[Freeipa-devel] [PATCH] Fix various typos

2012-09-18 Thread Martin Kosek
ACK for typo fixes made by Yuri Chornoivan (patch attached).

Pushed to master, ipa-3-0.

Martin
From c1b421a6bfdf0d0b2eec8aed409b720c6e1ab783 Mon Sep 17 00:00:00 2001
From: Yuri Chornoivan yurc...@ukr.net
Date: Sun, 16 Sep 2012 19:35:56 +0300
Subject: [PATCH] Fix various typos.

https://fedorahosted.org/freeipa/ticket/3089
---
 install/tools/man/ipa-adtrust-install.1 |2 +-
 install/tools/man/ipa-replica-manage.1  |2 +-
 install/ui/test/data/ipa_init.json  |2 +-
 install/ui/test/data/ipa_init_commands.json |4 ++--
 install/ui/test/ipa_tests.js|4 ++--
 ipa-client/man/default.conf.5   |2 +-
 ipa-client/man/ipa-client-install.1 |2 +-
 ipa-client/man/ipa-getkeytab.1  |2 +-
 ipa-client/man/ipa-join.1   |2 +-
 ipa.1   |2 +-
 ipalib/errors.py|2 +-
 ipalib/plugins/automember.py|2 +-
 ipalib/plugins/dns.py   |6 +++---
 ipalib/plugins/idrange.py   |6 +++---
 ipalib/plugins/internal.py  |2 +-
 ipalib/plugins/sudorule.py  |4 ++--
 ipalib/plugins/trust.py |4 ++--
 ipalib/plugins/user.py  |2 +-
 ipalib/session.py   |4 ++--
 ipapython/log_manager.py|2 +-
 tests/test_xmlrpc/test_attr.py  |2 +-
 21 files changed, 30 insertions(+), 30 deletions(-)

diff --git a/install/tools/man/ipa-adtrust-install.1 b/install/tools/man/ipa-adtrust-install.1
index 936e04c..5303ec2 100644
--- a/install/tools/man/ipa-adtrust-install.1
+++ b/install/tools/man/ipa-adtrust-install.1
@@ -22,7 +22,7 @@ ipa\-adtrust\-install \- Prepare an IPA server to be able to establish trust rel
 .SH SYNOPSIS
 ipa\-adtrust\-install [\fIOPTION\fR]...
 .SH DESCRIPTION
-Adds all necesary objects and configuration to allow an IPA server to create a
+Adds all necessary objects and configuration to allow an IPA server to create a
 trust to an Active Directory domain. This requires that the IPA server is
 already installed and configured.
 .SH OPTIONS
diff --git a/install/tools/man/ipa-replica-manage.1 b/install/tools/man/ipa-replica-manage.1
index 98103ff..2767579 100644
--- a/install/tools/man/ipa-replica-manage.1
+++ b/install/tools/man/ipa-replica-manage.1
@@ -120,7 +120,7 @@ A special user entry is created for the PassSync service. The DN of this entry i
 The following examples use the AD administrator account as the synchronization user. This is not mandatory but the user must have read\-access to the subtree.
 
 .TP
-1. Transfer the base64\-encoded Windows AD CA Certficate to your IPA Server
+1. Transfer the base64\-encoded Windows AD CA Certificate to your IPA Server
 .TP
 2. Remove any existing kerberos credentials
   # kdestroy
diff --git a/install/ui/test/data/ipa_init.json b/install/ui/test/data/ipa_init.json
index 9c158d5..0d94d9b 100644
--- a/install/ui/test/data/ipa_init.json
+++ b/install/ui/test/data/ipa_init.json
@@ -110,7 +110,7 @@
 refresh: Refresh the page.,
 reload: Reload the browser.,
 main_page: Return to the main page and retry the operation,
-title: An error has occured (${error})
+title: An error has occurred (${error})
 },
 errors: {
 error: Error,
diff --git a/install/ui/test/data/ipa_init_commands.json b/install/ui/test/data/ipa_init_commands.json
index 4237cc8..2c128f7 100644
--- a/install/ui/test/data/ipa_init_commands.json
+++ b/install/ui/test/data/ipa_init_commands.json
@@ -16780,9 +16780,9 @@
 },
 {
 class: Password,
-doc: Active directory domain adminstrator's password,
+doc: Active directory domain administrator's password,
 flags: [],
-label: Active directory domain adminstrator's password,
+label: Active directory domain administrator's password,
 name: realm_passwd,
 noextrawhitespace: true,
 type: unicode
diff --git a/install/ui/test/ipa_tests.js b/install/ui/test/ipa_tests.js
index 7a2c18b..478196c 100644
--- a/install/ui/test/ipa_tests.js
+++ b/install/ui/test/ipa_tests.js
@@ -110,7 +110,7 @@ test(Testing successful IPA.command()., function() {
 
 var xhr = {};
 var text_status = null;
-var error_thrown = {name:'ERROR', message:'An error has occured'};
+var error_thrown = {name:'ERROR', message:'An error has occurred'};
 
 var ajax_counter = 0;
 
@@ -186,7 +186,7 @@ test(Testing unsuccessful IPA.command()., function() {
 
 var xhr = {};
 var text_status = null;
-  

[Freeipa-devel] [PATCH] 310 Properly convert DN in ipa-client-install

2012-09-18 Thread Martin Kosek
Pushed to master, ipa-3-0 as a one-liner.

---

ipa-client-install crashed when IPA server anonymous access was
disabled and base DN was thus generated via realm_to_suffix
function which, however, returns a DN object and not string.

DN was converted to string, ipa-client-install no longer crashes
in this scenario.

https://fedorahosted.org/freeipa/ticket/3088

-- 
Martin Kosek mko...@redhat.com
Senior Software Engineer - Identity Management Team
Red Hat Inc.
From 8938d8e564ecfec92326a0415ed41d962185d663 Mon Sep 17 00:00:00 2001
From: Martin Kosek mko...@redhat.com
Date: Tue, 18 Sep 2012 11:07:45 +0200
Subject: [PATCH] Properly convert DN in ipa-client-install

ipa-client-install crashed when IPA server anonymous access was
disabled and base DN was thus generated via realm_to_suffix
function which, however, returns a DN object and not string.

