0aef5296b66c0b460f7e10993610fe68b312241[commit]
https://pagure.io/freeipa/issue/7885[#7885]

=== Pavel Březina (1)

* kdb: fix typo in ipa_kdcpolicy_check_as
https://pagure.io/freeipa/c/bdf479e8cdab14a3985d8acc9fe234e13820108a[commit]

=== Petr Voborník (2)

* webui tests: remove unnecessary code in add_record
https://pagure.io/freeipa/c/a286cd31ec031e07b4d196715ae501f873a4bde2[commit]
https://pagure.io/freeipa/issue/9036[#9036]
* fix(webui): create correct PTR record when navigated from host page
https://pagure.io/freeipa/c/4f5ed837b43d378ed9e003c279e311656b1773ab[commit]
https://pagure.io/freeipa/issue/9036[#9036]

=== Rob Crittenden (7)

* Don't limit role-find by hostname when searching for last KRA
https://pagure.io/freeipa/c/1c66226e83bb8797122d3925b555516201edb8bd[commit]
https://pagure.io/freeipa/issue/8397[#8397]
* Make the schema cache TTL user-configurable
https://pagure.io/freeipa/c/331cadd8f25ab627fc419c48f2db6cc9cafafe40[commit]
https://pagure.io/freeipa/issue/8492[#8492]
* On redhat-based platforms rely on authselect to enable sudo
https://pagure.io/freeipa/c/c1baae842529d89b7fda78ace5ffcff165a995ce[commit]
https://pagure.io/freeipa/issue/8755[#8755]
* ipatests: Test that a user can be issued multiple certificates
https://pagure.io/freeipa/c/86588640137562b2016fdb0f91142d00bc38e54a[commit]
https://pagure.io/freeipa/issue/8986[#8986]
* Don't store entries with a usercertificate in the LDAP cache
https://pagure.io/freeipa/c/be1e3bbfc13aff9a583108376f245b81cc3666fb[commit]
https://pagure.io/freeipa/issue/8986[#8986]
* Increase default limit on LDAP searches to 100k
https://pagure.io/freeipa/c/3fb0f5333613beabeead3feb73dc0fea9694bcdc[commit]
https://pagure.io/freeipa/issue/8962[#8962]
* Catch and log errors when adding CA profiles
https://pagure.io/freeipa/c/a6e708ab4006d6623c37de1692de5362fcdb5dd6[commit]
https://pagure.io/freeipa/issue/8974[#8974]

=== Sumit Bose (1)

* extdom: return LDAP_NO_SUCH_OBJECT if domains differ
https://pagure.io/freeipa/c/4fca95751ca32a1ed16a6d8a4e557c5799ec5c78[commit]
https://pagure.io/freeipa/issue/8965[#8965]

=== Stanislav Levin (15)

* ipatests: TestMultipleExternalCA: Create tempfiles on remote host
https://pagure.io/freeipa/c/7480844765e029ccb5e7149059efd4c56e400982[commit]
https://pagure.io/freeipa/issue/9013[#9013]
* azure: Don't customize pip's builddir
https://pagure.io/freeipa/c/8dd788daf9fbf694754771082db9ee1d7f64fef0[commit]
https://pagure.io/freeipa/issue/9011[#9011]
* seccomp profile: Default to ENOSYS instead of EPERM
https://pagure.io/freeipa/c/488fb1049397c3adc10a2b80737374cff5a87af4[commit]
https://pagure.io/freeipa/issue/9008[#9008]
* test_schema_plugin: Add missing tests for command, class and topic
commands
https://pagure.io/freeipa/c/973334c9fc247ce6334bcd67f5cd9c3c6b35c660[commit]
https://pagure.io/freeipa/issue/8954[#8954]
* test_schema_plugin: Drop dependency on Tracker
https://pagure.io/freeipa/c/83405a75c2496c8728f9560823738f8ad51cdc33[commit]
https://pagure.io/freeipa/issue/8954[#8954]
* command_defaults: Don't crash on nonexistent command
https://pagure.io/freeipa/c/e4839b048040877cc7d780d2d98b25233db62537[commit]
https://pagure.io/freeipa/issue/8954[#8954]
* schema plugin: Fix commands without metaobject arg
https://pagure.io/freeipa/c/a9f7300732f1be90bfb736a8ec3e5fb58c8ce288[commit]
https://pagure.io/freeipa/issue/8954[#8954]
* ipatests: Log debug messages for locator plugin
https://pagure.io/freeipa/c/12ebc658a8bcde3cf5a9665e10981f822fa00dad[commit]
https://pagure.io/freeipa/issue/8353[#8353]
* krb5: Pin kpasswd server to a primary one
https://pagure.io/freeipa/c/8fcc0f077bc24e0c7d0c7434fbd4e91372021217[commit]
https://pagure.io/freeipa/issue/8353[#8353]
* azure: Ignore tar errors
https://pagure.io/freeipa/c/dfe94640ed8befbf29e3c35f0cb57e702211ef44[commit]
https://pagure.io/freeipa/issue/8983[#8983]
* docs: Make use of `text` highlighting
https://pagure.io/freeipa/c/d1343e8f539679227c8dbfb58ba634810d3857da[commit]
https://pagure.io/freeipa/issue/8985[#8985]
* ipatests: Add tests for `schema` Command
https://pagure.io/freeipa/c/14ad52238543ab845a8d6dadd65ff2fb6e67d8df[commit]
https://pagure.io/freeipa/issue/8955[#8955]
* schema plugin: Generate stable fingerprint
https://pagure.io/freeipa/c/939d0f5df67aa39cd31f68a6da4153460066ca66[commit]
https://pagure.io/freeipa/issue/8955[#8955]
* pycodestyle: Check *.in Python files
https://pagure.io/freeipa/c/31afc004bc034f3170247d4c7ccd3a7cc0d32551[commit]
https://pagure.io/freeipa/issue/8961[#8961]
* Azure: Run pycodestyle check in Lint job
https://pagure.io/freeipa/c/0b359fbdef8174b9f53d4af0770a6a2e72198e3b[commit]
https://pagure.io/freeipa/issue/8961[#8961]

=== Sergey Orlov (2)

* ipatests: use AD domain name from config instead of hardcoded value
https://pagure.io/freeipa/c/b3bee9b52a037b8ae44ceb6c7d40608a352325a7[commit]
* ipatests: check for message in sssd log only during actual test action
https://pagure.io/freeipa/c/e60076690cc02105d4a6abd9afb6aba5dd70b6bd[commit]
https://pagure.io/freeipa/issue/8987[#8987]

=== Sumedh Sidhaye (1)

* Test to verify if the case of a request for
/ca/rest/authority/\{id}/cert (or .../chain)
https://pagure.io/freeipa/c/4c14b8cfddf78d4e792eb944ef1a765a115e3f10[commit]

=== Vit Mojzis (1)

* selinux: Fix file context definition for /var/run
https://pagure.io/freeipa/c/186497cb790a81d43c35659f81fab2eb47ea65cd[commit]





More information about the Freeipa-interest mailing list