- Oct 05, 2017
-
-
Thomas Woerner authored
-
Thomas Woerner authored
-
Thomas Woerner authored
-
Thomas Woerner authored
The principal is not used and needed in the module, therefore it got removed.
-
- Oct 04, 2017
-
-
Thomas Woerner authored
This is done right ipanss is used as this is failing without the ca.crt file.
-
Thomas Woerner authored
The first validation test of the krb5.keytab is now done using the system krb5.conf file. If this test failed, then the validation will be done with the temporary krb5.conf file. An additionally IPA test has been added. For now this is "ipa ping" as there seems not to be a more comprehensive validation test for proper IPA configuration.
-
Thomas Woerner authored
-
Thomas Woerner authored
create_db is requiring an additional argument for IPA version 4.4.4 still.
-
- Oct 02, 2017
-
-
Thomas Woerner authored
-
Thomas Woerner authored
This will provide information if the ca.crt file exists. This will be needed to be able to decide what needs to be fixed later on.
-
Thomas Woerner authored
-
Thomas Woerner authored
-
Thomas Woerner authored
-
- Sep 25, 2017
-
-
Thomas Woerner authored
ipajoin is not called always and therefore we can no depend on the subject base gathered from the certificate output of the join call.
-
Thomas Woerner authored
The subject base generated in discovery is only a guess and might have been changed by the admin at installation process. Therefore it is needed to get this from the server - done in ipaapi as we are authenticaed there already to use the api.
-
Thomas Woerner authored
The subject base generated in discovery is only a guess and might have been changed by the admin at installation process. Therefore it is needed to get this from the server. subject_base has been added as a new return value. Use subject base form ipaapi in roles/ipaclient/tasks/install.yml instead of guessed value from ipadiscovery.
-
- Sep 21, 2017
-
-
Thomas Woerner authored
It is not possible to restore a missing krb5.keytab using the admin credential. Therefore the only way is to fail in this case.
-
- Sep 19, 2017
-
-
Thomas Woerner authored
-
- Sep 18, 2017
-
-
Thomas Woerner authored
The choined tag is only set if changes have been done with the join. already_joined is set if the ipa-join command is filing with error 13 (already joined). The module is not calling fail_json in this case anymore.
-
Thomas Woerner authored
-
Thomas Woerner authored
mutually_exclusive and required_one_of are only able to check if the parameters are defined, but not if they are set to "".
-
Thomas Woerner authored
Test if the krb5.keytab on the machine is valid and can be used. options: servers: description: The FQDN of the IPA servers to connect to. required: true domain: description: The primary DNS domain of an existing IPA deployment. required: true realm: description: The Kerberos realm of an existing IPA deployment. required: true hostname: description: The hostname of the machine to join (FQDN). required: true kdc: description: The name or address of the host running the KDC. required: true principal: description: The authorized kerberos principal used to join the IPA realm. required: false kinit_attempts: description: Repeat the request for host Kerberos ticket X times. required: false default: 5 returns: krb5_keytab_ok: description: The flag describes if krb5.keytab on the host is usable. returned: always type: bool
-
- Sep 15, 2017
-
-
Thomas Woerner authored
With otp usage the user supplied principal may not be used for join.
-
Florence Blanc-Renaud authored
When ipahost is run to generate an OTP and the host is already existing, the OTP is properly generated but ipa-join will fail if the host is already enrolled (ie when it has a keytab). Add a step calling ipa host-disable to erase OTP and keytab before requesting an OTP.
-
Thomas Woerner authored
Also: Add ipaclient_kinit_attempts default value to roles/ipaclient/defaults/main.yml
-
Thomas Woerner authored
The one_of check was using a tuple instead of a list, the check for principal or keytab has been removed, a new mutually exclusive check for password xor keytab has been added.
-
Thomas Woerner authored
-
Thomas Woerner authored
-
Thomas Woerner authored
-
Thomas Woerner authored
-
Thomas Woerner authored
-
Thomas Woerner authored
For ipa versions prior to 4.5 it is needed to use ipa-client-install script as a source for functions. But the script contains a global finally clause in which the generated ccache file gets removed. Threfore the script is temporarily copied to ipa_client_install.py and the global finally clause gets removed from the copy. All this is done in a temporary directory, which gets removed right after the import has been done.
-
Thomas Woerner authored
-
Thomas Woerner authored
For ipa versions prior to 4.5 it is needed to use ipa-client-install script as a source for functions. But the script contains a global finally clause in which the generated ccache file gets removed. Threfore the script is temporarily copied to ipa_client_install.py and the global finally clause gets removed from the copy. All this is done in a temporary directory, which gets removed right after the import has been done. A Object called options is generated as ipa-client-install and also ipaclient/install/client.py functions are using this object. inspect.argspec is used on configure_krb5_conf to find out if the function requires configure_sssd as an optional argument or in the options object.
-
Thomas Woerner authored
-
Thomas Woerner authored
freeipa 4.4 is the first version that supports all needed functions. Therefore a check has been added to make sure that ipadiscovery fails for versions before 4.4. The python bindings of ipa versions before 4.6 are having a different structure.
-
Thomas Woerner authored
ipa_python_version is the version gathered from ipapython.version.NUM_VERSION. For ipa versions before 3.2.1, the version is generated from ipapython.version.VERSION because NUM_VERSION changed the format two times before 3.2.1.
-
Thomas Woerner authored
-
Thomas Woerner authored
The discovery was not working if a server has been specified. The domain has been needed additionally. The domain is now gathered from the server name if it is missing in this case.
-
Thomas Woerner authored
-