DN was converted to string, ipa-client-install no longer crashes
in this scenario.

https://fedorahosted.org/freeipa/ticket/3088
---
 ipa-client/ipaclient/ipadiscovery.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ipa-client/ipaclient/ipadiscovery.py b/ipa-client/ipaclient/ipadiscovery.py
index f91d4075aeafc71c3951ae094ddf075c143533f7..234e67e9b0f7102b1ee642fb3279793ff631ff9d 100644
--- a/ipa-client/ipaclient/ipadiscovery.py
+++ b/ipa-client/ipaclient/ipadiscovery.py
@@ -249,7 +249,7 @@ class IPADiscovery(object):
 
 if not ldapaccess and self.basedn is None:
 # Generate suffix from realm
-self.basedn = realm_to_suffix(self.realm)
+self.basedn = str(realm_to_suffix(self.realm))
 self.basedn_source = 'Generated from Kerberos realm'
 root_logger.debug(Generated basedn from realm: %s % self.basedn)
 
-- 
1.7.11.4

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Re: [Freeipa-devel] [PATCH 0006] Improves sssd.conf handling during ipa-client uninstall

2012-09-18 Thread Tomas Babej

On 09/12/2012 05:29 PM, Martin Kosek wrote:

On 08/29/2012 02:54 PM, Tomas Babej wrote:

On 08/27/2012 04:55 PM, Martin Kosek wrote:

On 08/27/2012 03:37 PM, Jakub Hrozek wrote:

On Mon, Aug 27, 2012 at 02:57:44PM +0200, Martin Kosek wrote:

I think that the right behavior of SSSD conf uninstall should be the
following:

* sssd.conf existed before IPA install + non-IPA domains in sssd.conf found:
- move backed conf up sssd.conf.bkp (and inform the user)
- use SSSDConfig delete_domain function to remove ipa domain from sssd.conf
- restart sssd afterwards

I'm confused here, which of the files is the original
pre-ipa-client-install file?

This is the backed up sssd.conf. I thought that it may be useful for user to
still have an access to it after uninstall.


How does the non-ipa domain end up in the sssd.conf file? Does it have
to be configured manually or does ipa-client-install merge the list of
domains on installation?

ipa-client-install merge the list of the domains. It overrides the old
sssd.conf only when we cannot parse the sssd.conf and --preserve-sssd option
was not set.

Martin

Hi,

The sssd.conf file is no longer left behind in case sssd was not
configured before the installation. However, the patch goes behind
the scope of this ticked and improves the handling of sssd.conf
during the ipa-client-install --uninstall in general.

The current behaviour (well documented in source code) is as follows:
   - In general, the IPA domain is simply removed from the sssd.conf
 file, instead of sssd.conf being rewritten from the backup. This
 preserves any domains added after installation.

   - If sssd.conf existed before the installation, it is restored to
 sssd.conf.bkp. However, any IPA domains from pre-installation
 sssd.conf should have been merged during the installation.

   - If sssd.conf did not exist before the installation, and no other
 domains than IPA domain exist in it, the patch makes sure that
 sssd.conf is moved to sssd.conf.deleted so user experiences no
 crash during any next installation due to its existence.

https://fedorahosted.org/freeipa/ticket/2740

Tomas


Good job, SSSD uninstall process now looks more consistent and better
documented. I just found the following (mainly minor) issues. Comments in the
patch:

diff --git a/ipa-client/ipa-install/ipa-client-install
b/ipa-client/ipa-install/ipa-client-install
index
2e65921e8de2dfe68443f5b5875954d71dd48ed2..c5cef15e1fb3a3e1d7cfd070f4288d3839accfc8
100755
--- a/ipa-client/ipa-install/ipa-client-install
+++ b/ipa-client/ipa-install/ipa-client-install
@@ -183,6 +183,36 @@ def nssldap_exists():

  return (retval, files_found)

+# helper function for uninstall
+# deletes IPA domain from sssd.conf
+def delete_IPA_domain():

Function names should be lowercase - delete_ipa_domain

+sssd = ipaservices.service('sssd')
+try:
+sssdconfig = SSSDConfig.SSSDConfig()
+sssdconfig.import_config()
+domains = sssdconfig.list_active_domains()
+
+IPA_domain_name = None

Variables should be lowercase - ipa_domain_name

+
+for name in domains:
+domain = sssdconfig.get_domain(name)
+try:
+provider = domain.get_option('id_provider')
+if provider == ipa:
+IPA_domain_name = name
+break
+except SSSDConfig.NoOptionError:
+continue
+
+if IPA_domain_name != None:

Do not use != with None, True, False - use is not None.

+sssdconfig.delete_domain(IPA_domain_name)
+sssdconfig.write()
+else:
+root_logger.warning(IPA domain could not be found in  +
+sssd.conf and therefore not deleted)
+except IOError:
+root_logger.warning(IPA domain could not be deleted. No access to the
sssd.conf file.)

There should be full path to sssd.conf in this error message. It is very useful
sometimes.

+
  def uninstall(options, env):

  if not fstore.has_files():
@@ -212,7 +242,12 @@ def uninstall(options, env):
  sssdconfig = SSSDConfig.SSSDConfig()
  sssdconfig.import_config()
  domains = sssdconfig.list_active_domains()
-if len(domains)  1:
+all_domains = sssdconfig.list_domains()
+
+# we consider all the domains, because handling sssd.conf
+# during uninstall is dependant on was_sssd_configured flag
+# so the user does not lose info about inactive domains
+if len(all_domains)  1:
  # There was more than IPA domain configured
  was_sssd_configured = True
  for name in domains:
@@ -349,6 +384,62 @@ def uninstall(options, env):
  Failed to remove krb5/LDAP configuration: %s, str(e))
  return CLIENT_INSTALL_ERROR

+# Next if-elif-elif construction deals with sssd.conf file.
+# Old pre-IPA domains are preserved due merging the old sssd.conf
+# 

Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Sumit Bose
On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:
 Hi,
 
 Following patch adds trust verification sequence to the case when we
 establish trust with knowledge of AD administrative credentials.
 
 As we found out, in order to validate/verify trust, one has to have
 administrative credentials for the trusted domain, since there are
 few RPCs that should be performed against trusted domain's DC's LSA
 and NetLogon pipes and these are protected by administrative credentials.
 
