URL: https://github.com/freeipa/bind-dyndb-ldap/pull/6
Title: #6: handle termination of syncrepl watcher thread
pspacek commented:
"""
We are almost there. Just minor changes will make it perfect :-)
"""
See the full comment at
https://github.com/freeipa/bind-dyndb-ldap/pull/6#issuecomment-268
I'm looking for an option - eventually to extend standard ssh - in such a way
that I need (at least) two people/keys out of m possible to authenticate a
session instead of one out of m known once...
e.g: to authenticate to server X: we need user a AND (user b OR c)
anyone seen this or know how
URL: https://github.com/freeipa/freeipa/pull/354
Title: #354: Fix DL1 replica installation in CA-less topology
Label: +ack
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Con
Hi Sumit and Jan,
thanks to both of you for providing detailed comments. Please find
answers inline.
On 12/19/2016 12:13 PM, Sumit Bose wrote:
On Mon, Dec 19, 2016 at 10:02:58AM +0100, Jan Cholasta wrote:
I agree with *almost* everything Sumit said. See my inline comments below.
On 16.12.20
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/6
Author: tomaskrizek
Title: #6: handle termination of syncrepl watcher thread
Action: synchronized
To pull the PR as Git branch:
git remote add ghbind-dyndb-ldap https://github.com/freeipa/bind-dyndb-ldap
git fetch ghbind-dyndb-ldap pull/6/
URL: https://github.com/freeipa/freeipa/pull/354
Title: #354: Fix DL1 replica installation in CA-less topology
Label: +pushed
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/
URL: https://github.com/freeipa/freeipa/pull/354
Title: #354: Fix DL1 replica installation in CA-less topology
martbab commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/4028ad73e74fe62bd4871e842dbb69ff660125f9
"""
See the full comment at
https://github.com/freeip
URL: https://github.com/freeipa/freeipa/pull/354
Author: frasertweedale
Title: #354: Fix DL1 replica installation in CA-less topology
Action: closed
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/354/head:pr354
git checkout pr
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/6
Title: #6: handle termination of syncrepl watcher thread
tbordaz commented:
"""
The patch looks good to me. ACK
"""
See the full comment at
https://github.com/freeipa/bind-dyndb-ldap/pull/6#issuecomment-268201031
--
Manage your subscripti
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/6
Title: #6: handle termination of syncrepl watcher thread
Label: +ack
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Co
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/6
Author: tomaskrizek
Title: #6: handle termination of syncrepl watcher thread
Action: synchronized
To pull the PR as Git branch:
git remote add ghbind-dyndb-ldap https://github.com/freeipa/bind-dyndb-ldap
git fetch ghbind-dyndb-ldap pull/6/
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/6
Author: tomaskrizek
Title: #6: handle termination of syncrepl watcher thread
Action: closed
To pull the PR as Git branch:
git remote add ghbind-dyndb-ldap https://github.com/freeipa/bind-dyndb-ldap
git fetch ghbind-dyndb-ldap pull/6/head:p
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/6
Title: #6: handle termination of syncrepl watcher thread
tomaskrizek commented:
"""
Fixed upstream:
[edd8c0552eb7e977a961c9492eb18c177685e438](https://git.fedorahosted.org/cgit/bind-dyndb-ldap.git/commit/?id=edd8c0552eb7e977a961c9492eb18c17
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/5
Title: #5: Add GDB pretty-printers for plugin data structures to contrib.
tomaskrizek commented:
"""
Seems like a good addition for debugging, thanks!
"""
See the full comment at
https://github.com/freeipa/bind-dyndb-ldap/pull/5#issuecomme
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/5
Title: #5: Add GDB pretty-printers for plugin data structures to contrib.
Label: +ack
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.fr
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/6
Title: #6: handle termination of syncrepl watcher thread
Label: +pushed
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/5
Title: #5: Add GDB pretty-printers for plugin data structures to contrib.
