URL: https://github.com/freeipa/freeipa/pull/1886
Author: abbra
Title: #1886: group-del: add a warning to logs when password policy could not be re…
Action: opened
PR body:
"""
…moved
When a user with sufficient permissions creates a group using ipa
group-add and then deletes it again with group-del ipa gives an
Insufficient access error, but still deletes the group.
This is due to a need to remove an associaed password policy for the
group. However, a password policy might be inaccessible to the user
(created by a more powerful admin) and there is no way to check that it
exists with current privileges other than trying to remove it.
Seeing a Python exceptions in the Apache log without explanation is
confusing to many users, so add a warning message that explains what
happens here.
Fixes: https://pagure.io/freeipa/issue/6884
"""
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/1886/head:pr1886
git checkout pr1886
URL: https://github.com/freeipa/freeipa/pull/1606
Author: amitkumar50
Title: #1606: Uninstalling IPA requires on being in a existent working directory
Action: opened
PR body:
"""
Presently freeipa tests current working directory with os.getcwd()
which throws exception when called on non-existant directory.
Solution can be to call
os.chdir("/root") and set self.cwd variable accordingly.
Tests done:
//console-1
`# mkdir test-delete`
`# cd test-delete`
`# rm -rf /root/test-delete //From console-2`
`# ipa-server-install --uninstall`
..successful..
`# cd /root`
`# ipa-server-install`
..successful..
Still need to address installation of ipa-server from deleted dir.
Can handle in seperate PR.
Resolves: https://pagure.io/freeipa/issue/7416
"""
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/1606/head:pr1606
git checkout pr1606
URL: https://github.com/freeipa/freeipa/pull/1805
Author: rcritten
Title: #1805: Handle whitespace, add separator to regex in set_directive_lines
Action: opened
PR body:
"""
We added the separator to the regex in set_directive_lines to avoid
grabbing just a prefix. This doesn't allow for whitespace around
the separator.
For the Apache case we expected that the separator would be just
spaces but it can also use tabs (like Ubuntu 18). Add a special
case so that passing in a space separator is treated as whitespace
(tab or space).
https://pagure.io/freeipa/issue/7490
Signed-off-by: Rob Crittenden <rcritten(a)redhat.com>
"""
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/1805/head:pr1805
git checkout pr1805
URL: https://github.com/freeipa/freeipa/pull/1888
Author: tiran
Title: #1888: Load certificate files as binary data
Action: opened
PR body:
"""
In Python 3, cryptography requires certificate data to be binary. Even
PEM encoded files are treated as binary content.
certmap-match and cert-find were loading certificates as text files. A
new BinaryFile type loads files as binary content.
Fixes: https://pagure.io/freeipa/issue/7520
Signed-off-by: Christian Heimes <cheimes(a)redhat.com>
Reviewed-By: Stanislav Laznicka <slaznick(a)redhat.com>
Reviewed-By: Florence Blanc-Renaud <frenaud(a)redhat.com>
"""
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/1888/head:pr1888
git checkout pr1888
URL: https://github.com/freeipa/freeipa/pull/1867
Author: tiran
Title: #1867: Load certificate files as binary data
Action: opened
PR body:
"""
In Python 3, cryptography requires certificate data to be binary. Even
PEM encoded files are treated as binary content.
certmap-match and cert-find were loading certificates as text files. A
new BinaryFile type loads files as binary content.
Fixes: https://pagure.io/freeipa/issue/7520
Signed-off-by: Christian Heimes <cheimes(a)redhat.com>
"""
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/1867/head:pr1867
git checkout pr1867