 Thus, when we know admin credentials for the remote domain, we can
 perform the trust validation.
 
 https://fedorahosted.org/freeipa/ticket/2763
 

Just a short feedback. The patch is working as expected, for a newly
created trust Windows will send a TGS request to the IPA KDC without
explicit validation on the windows side. Currently I have some issues
in my test setup so that I can not give a full ACK atm. 

bye,
Sumit

 
 -- 
 / Alexander Bokovoy

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 0077 Check direct/reverse hostname/address resolution in ipa-replica-install

2012-09-18 Thread Petr Viktorin

On 09/17/2012 08:10 PM, Rob Crittenden wrote:

Petr Viktorin wrote:

On 09/14/2012 08:46 AM, Martin Kosek wrote:

On 09/13/2012 10:35 PM, Rob Crittenden wrote:

Petr Viktorin wrote:

On 09/11/2012 11:05 PM, Rob Crittenden wrote:

Petr Viktorin wrote:

On 09/04/2012 07:44 PM, Rob Crittenden wrote:

Petr Viktorin wrote:


https://fedorahosted.org/freeipa/ticket/2845


Shouldn't this also call verify_fqdn() on the local hostname and
not
just the master? I think this would eventually fail in the
conncheck
but
what if that was skipped?

rob


A few lines above there is a call to get_host_name, which will call
verify_fqdn.



I double-checked this, it fails in conncheck. Here are my steps:

# ipa-server-install --setup-dns
# ipa-replica-prepare replica.example.com --ip-address=192.168.100.2
# ipa host-del replica.example.com

On replica, set DNS to IPA master, with hostname in /etc/hosts.

# ipa-replica-install ...

The verify_fqdn() passes because the resolver uses /etc/hosts.

The conncheck fails:

Execute check on remote master
Check connection from master to remote replica 'replica.example.com':

Remote master check failed with following error message(s):
Could not chdir to home directory /home/admin: No such file or
directory
Port check failed! Unable to resolve host name 'replica.example.com'

Connection check failed!
Please fix your network settings according to error messages above.
If the check results are not valid it can be skipped with
--skip-conncheck parameter.

The DNS test happens much further after this, and I get why, I just
don't see how useful it is unless the --skip-conncheck is used.


For the record, it's because we need to check if the host has DNS
installed. We need a LDAP connection to check this.


ipa-replica-install ~rcrit/replica-info-replica.example.com.gpg
--skip-conncheck
Directory Manager (existing master) password:

ipa : ERRORCould not resolve hostname replica.example.com
using DNS. Clients may not function properly. Please check your DNS
setup. (Note that this check queries IPA DNS directly and ignores
/etc/hosts.)
Continue? [no]:

So I guess, what are the intentions here? It is certainly better than
before.

rob


If the replica is in the master's /etc/hosts, but not in DNS, the
conncheck will succeed. This check explicitly queries IPA records only
and ignores /etc/hosts so it'll notice this case and warn.



Ok, like I said, this is better than we have. Just one nit then you
get an ack:

+# If remote host has DNS, check forward/reverse resolution
+try:
+entry = conn.find_entries(u'cn=dns',
base_dn=DN(api.env.basedn))
+except errors.NotFound:

u'cn=dns' should be str(constants.container_dns).

rob


This is a search filter, Petr could use the one I already have in
dns.py::get_dns_masters() function:
'((objectClass=ipaConfigObject)(cn=DNS))'

For performance sake, I would also not search in the entire tree, but
limit the
search only to:

DN(('cn', 'masters'), ('cn', 'ipa'), ('cn', 'etc'), api.env.basedn)

Martin



Attaching updated patch with Martin's suggestions.


I think what Martin had in mind was:

if api.Object.dnsrecord.get_dns_masters():
 ...



I didn't want to do this because api.Object.* use our global ldap2 
Backend, which is hardwired to query localhost.
I see now that I can hack around this, and we already do this in 
ipa-replica-install.

I've extracted the hack and reused it to get the DNS masters.


--
Petr³
From 5e22359342091c60717f65dae1f2a0be2df8cce8 Mon Sep 17 00:00:00 2001
From: Petr Viktorin pvikt...@redhat.com
Date: Tue, 4 Sep 2012 03:47:43 -0400
Subject: [PATCH] Check direct/reverse hostname/address resolution in
 ipa-replica-install

Forward and reverse resolution of the newly created replica is already
checked via get_host_name (which calls verify_fqdn).
Add the same check for the existing master.

Additionally, if DNS is installed on the remote host, check forward
and reverse resolution of both replicas using that DNS only
(ignoring /etc/hosts). These checks give only warnings and, in interactive
installs, a Continue? prompt.

https://fedorahosted.org/freeipa/ticket/2845
---
 install/tools/ipa-replica-install | 156 +-
 1 file changed, 138 insertions(+), 18 deletions(-)

diff --git a/install/tools/ipa-replica-install b/install/tools/ipa-replica-install
index 267a70d8b60d96de9a9bde83b15c81ae59da1a96..0e338e3d93c2360a46ac23b181eef124e9759808 100755
--- a/install/tools/ipa-replica-install
+++ b/install/tools/ipa-replica-install
@@ -24,6 +24,11 @@ import socket
 import os, pwd, shutil
 import grp
 from optparse import OptionGroup
+from contextlib import contextmanager
+
+import dns.resolver
+import dns.reversename
+import dns.exception
 
 from ipapython import ipautil
 
@@ -47,6 +52,7 @@ from ipapython.dn import DN
 log_file_name = /var/log/ipareplica-install.log
 CACERT = /etc/ipa/ca.crt
 REPLICA_INFO_TOP_DIR = None
+DIRMAN_DN = DN(('cn', 'directory manager'))
 
 

Re: [Freeipa-devel] [PATCH] 212 Fix integer validation when boundary value is empty string

2012-09-18 Thread Petr Vobornik

On 09/18/2012 04:45 AM, Endi Sukma Dewata wrote:

On 9/11/2012 10:09 AM, Petr Vobornik wrote:

There was an error in number validation check. If boundary value was an
empty string, validation of a number always failed. This patch fixes the
problem by not performing the check in these cases.

Basic unit tests for IPA.metadata_validator created.


ACK. Some comments:


Updated patch attached.



1. Instead of IPA.not_defined() it might be better to call it
IPA.defined() to avoid double negations like this:

   if (!IPA.not_defined(metadata.minvalue, true) ...



Function renamed, logic negated. Unit tests for IPA.defined added.


2. The check_empty_str probably could made optional and the value would
be true by default. It will make the code cleaner.



I wanted the function to be more general - used somewhere else in a 
future. In general, I consider empty string as a defined value so for me 
'false' is a good default value of the argument. I agree that in this 
case it would look cleaner.

