Skip to content
Snippets Groups Projects
  1. Mar 17, 2023
    • Rafael Guterres Jeffman's avatar
      ipareplica role: Remove usage of undefined parameters. · e0375295
      Rafael Guterres Jeffman authored
      Some ipareplica role had a few module calls with parameters set like
      'some_argument | default(omit)' that were not actually available in such
      modules. If a user provided 'some_argument', the paramater would then
      be passed to the module and ipareplica deployment would fail.
      
      By removing the parameters from the 'install' task, ipareplica
      deployment works even if the variables are set by the user.
      e0375295
  2. Mar 10, 2023
  3. Mar 08, 2023
  4. Mar 06, 2023
  5. Mar 02, 2023
    • Thomas Woerner's avatar
      Merge pull request #1051 from rjeffman/fedora-spdx · 87afc56e
      Thomas Woerner authored
      Migrated to SPDX license.
      Unverified
      87afc56e
    • Thomas Woerner's avatar
      ipauser: Make return value depending on users parameter · 61caa578
      Thomas Woerner authored
      The way how randompasswords are returned by the ipauser module depends
      so far on the number of users that are handled by the module.
      
      This is unexpected if for example a json file is provided with the users
      parameter. As it might be unknown how many users are in the json file,
      this behaviour is unexpected. The return should not vary in this case.
      
      This chamge makes the return simply depend on the use of the users
      paramater. As soon as this parameter is used, the return will always be:
      
      "user": { "<the user>": { "randompassword": "<the user random password>" } }
      
      In the simply case with one user it will be still
      
      "user": { "randompassword": "<the user random password>" }
      
      Fixes: #1052 (ipauser should consitently return randompasswords when
                    used with users)
      61caa578
  6. Feb 27, 2023
    • Thomas Woerner's avatar
      ipaclient: Defer creating the final krb5.conf on clients · 6b5acd9b
      Thomas Woerner authored
      A temporary krb5 configuration was used to join the domain in
      ipaclient_join. After that the final krkb5 configuration was created
      with enabled DNS discovery and used for the remainaing tasks, where also
      a connection to the IPA API was done.
      
      With several servers the DNS discovery could have picked up a different
      server. If the client deployment was faster than the replication this
      could have lead to an unknown host error.
      
      The issue was seen in performance testing where many simultaneous client
      enrollments have been done..
      
      The goal is to keep server affinity as long as possible within the
      deployment process:
      
      The temporary krb5.conf that was used before in ipaclient_join was
      pulled out into an own module. The generated temporary krb5.conf is now
      used in ipaclient_join and also ipaclient_api.
      
      The generation of the final krb5.conf is moved to the end of the
      deployment process.
      
      Same as: https://pagure.io/freeipa/issue/9228
      
      The setup of certmonger has been pulled out of ipaclient_setup_nss and moved
      to the end of the process after generating the final krb5.conf as it will
      use t will only use /etc/krb5.conf.
      
      Certificate issuance may fail during deployment due to using the final
      krb5.conf, but certmonger will re-try the request in this case.
      
      Same as: https://pagure.io/freeipa/issue/9246
      6b5acd9b
  7. Feb 24, 2023
  8. Feb 22, 2023
  9. Feb 21, 2023
  10. Feb 09, 2023
  11. Feb 08, 2023
    • Thomas Woerner's avatar
      ipaclient: Fix allow_repair with removed krb5.conf and DNS lookup · bfeefaf4
      Thomas Woerner authored
      The test in ipaclient_test_keytab is at first trying to use an existing
      krb5.conf to test if the host keytab can be used. With working DNS lookup
      an absent krb5.conf is not reported as an error as DNS lookup is
      silently used instead.
      
      A temporary krb5.conf is now used in this test that forces to deactivate
      DNS lookups and also to load /etc/krb5.conf. A missing krb5.conf is now
      detected properly as the kinit call fails now properly. Thanks to Julien
      Rische for this proposal.
      
      ipaclient_test_keytab is now properly returning the state of usable or
      not usable krb5.conf in krb5_conf_ok. This fixes the handling of this
      case later on in the role.
      bfeefaf4
  12. Jan 31, 2023
  13. Jan 23, 2023
  14. Jan 19, 2023
  15. Jan 18, 2023
  16. Jan 17, 2023
  17. Jan 16, 2023
Loading