Label: +pushed
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/5
Title: #5: Add GDB pretty-printers for plugin data structures to contrib.
tomaskrizek commented:
"""
Fixed upstream:
[0f9c9584a697147a2c56858acf5dec07ed8365bc](https://git.fedorahosted.org/cgit/bind-dyndb-ldap.git/commit/?id=0f9c9584a697147
URL: https://github.com/freeipa/bind-dyndb-ldap/pull/5
Author: pspacek
Title: #5: Add GDB pretty-printers for plugin data structures to contrib.
Action: closed
To pull the PR as Git branch:
git remote add ghbind-dyndb-ldap https://github.com/freeipa/bind-dyndb-ldap
git fetch ghbind-dyndb-ldap
URL: https://github.com/freeipa/freeipa/pull/355
Author: frasertweedale
Title: #355: Set up DS TLS on replica in CA-less topology
Action: opened
PR body:
"""
Fixes: https://fedorahosted.org/freeipa/ticket/6226
"""
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freei
URL: https://github.com/freeipa/freeipa/pull/356
Author: jcholast
Title: #356: server install: fix KRA agent PEM file not being created
Action: opened
PR body:
"""
In commit 822e1bc82af3a6c1556546c4fbe96eeafad45762 the call to create the
KRA agent PEM file was accidentally removed from the ser
URL: https://github.com/freeipa/freeipa/pull/355
Title: #355: Set up DS TLS on replica in CA-less topology
jcholast commented:
"""
This is basically the same as 89de60c5d8ba64d619101a7498b8c4469b6e50ae which
had to be reverted because it is not the proper fix.
I would rather wait for the prope
URL: https://github.com/freeipa/freeipa/pull/139
Author: pvomacka
Title: #139: WebUI: Vault Management
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/139/head:pr139
git checkout pr139
From 2364407f3b7a26e0
URL: https://github.com/freeipa/freeipa/pull/299
Title: #299: Remove "Request Certificate with SubjectAltName" permission
martbab commented:
"""
Bumping this PR as it seems a bit forgotten.
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/299#issuecomment-268267300
--
Manag
URL: https://github.com/freeipa/freeipa/pull/347
Title: #347: Improvements in {get|set}_directive functions
martbab commented:
"""
Please see my in-line replies to your in-line comments :).
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/347#issuecomment-268268766
--
Manag
URL: https://github.com/freeipa/freeipa/pull/357
Author: martbab
Title: #357: Travis ci improvements
Action: opened
PR body:
"""
Test PR against my own fork to test Travis CI improvements.
"""
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch
URL: https://github.com/freeipa/freeipa/pull/357
Title: #357: Travis ci improvements
Label: +rejected
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code
URL: https://github.com/freeipa/freeipa/pull/357
Author: martbab
Title: #357: Travis ci improvements
Action: closed
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/357/head:pr357
git checkout pr357
--
Manage your subscription
URL: https://github.com/freeipa/freeipa/pull/139
Title: #139: WebUI: Vault Management
pvomacka commented:
"""
@mbasti-rh Both bugs fixed, thank you.
Back to the difference between My User Vault and User Vault. I forgot to
mention that My User Vault shows only vaults which are created for the
URL: https://github.com/freeipa/freeipa/pull/356
Title: #356: server install: fix KRA agent PEM file not being created
Label: +ack
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/
URL: https://github.com/freeipa/freeipa/pull/356
Title: #356: server install: fix KRA agent PEM file not being created
stlaz commented:
"""
Works as expected.