--
Petr Vobornik
From e094a7d317a57b841c5454de635df6a01944d100 Mon Sep 17 00:00:00 2001
From: Petr Vobornik pvobo...@redhat.com
Date: Tue, 11 Sep 2012 13:52:10 +0200
Subject: [PATCH] Fix integer validation when boundary value is empty string

There was an error in number validation check. If boundary value was an empty string, validation of a number always failed. This patch fixes the problem by not performing the check in these cases.
---
 install/ui/field.js  |   4 +-
 install/ui/ipa.js|   5 ++
 install/ui/test/all_tests.html   |   1 +
 install/ui/test/index.html   |   1 +
 install/ui/test/jsl.conf |   3 +-
 install/ui/test/utils_tests.html |  24 +++
 install/ui/test/utils_tests.js   | 136 +++
 7 files changed, 171 insertions(+), 3 deletions(-)
 create mode 100644 install/ui/test/utils_tests.html
 create mode 100644 install/ui/test/utils_tests.js

diff --git a/install/ui/field.js b/install/ui/field.js
index 42da6f92cd102aa665b05b72783de9d04dcdcfb0..c5c999e685500765f09af084531def144bbbd10b 100644
--- a/install/ui/field.js
+++ b/install/ui/field.js
@@ -448,13 +448,13 @@ IPA.metadata_validator = function(spec) {
 
 if (number) {
 
-if (metadata.minvalue !== undefined  Number(value)  Number(metadata.minvalue)) {
+if (IPA.defined(metadata.minvalue, true)  Number(value)  Number(metadata.minvalue)) {
 message = IPA.messages.widget.validation.min_value;
 message = message.replace('${value}', metadata.minvalue);
 return that.false_result(message);
 }
 
-if (metadata.maxvalue !== undefined  Number(value)  Number(metadata.maxvalue)) {
+if (IPA.defined(metadata.maxvalue, true)  Number(value)  Number(metadata.maxvalue)) {
 message = IPA.messages.widget.validation.max_value;
 message = message.replace('${value}', metadata.maxvalue);
 return that.false_result(message);
diff --git a/install/ui/ipa.js b/install/ui/ipa.js
index 23c9933dfb97cb39a932f78d235fdaf844e42b7c..9b5c9aacf87804372cac369e44f7f392e16f3a25 100644
--- a/install/ui/ipa.js
+++ b/install/ui/ipa.js
@@ -2021,6 +2021,11 @@ IPA.is_empty = function(value) {
 return empty;
 };
 
+IPA.defined = function(value, check_empty_str) {
+return value !== null  value !== undefined 
+((check_empty_str  value !== '') || !check_empty_str);
+};
+
 IPA.array_diff = function(a, b) {
 
 if (a === b || (!a  !b)) return false;
diff --git a/install/ui/test/all_tests.html b/install/ui/test/all_tests.html
index 5a5eae54b5c6606564fd0e7b2df8ccc606dccef2..e9061b6ca8802b83c8f99c234ad7311606672695 100644
--- a/install/ui/test/all_tests.html
+++ b/install/ui/test/all_tests.html
@@ -32,6 +32,7 @@
 script type=text/javascript src=aci_tests.js/script
 script type=text/javascript src=widget_tests.js/script
 script type=text/javascript src=ip_tests.js/script
+script type=text/javascript src=utils_tests.js/script
 /head
 body
 h1 id=qunit-headerComplete Test Suite/h1
diff --git a/install/ui/test/index.html b/install/ui/test/index.html
index 1b623d40f794b1ffda90f6c3352840acbaeec26a..0a135188e518913aa3f3a191ab340f2f5e820abf 100644
--- a/install/ui/test/index.html
+++ b/install/ui/test/index.html
@@ -34,6 +34,7 @@
 lia href=aci_tests.htmlAccess Control Interface Test Suite/a
 lia href=widget_tests.htmlWidget Test Suite/a
 lia href=ip_tests.htmlIP Addresses Test Suite/a
+lia href=utils_tests.htmlUtils Test Suite/a
 /ul
 /div
 
diff --git a/install/ui/test/jsl.conf b/install/ui/test/jsl.conf
index 4654b714f91cb00696043bf3042fccd2b2e394bc..768a295f1ac7c956f588b99c60eecdb2bfb06c67 100644
--- a/install/ui/test/jsl.conf
+++ b/install/ui/test/jsl.conf
@@ -146,4 +146,5 @@
 +process ipa_tests.js
 +process ordered_map_tests.js
 +process widget_tests.js
-+process ip_tests.js
\ No newline at end of 

Re: [Freeipa-devel] [PATCH] 214 Fix jquery error when using '??' in a pkey

2012-09-18 Thread Petr Vobornik

On 09/18/2012 04:45 AM, Endi Sukma Dewata wrote:

On 9/14/2012 8:00 AM, Petr Vobornik wrote:

This patch is only for FreeIPA 2.2. It is already fixed in 3.0.

If '??' is used in a adder dialog as a pkey it can cause
jQuery15208158273949015573_1346241267446 was not called error.

Update of jquery library fixes the issue. Update reveals an incorrect
handler definition issue in ssh_key_widget, which is also fixed.

https://bugzilla.redhat.com/show_bug.cgi?id=855278
https://fedorahosted.org/freeipa/ticket/3073


ACK.


Pushed to ipa-2-2

--
Petr Vobornik

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 0079 Update the pot file (translation source)

2012-09-18 Thread Petr Viktorin

On 09/17/2012 07:59 PM, Jérôme Fenal wrote:

2012/9/17 Petr Viktorin pvikt...@redhat.com mailto:pvikt...@redhat.com

On 09/14/2012 09:36 PM, Jérôme Fenal wrote:

2012/9/14 Petr Viktorin pvikt...@redhat.com
mailto:pvikt...@redhat.com mailto:pvikt...@redhat.com
mailto:pvikt...@redhat.com


 I pushed the pot manually.
 Since we have infrequent explicit string freezes I don't
think it's
 necessary to configure automatic pot updates again.


Thanks Petr!

Actually, having the strings updated on Transifex on a regular basis
makes it (IMHO) more manageable for translators to update the
translations even before a string freeze. Translating a dozen
strings
per week is lighter than a mere 339 strings.


A possible problem with this approach is that the translators would
see and translate messages that don't make it into the final
version. Do you think a more even workload would be worth the
occasional extra work?


Having some extra work from time to time is OK. Having a huge batch of
strings to translate on a deadline is uneasy. Especially with day job
ramping up... ;-)

I would like to change our i18n workflow/infrastructure. I was
planning to (re-)start discussing this after the 3.0 release rush is
done. It should be possible to do what you suggest.


Cool, thanks.

I also don't know if pulls from Transifex or push from your side
has an
effect of keeping memory (in suggestions) of past or close enough
strings from the past for small modifications.


Sadly, I don't know much about Transifex itself. Perhaps ask the
team there, and request the feature if it's missing.


This item is not that important, more a wish.

Another comment/request, I don't know given my zero-level Python-fu:
would it be possible to break down the huge __doc__ strings in
plugins
into smaller parts, as a small modification would impact a smaller
strings, easing maintenance instead of trying to track the one
character
modification in a 2000 chars text.

Does Python support concatenations of __doc___ strings?


That is be possible on the Python side. I'm not sure how Transifex
(and other translation tools) would cope with text split between
several messages -- sorting and filtering the messages could take
things out of context.


I'm aware of this issue, translators for others languages may raise
their hands. I could also probe trans@fp.o on that matter, to reach all
of them.


If the answer is not in a FAQ somewhere, that would be nice.

I have a feeling that the communication between developers and 
translators could be better. It seems like many translators think 
they're given the strings on a silver platter and have to deal with 
what's there, and the developers don't really know the translators' needs.


Thanks for reaching out! We want to help (though changes may be slow, 
and won't happen during a string freeze), and definitely appreciate 
these comments so we can better plan for the future.



That will nevertheless make changes more atomic, and overall easier to
manage on the longer term. In the past, changes were just a matter of
adding one paragraph, or adding one more usage example. Or fixing a
typo. Which is way harder to spot when you have a 1000 chars strings
tagged as changed.


Ideally Transifex would show the difference between the old and the new. 
Unfortunately the data's not there to do this automatically :(



For typos, there should be a way to leave the old translations unchanged 
(since the translations won't have the typo).
Gettext has the fuzzy feature for this, but it has problems so it's 
turned off for IPA. I'll quote John here (apologies for posting private 
conversation):


 Never use fuzzy entries. The logic used to select a fuzzy entry is
 poor, it often picks up entirely wrong translations, they are evil.
 We've had way too many problems with message catalogs getting
 corrupted due to the introduction of fuzzy entries. Given that fuzzy
 entries are so seldom correct and are mostly of value to translators
 and that translators have a lazy habit of just accepting the
 incorrect fuzzy suggestion and promoting to a full translation they
 should not be used at all. I've spent days in the past trying to
 unwind corrupted files due to the incorrect application of fuzzy
 translations. I really don't want to do that again :-)

Gettext was designed for delayed communication -- the translators would 
download the file, work for a few weeks, then mail the result back.
There could be various versions of POT and PO files floating around. The 
metadata and logic, including the fuzzy system, was built around that.
With Transifex, there's one version of everything, and we have access to 
the translations as they're written. There might be ways to exploit this 

Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Sumit Bose
On Tue, Sep 18, 2012 at 12:42:49PM +0200, Sumit Bose wrote:
 On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:
  Hi,
  
  Following patch adds trust verification sequence to the case when we
  establish trust with knowledge of AD administrative credentials.
  
  As we found out, in order to validate/verify trust, one has to have
  administrative credentials for the trusted domain, since there are
  few RPCs that should be performed against trusted domain's DC's LSA
  and NetLogon pipes and these are protected by administrative credentials.
  
  Thus, when we know admin credentials for the remote domain, we can
  perform the trust validation.
  
  https://fedorahosted.org/freeipa/ticket/2763
  
 
 Just a short feedback. The patch is working as expected, for a newly
 created trust Windows will send a TGS request to the IPA KDC without
 explicit validation on the windows side. Currently I have some issues
 in my test setup so that I can not give a full ACK atm. 
 

ok, ACK.

Nevertheless it would be nice if Petr can check for any implications to
the web UI with respect to the status of the trust.

bye,
Sumit

 bye,
 Sumit
 
  
  -- 
  / Alexander Bokovoy
 
 ___
 Freeipa-devel mailing list
 Freeipa-devel@redhat.com
 https://www.redhat.com/mailman/listinfo/freeipa-devel

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Petr Vobornik

On 09/18/2012 02:15 PM, Sumit Bose wrote:

On Tue, Sep 18, 2012 at 12:42:49PM +0200, Sumit Bose wrote:

On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:

Hi,

Following patch adds trust verification sequence to the case when we
establish trust with knowledge of AD administrative credentials.

As we found out, in order to validate/verify trust, one has to have
administrative credentials for the trusted domain, since there are
few RPCs that should be performed against trusted domain's DC's LSA
and NetLogon pipes and these are protected by administrative credentials.

Thus, when we know admin credentials for the remote domain, we can
perform the trust validation.

https://fedorahosted.org/freeipa/ticket/2763



Just a short feedback. The patch is working as expected, for a newly
created trust Windows will send a TGS request to the IPA KDC without
explicit validation on the windows side. Currently I have some issues
in my test setup so that I can not give a full ACK atm.



ok, ACK.

Nevertheless it would be nice if Petr can check for any implications to
the web UI with respect to the status of the trust.


It shouldn't break Web UI but Web UI won't use it. In add command Web UI 
uses only the command state (success/error). If the truststatus text 
would be a part of command summary text, it can be displayed in 
notification message (which fades after 3s) when comment 8 of 
https://fedorahosted.org/freeipa/ticket/2977#comment:8 is implemented.


It would be nice if it can be saved to ldap and return in show/find 
commands? That way we can show it in search or details page. Or we can 
implement trust-status $TRUST --admin $ADMIN --$password $PASSWORD 
command to check the actual status anytime in a future.




bye,
Sumit


bye,
Sumit



--
/ Alexander Bokovoy


___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel




--
Petr Vobornik

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Alexander Bokovoy

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 02:15 PM, Sumit Bose wrote:

On Tue, Sep 18, 2012 at 12:42:49PM +0200, Sumit Bose wrote:

On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:

Hi,

Following patch adds trust verification sequence to the case when we
establish trust with knowledge of AD administrative credentials.

As we found out, in order to validate/verify trust, one has to have
administrative credentials for the trusted domain, since there are
few RPCs that should be performed against trusted domain's DC's LSA
and NetLogon pipes and these are protected by administrative credentials.

Thus, when we know admin credentials for the remote domain, we can
perform the trust validation.

https://fedorahosted.org/freeipa/ticket/2763



Just a short feedback. The patch is working as expected, for a newly
created trust Windows will send a TGS request to the IPA KDC without
explicit validation on the windows side. Currently I have some issues
in my test setup so that I can not give a full ACK atm.



ok, ACK.

Nevertheless it would be nice if Petr can check for any implications to
the web UI with respect to the status of the trust.