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/356#issuecomment-26827
--
Manage your subscription for the Fre
URL: https://github.com/freeipa/freeipa/pull/356
Title: #356: server install: fix KRA agent PEM file not being created
Label: +pushed
--
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.o
URL: https://github.com/freeipa/freeipa/pull/356
Author: jcholast
Title: #356: server install: fix KRA agent PEM file not being created
Action: closed
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/356/head:pr356
git checkout
URL: https://github.com/freeipa/freeipa/pull/356
Title: #356: server install: fix KRA agent PEM file not being created
martbab commented:
"""
Fixed upstream
master:
https://fedorahosted.org/freeipa/changeset/998c87af2b7b2c704d34dd27fe99bda495a59e23
"""
See the full comment at
https://github.co
URL: https://github.com/freeipa/freeipa/pull/355
Title: #355: Set up DS TLS on replica in CA-less topology
tomaskrizek commented:
"""
89de60c was reveted because while it fixed this particular use case, it broke
others. IIRC it broke regular replica promotion with CA.
The proper fix is not yet
URL: https://github.com/freeipa/freeipa/pull/358
Author: simo5
Title: #358: Use the tar Posix option for tarballs
Action: opened
PR body:
"""
This is necessary to be able to successfully build archives in
environments controlled by an IPA domain which may have large uidNumbers
for user account
URL: https://github.com/freeipa/freeipa/pull/299
Title: #299: Remove "Request Certificate with SubjectAltName" permission
frasertweedale commented:
"""
On Tue, Dec 20, 2016 at 07:11:08AM -0800, Martin Babinsky wrote:
> Bumping this PR as it seems a bit forgotten.
>
Cheers. Not forgotten, just
URL: https://github.com/freeipa/freeipa/pull/245
Author: frasertweedale
Title: #245: Allow full customisability of IPA CA subject DN
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/245/head:pr245
git checko
URL: https://github.com/freeipa/freeipa/pull/355
Title: #355: Set up DS TLS on replica in CA-less topology
frasertweedale commented:
"""
FWIW, this one does not break CA-ful replica promotion.
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/355#issuecomment-268432611
--
Ma
URL: https://github.com/freeipa/freeipa/pull/245
Author: frasertweedale
Title: #245: Allow full customisability of IPA CA subject DN
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/245/head:pr245
git checko
URL: https://github.com/freeipa/freeipa/pull/299
Author: frasertweedale
Title: #299: Remove "Request Certificate with SubjectAltName" permission
Action: synchronized
To pull the PR as Git branch:
git remote add ghfreeipa https://github.com/freeipa/freeipa
git fetch ghfreeipa pull/299/head:pr29
URL: https://github.com/freeipa/freeipa/pull/299
Title: #299: Remove "Request Certificate with SubjectAltName" permission
frasertweedale commented:
"""
@martbab I don't think this will break migrations from v3; it does not actively
remove the permission from existing deployments, it just doesn'
URL: https://github.com/freeipa/freeipa/pull/298
Title: #298: ipaldap: handle binary encoding option transparently
jcholast commented:
"""
`ipaldap` is not the proper place to handle this - it implements a (almost)
generic LDAP client, not a 389 DS client, and as such should not contain any
38
URL: https://github.com/freeipa/freeipa/pull/358
Title: #358: Use the tar Posix option for tarballs
pspacek commented:
"""
Please add a note *why* it is necessary. Something like "ustar format we used
before could not handle files with > 65535" or so. This will help a lot with
Git archaeology.
URL: https://github.com/freeipa/freeipa/pull/298
Title: #298: ipaldap: handle binary encoding option transparently
frasertweedale commented:
"""
@jcholast I disagree. If `ipaldap` is a generic LDAP client, it should obey
the RFCs and always transfer the relevant attributes (`userCertificate`,
URL: https://github.com/freeipa/freeipa/pull/358
Title: #358: Use the tar Posix option for tarballs
pspacek commented:
"""
CondACK if the message is corrected.
"""
See the full comment at
https://github.com/freeipa/freeipa/pull/358#issuecomment-268457165
--
Manage your subscription for the Fr
URL: https://github.com/freeipa/freeipa/pull/298
Title: #298: ipaldap: handle binary encoding option transparently
frasertweedale commented:
"""
@jcholast I disagree. If `ipaldap` is a generic LDAP client, it should obey
the RFCs and always transfer the relevant attributes (`userCertificate`,
47 matches
Mail list logo