It shouldn't break Web UI but Web UI won't use it. In add command Web 
UI uses only the command state (success/error). If the truststatus 
text would be a part of command summary text, it can be displayed in 
notification message (which fades after 3s) when comment 8 of 
https://fedorahosted.org/freeipa/ticket/2977#comment:8 is 
implemented.

It is displayed as part of the output, truststatus property:
# ipa trust-add --type=ad --admin Administrator@ad.local --password ad.local
Active directory domain adminstrator's password: 
-

Added Active Directory trust for realm ad.local
-
  Realm name: ad.local
  Domain NetBIOS name: AD
  Domain Security Identifier: S-1-5-21-16904141-148189700-2149043814
  Trust direction: Two-way trust
  Trust type: Active Directory domain
  Trust status: Established and verified

Would be good if you could take it in use.
It would be nice if it can be saved to ldap and return in show/find 
commands? That way we can show it in search or details page. Or we 
can implement trust-status $TRUST --admin $ADMIN --$password 
$PASSWORD command to check the actual status anytime in a future.

We don't have an attribute to store the status. Neither it exists in Windows.

I'll talk to Simo if we can have one attribute like that but the price
of maintaining it up to date might be too much. On the other hand, we
can always invalidate value in the attribute when ipasam cannot use
shared trust account against trusted domain...

Running validation/verification as a separate command is possible but it
would be relatively resource-hungry and makes little use on its own. 
We may couple it together with future multiple suffixes support (tickets

#2848, #2593) as fetching additional suffixes depends on validated trust
relationship.

--
/ Alexander Bokovoy

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Petr Vobornik

On 09/18/2012 03:22 PM, Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 02:15 PM, Sumit Bose wrote:

On Tue, Sep 18, 2012 at 12:42:49PM +0200, Sumit Bose wrote:

On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:

Hi,

Following patch adds trust verification sequence to the case when we
establish trust with knowledge of AD administrative credentials.

As we found out, in order to validate/verify trust, one has to have
administrative credentials for the trusted domain, since there are
few RPCs that should be performed against trusted domain's DC's LSA
and NetLogon pipes and these are protected by administrative
credentials.

Thus, when we know admin credentials for the remote domain, we can
perform the trust validation.

https://fedorahosted.org/freeipa/ticket/2763



Just a short feedback. The patch is working as expected, for a newly
created trust Windows will send a TGS request to the IPA KDC without
explicit validation on the windows side. Currently I have some issues
in my test setup so that I can not give a full ACK atm.



ok, ACK.

Nevertheless it would be nice if Petr can check for any implications to
the web UI with respect to the status of the trust.


It shouldn't break Web UI but Web UI won't use it. In add command Web
UI uses only the command state (success/error). If the truststatus
text would be a part of command summary text, it can be displayed in
notification message (which fades after 3s) when comment 8 of
https://fedorahosted.org/freeipa/ticket/2977#comment:8 is implemented.

It is displayed as part of the output, truststatus property:
# ipa trust-add --type=ad --admin Administrator@ad.local --password
ad.local
Active directory domain adminstrator's password:
-
Added Active Directory trust for realm ad.local
-
   Realm name: ad.local
   Domain NetBIOS name: AD
   Domain Security Identifier: S-1-5-21-16904141-148189700-2149043814
   Trust direction: Two-way trust
   Trust type: Active Directory domain
   Trust status: Established and verified

Would be good if you could take it in use.


I created a patch which uses it. See attached screenshots. It may be 
useful but, as I wrote, the message is displayed only for 3s, so some 
users might not have time to read it whole - message is too long.



It would be nice if it can be saved to ldap and return in show/find
commands? That way we can show it in search or details page. Or we can
implement trust-status $TRUST --admin $ADMIN --$password $PASSWORD
command to check the actual status anytime in a future.

We don't have an attribute to store the status. Neither it exists in
Windows.

I'll talk to Simo if we can have one attribute like that but the price
of maintaining it up to date might be too much. On the other hand, we
can always invalidate value in the attribute when ipasam cannot use
shared trust account against trusted domain...

Running validation/verification as a separate command is possible but it
would be relatively resource-hungry and makes little use on its own. We
may couple it together with future multiple suffixes support (tickets
#2848, #2593) as fetching additional suffixes depends on validated trust
relationship.




--
Petr Vobornik
From 7835f62bccefe69abc6122d4ddd6aa7c571f59b2 Mon Sep 17 00:00:00 2001
From: Petr Vobornik pvobo...@redhat.com
Date: Tue, 18 Sep 2012 17:12:59 +0200
Subject: [PATCH] Show trust status in add success notification

Web UI notification of 'Add verification step after trust creation'

https://fedorahosted.org/freeipa/ticket/2763
---
 install/ui/add.js   |  9 +
 install/ui/trust.js | 14 ++
 2 files changed, 19 insertions(+), 4 deletions(-)

diff --git a/install/ui/add.js b/install/ui/add.js
index d855879452e5812c8c7fbae7bc9d1ff9035f1a6e..06c9b325a58e31e3366529b552df29109117f847 100644
--- a/install/ui/add.js
+++ b/install/ui/add.js
@@ -52,7 +52,7 @@ IPA.entity_adder_dialog = function(spec) {
 var facet = IPA.current_entity.get_facet();
 facet.refresh();
 that.close();
-IPA.notify_success(that.get_success_message());
+IPA.notify_success(that.get_success_message(data));
 },
 that.on_error);
 }
@@ -66,7 +66,7 @@ IPA.entity_adder_dialog = function(spec) {
 that.add(
 function(data, text_status, xhr) {
 that.added.notify();
-that.show_message(that.get_success_message());
+that.show_message(that.get_success_message(data));
 var facet = IPA.current_entity.get_facet();
 facet.refresh();
 that.reset();
@@ -86,7 +86,7 @@ IPA.entity_adder_dialog = function(spec) {
 

Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Alexander Bokovoy

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 03:22 PM, Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 02:15 PM, Sumit Bose wrote:

On Tue, Sep 18, 2012 at 12:42:49PM +0200, Sumit Bose wrote:

On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:

Hi,

Following patch adds trust verification sequence to the case when we
establish trust with knowledge of AD administrative credentials.

As we found out, in order to validate/verify trust, one has to have
administrative credentials for the trusted domain, since there are
few RPCs that should be performed against trusted domain's DC's LSA
and NetLogon pipes and these are protected by administrative
credentials.

Thus, when we know admin credentials for the remote domain, we can
perform the trust validation.

https://fedorahosted.org/freeipa/ticket/2763



Just a short feedback. The patch is working as expected, for a newly
created trust Windows will send a TGS request to the IPA KDC without
explicit validation on the windows side. Currently I have some issues
in my test setup so that I can not give a full ACK atm.



ok, ACK.

Nevertheless it would be nice if Petr can check for any implications to
the web UI with respect to the status of the trust.


It shouldn't break Web UI but Web UI won't use it. In add command Web
UI uses only the command state (success/error). If the truststatus
text would be a part of command summary text, it can be displayed in
notification message (which fades after 3s) when comment 8 of
https://fedorahosted.org/freeipa/ticket/2977#comment:8 is implemented.

It is displayed as part of the output, truststatus property:
# ipa trust-add --type=ad --admin Administrator@ad.local --password
ad.local
Active directory domain adminstrator's password:
-
Added Active Directory trust for realm ad.local
-
  Realm name: ad.local
  Domain NetBIOS name: AD
  Domain Security Identifier: S-1-5-21-16904141-148189700-2149043814
  Trust direction: Two-way trust
  Trust type: Active Directory domain
  Trust status: Established and verified

Would be good if you could take it in use.


I created a patch which uses it. See attached screenshots. It may be 
useful but, as I wrote, the message is displayed only for 3s, so some 
users might not have time to read it whole - message is too long.

Well, as we don't have other means to show this information right now,
that's good too. Maybe notification message timer could be possible to
tune per instance? Then we could have, say, 5 seconds timeout here and
keep 3 seconds as default one...

--
/ Alexander Bokovoy

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Petr Vobornik

On 09/18/2012 05:33 PM, Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 03:22 PM, Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 02:15 PM, Sumit Bose wrote:

On Tue, Sep 18, 2012 at 12:42:49PM +0200, Sumit Bose wrote:

On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:

Hi,

Following patch adds trust verification sequence to the case when we
establish trust with knowledge of AD administrative credentials.

As we found out, in order to validate/verify trust, one has to have
administrative credentials for the trusted domain, since there are
few RPCs that should be performed against trusted domain's DC's LSA
and NetLogon pipes and these are protected by administrative
credentials.

Thus, when we know admin credentials for the remote domain, we can
perform the trust validation.

https://fedorahosted.org/freeipa/ticket/2763



Just a short feedback. The patch is working as expected, for a newly
created trust Windows will send a TGS request to the IPA KDC without
explicit validation on the windows side. Currently I have some issues
in my test setup so that I can not give a full ACK atm.



ok, ACK.

Nevertheless it would be nice if Petr can check for any
implications to
the web UI with respect to the status of the trust.


It shouldn't break Web UI but Web UI won't use it. In add command Web
UI uses only the command state (success/error). If the truststatus
text would be a part of command summary text, it can be displayed in
notification message (which fades after 3s) when comment 8 of
https://fedorahosted.org/freeipa/ticket/2977#comment:8 is implemented.

It is displayed as part of the output, truststatus property:
# ipa trust-add --type=ad --admin Administrator@ad.local --password
ad.local
Active directory domain adminstrator's password:
-
Added Active Directory trust for realm ad.local
-
  Realm name: ad.local
  Domain NetBIOS name: AD
  Domain Security Identifier: S-1-5-21-16904141-148189700-2149043814
  Trust direction: Two-way trust
  Trust type: Active Directory domain
  Trust status: Established and verified

Would be good if you could take it in use.


I created a patch which uses it. See attached screenshots. It may be
useful but, as I wrote, the message is displayed only for 3s, so some
users might not have time to read it whole - message is too long.

Well, as we don't have other means to show this information right now,
that's good too. Maybe notification message timer could be possible to
tune per instance? Then we could have, say, 5 seconds timeout here and
keep 3 seconds as default one...



I tuned it. Updated patch attached.

--
Petr Vobornik
From 4ec95483604c22119f3fa1405103558176e07784 Mon Sep 17 00:00:00 2001
From: Petr Vobornik pvobo...@redhat.com
Date: Tue, 18 Sep 2012 17:12:59 +0200
Subject: [PATCH] Show trust status in add success notification

Web UI notification of 'Add verification step after trust creation'

https://fedorahosted.org/freeipa/ticket/2763
---
 install/ui/add.js   | 13 +
 install/ui/ipa.js   |  4 ++--
 install/ui/trust.js | 18 ++
 3 files changed, 29 insertions(+), 6 deletions(-)

diff --git a/install/ui/add.js b/install/ui/add.js
index d855879452e5812c8c7fbae7bc9d1ff9035f1a6e..a5e30092f10495266351674b37fc8fa912af0fbe 100644
--- a/install/ui/add.js
+++ b/install/ui/add.js
@@ -52,7 +52,7 @@ IPA.entity_adder_dialog = function(spec) {
 var facet = IPA.current_entity.get_facet();
 facet.refresh();
 that.close();
-IPA.notify_success(that.get_success_message());
+that.notify_success(data);
 },
 that.on_error);
 }
@@ -66,7 +66,7 @@ IPA.entity_adder_dialog = function(spec) {
 that.add(
 function(data, text_status, xhr) {
 that.added.notify();
-that.show_message(that.get_success_message());
+that.show_message(that.get_success_message(data));
 var facet = IPA.current_entity.get_facet();
 facet.refresh();
 that.reset();
@@ -86,7 +86,7 @@ IPA.entity_adder_dialog = function(spec) {
 that.close();
 var result = data.result.result;
 that.show_edit_page(that.entity, result);
-IPA.notify_success(that.get_success_message());
+that.notify_success(data);
 },
 that.on_error);
 }
@@ -102,11 +102,15 @@ IPA.entity_adder_dialog = function(spec) {
 });
 };
 
-that.get_success_message = function() {
+that.get_success_message = function(data) {
 

Re: [Freeipa-devel] [PATCH] 0081 Only stop the main DS instance when upgrading it

2012-09-18 Thread Rob Crittenden

Martin Kosek wrote:

On 09/14/2012 04:53 PM, Petr Viktorin wrote:

On 09/14/2012 04:12 PM, Petr Viktorin wrote:

On 09/14/2012 03:12 PM, Simo Sorce wrote:

On Fri, 2012-09-14 at 14:53 +0200, Petr Viktorin wrote:

This fixes a 2.2→3.0 upgrade bug found while testing the Dogtag 10 work.
See commit or ticket for details.

https://fedorahosted.org/freeipa/ticket/3083



I also suspect that waiting for ports is not a good way to check if the
CMS is fully initialized, but I don't know of a better way. If you know
one, please speak up.



Such a better way is coming with https://fedorahosted.org/pki/ticket/314. I
opened https://fedorahosted.org/freeipa/ticket/3084 so we won't forget to take
advantage of it.


Won;t we get back to square zero when the work to merge DS and CS
instances into one will be completed ?

Simo.



When they're merged we'll probably need to bring down the CA while
upgrading the server. Or just stop all the IPA services to be on the
safe side, and of course bring them back up afterwards.
Meanwhile, this patch shouldn't hurt things.


The patch worked fine for me. It will be useful at least to the point when we
use a common DS instance, as Simo suggested.


Useful for now, pushed to master and ipa-3-0.

rob

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Alexander Bokovoy

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 05:33 PM, Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 03:22 PM, Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 02:15 PM, Sumit Bose wrote:

On Tue, Sep 18, 2012 at 12:42:49PM +0200, Sumit Bose wrote:

On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:

Hi,

Following patch adds trust verification sequence to the case when we
establish trust with knowledge of AD administrative credentials.

As we found out, in order to validate/verify trust, one has to have
administrative credentials for the trusted domain, since there are
few RPCs that should be performed against trusted domain's DC's LSA
and NetLogon pipes and these are protected by administrative
credentials.

Thus, when we know admin credentials for the remote domain, we can
perform the trust validation.

https://fedorahosted.org/freeipa/ticket/2763



Just a short feedback. The patch is working as expected, for a newly
created trust Windows will send a TGS request to the IPA KDC without
explicit validation on the windows side. Currently I have some issues
in my test setup so that I can not give a full ACK atm.



ok, ACK.

Nevertheless it would be nice if Petr can check for any
implications to
the web UI with respect to the status of the trust.


It shouldn't break Web UI but Web UI won't use it. In add command Web
UI uses only the command state (success/error). If the truststatus
text would be a part of command summary text, it can be displayed in
notification message (which fades after 3s) when comment 8 of
https://fedorahosted.org/freeipa/ticket/2977#comment:8 is implemented.

It is displayed as part of the output, truststatus property:
# ipa trust-add --type=ad --admin Administrator@ad.local --password
ad.local
Active directory domain adminstrator's password:
-
Added Active Directory trust for realm ad.local
-
 Realm name: ad.local
 Domain NetBIOS name: AD
 Domain Security Identifier: S-1-5-21-16904141-148189700-2149043814
 Trust direction: Two-way trust
 Trust type: Active Directory domain
 Trust status: Established and verified

Would be good if you could take it in use.


I created a patch which uses it. See attached screenshots. It may be
useful but, as I wrote, the message is displayed only for 3s, so some
users might not have time to read it whole - message is too long.

Well, as we don't have other means to show this information right now,
that's good too. Maybe notification message timer could be possible to
tune per instance? Then we could have, say, 5 seconds timeout here and
keep 3 seconds as default one...



I tuned it. Updated patch attached.

ACK. Worked fine for me.

--
/ Alexander Bokovoy

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 212 Fix integer validation when boundary value is empty string

2012-09-18 Thread Endi Sukma Dewata

On 9/18/2012 6:36 AM, Petr Vobornik wrote:

Updated patch attached.


ACK.


1. Instead of IPA.not_defined() it might be better to call it
IPA.defined() to avoid double negations like this:

   if (!IPA.not_defined(metadata.minvalue, true) ...


Function renamed, logic negated. Unit tests for IPA.defined added.


2. The check_empty_str probably could made optional and the value would
be true by default. It will make the code cleaner.


I wanted the function to be more general - used somewhere else in a
future. In general, I consider empty string as a defined value so for me
'false' is a good default value of the argument. I agree that in this
case it would look cleaner.


OK. It's also possible to use different methods, e.g. IPA.is_null() and 
IPA.is_empty().


--
Endi S. Dewata

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel


Re: [Freeipa-devel] [PATCH] 0073 Add trust verification code

2012-09-18 Thread Rob Crittenden

Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 05:33 PM, Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 03:22 PM, Alexander Bokovoy wrote:

On Tue, 18 Sep 2012, Petr Vobornik wrote:

On 09/18/2012 02:15 PM, Sumit Bose wrote:

On Tue, Sep 18, 2012 at 12:42:49PM +0200, Sumit Bose wrote:

On Mon, Sep 17, 2012 at 06:44:36PM +0300, Alexander Bokovoy wrote:

Hi,

Following patch adds trust verification sequence to the case
when we
establish trust with knowledge of AD administrative credentials.

As we found out, in order to validate/verify trust, one has to
have
administrative credentials for the trusted domain, since there are
few RPCs that should be performed against trusted domain's DC's
LSA
and NetLogon pipes and these are protected by administrative
credentials.

Thus, when we know admin credentials for the remote domain, we can
perform the trust validation.

https://fedorahosted.org/freeipa/ticket/2763



Just a short feedback. The patch is working as expected, for a
newly
created trust Windows will send a TGS request to the IPA KDC
without
explicit validation on the windows side. Currently I have some
issues
in my test setup so that I can not give a full ACK atm.



ok, ACK.

Nevertheless it would be nice if Petr can check for any
implications to
the web UI with respect to the status of the trust.


It shouldn't break Web UI but Web UI won't use it. In add command Web
UI uses only the command state (success/error). If the truststatus
text would be a part of command summary text, it can be displayed in
notification message (which fades after 3s) when comment 8 of
https://fedorahosted.org/freeipa/ticket/2977#comment:8 is
implemented.

It is displayed as part of the output, truststatus property:
# ipa trust-add --type=ad --admin Administrator@ad.local --password
ad.local
Active directory domain adminstrator's password:
-
Added Active Directory trust for realm ad.local
-
 Realm name: ad.local
 Domain NetBIOS name: AD
 Domain Security Identifier: S-1-5-21-16904141-148189700-2149043814
 Trust direction: Two-way trust
 Trust type: Active Directory domain
 Trust status: Established and verified

Would be good if you could take it in use.


I created a patch which uses it. See attached screenshots. It may be
useful but, as I wrote, the message is displayed only for 3s, so some
users might not have time to read it whole - message is too long.

Well, as we don't have other means to show this information right now,
that's good too. Maybe notification message timer could be possible to
tune per instance? Then we could have, say, 5 seconds timeout here and
keep 3 seconds as default one...



I tuned it. Updated patch attached.

ACK. Worked fine for me.



Pushed 073 and 215.1 to ipa-3-0 and master

rob

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel