Re: [Freeipa-devel] Announcing FreeIPA v3.0.0 beta 2 Release

2012-08-20 Thread Jérôme Fenal
2012/8/17 Rob Crittenden rcrit...@redhat.com

 The FreeIPA team is proud to announce version FreeIPA v3.0.0 beta 2.


Hi Rob,

Regarding translations, I don't see yet a 3.0 branch on Transifex. Is it in
the pipeline, so we could have time to work on translations for 3.0 GA?

Regards,

J.
-- 
Jérôme Fenal - jfenal AT gmail.com - http://fenal.org/
Paris.pm - http://paris.mongueurs.net/
___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Re: [Freeipa-devel] Announcing FreeIPA v3.0.0 beta 2 Release

2012-08-20 Thread Rob Crittenden

Jérôme Fenal wrote:


2012/8/17 Rob Crittenden rcrit...@redhat.com mailto:rcrit...@redhat.com

The FreeIPA team is proud to announce version FreeIPA v3.0.0 beta 2.


Hi Rob,

Regarding translations, I don't see yet a 3.0 branch on Transifex. Is it
in the pipeline, so we could have time to work on translations for 3.0 GA?


The master branch in Transifex equivalent to the master branch in IPA, 
and has been updated recently.


We plan to branch for 3.0 in the IPA repo, I suppose we can look into 
branching in Transifex at the same time, but for now it should be safe 
to work from master. I don't believe Transifex really handles branches 
very well, but John knows more about it than I.


rob

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Re: [Freeipa-devel] Announcing FreeIPA v3.0.0 beta 2 Release

2012-08-20 Thread John Dennis

On 08/20/2012 05:27 PM, Rob Crittenden wrote:

Jérôme Fenal wrote:


2012/8/17 Rob Crittenden rcrit...@redhat.com mailto:rcrit...@redhat.com

 The FreeIPA team is proud to announce version FreeIPA v3.0.0 beta 2.


Hi Rob,

Regarding translations, I don't see yet a 3.0 branch on Transifex. Is it
in the pipeline, so we could have time to work on translations for 3.0 GA?


The master branch in Transifex equivalent to the master branch in IPA,
and has been updated recently.

We plan to branch for 3.0 in the IPA repo, I suppose we can look into
branching in Transifex at the same time, but for now it should be safe
to work from master. I don't believe Transifex really handles branches
very well, but John knows more about it than I.


Transifex has no concept of branches much to many developers dismay. The 
suggested solution in Transifex to create a new resource for each branch 
(which is what we did with 2.2). Currently in TX we have an ipa resource 
which maps to git's master and a 2.2 resource which maps to git's 2.2 
branch..


It's kind of sucky because there is no connection in TX between 
resources and hence branches, each resource stands on it's own. That 
means even though 90% of the strings in one resource are the same as 
another resource (because they're just different branch versions) 
translators won't have the advantage of that information (unless they know).


I brought the question of software branches up in the TX forums and was 
met with deafening silence.



--
John Dennis jden...@redhat.com

Looking to carve out IT costs?
www.redhat.com/carveoutcosts/

___
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

[Freeipa-devel] Announcing FreeIPA v3.0.0 beta 2 Release

2012-08-17 Thread Rob Crittenden

The FreeIPA team is proud to announce version FreeIPA v3.0.0 beta 2.

It can be downloaded from http://www.freeipa.org/page/Downloads.

A build is available in the Fedora 18 and rawhide repositories or for 
Fedora 17 via the freeipa-devel repo on www.freeipa.org: 
http://freeipa.org/downloads/freeipa-devel.repo . To install in Fedora 
17 and 18 the updates-testing repository needs to be enabled as well.


NOTE: The Fedora 18 build was submitted this morning (8/17) and has yet 
to hit updates-testing. The packages are also at 
http://koji.fedoraproject.org/koji/buildinfo?buildID=348836


For additional information see the AD Trust design page 
http://freeipa.org/page/IPAv3_AD_trust and the AD Trust testing page 
http://freeipa.org/page/IPAv3_testing_AD_trust.


== Highlights since 3.0.0 beta 1 ==

* NTLM password hash is generated for existing users on first use
  of IPA cross-realm environment based on their Kerberos keys without
  requiring a password change.
* Secure identifiers compatible with Active Directory are generated
  automatically for existing users upon set up of IPA cross-realm
  environment.
* Use certmonger to renew CA subsystem certificates
* Support for DNS zone transfers to non-IPA slaves
* Internal change to LDAP Distinguished Name handling to be more robust
* Better support for Internet Explorer 9 in the UI
* Allow multiple servers on client install command-line and configuring 
without DNS discovery.

* Translation updates

== Upgrading ==

An IPA server can be upgraded simply by installing updated rpms. The 
server does not need to be shut down in advance.


If you have multiple servers you may upgrade them one at a time. It is 
expected that all servers will be upgraded in a relatively short period 
(days or weeks not months). They should be able to co-exist peacefully 
but new features will not be available on old servers and enrolling a 
new client against an old server will result in the SSH keys not being 
uploaded.


Downgrading a server once upgraded is not supported.

Upgrading from 2.2.0 should work but has not been fully tested. Proceed 
with caution.


An enrolled client does not need the new packages installed unless you 
want to re-enroll it. SSH keys for already installed clients are not 
uploaded, you will have to re-enroll the client or manually upload the 
keys (using host-mod).


== Feedback ==

Please provide comments, bugs and other feedback via the freeipa-devel 
mailing list: http://www.redhat.com/mailman/listinfo/freeipa-devel


== Detailed changelog ==

Alexander Bokovoy (11):
* ipasam: improve SASL bind callback
* Use smb.conf 'dedicated keytab file' parameter instead of hard-coded value
* reduce redundant checks in ldapsam_search_users() to a single statement
* ipalib/plugins/trust.py: ValidationError takes 'error' named argument, 
not 'reason'

* Handle various forms of admin accounts when establishing trusts
* Follow change in samba4 beta4 for sid_check_is_domain to 
sid_check_is_our_sam
* Rework task naming in LDAP updates to avoid conflicting names in 
certain cases

* When ipaNTHash is missing, ask IPA to generate it from kerberos keys
* Ensure ipa-adtrust-install is run with Kerberos ticket for admin user
* Handle exceptions when establishing trusts
* Add internationalization to DCE RPC code

David Spångberg (1):
* Indirect roles in WebUI

Gowrishankar Rajaiyan (1):
* Adding exit status 3  4 to ipa-client-install man page

Jan Cholasta (2):
* Add --{set,add,del}attr options to commands which are missing them.
* Raise Base64DecodeError instead of ConversionError when base64 
decoding fails in Bytes parameters.


John Dennis (2):
* Use DN objects instead of strings
* Installation fails when CN is set in certificate subject base

Martin Kosek (12):
* Do not change LDAPObject objectclass list
* Add automount map/key update permissions
* Fix ipa-managed-entries man page typo
* Improve address family handling in sockets
* Enable SOA serial autoincrement
* Add range-mod command
* Warn user if an ID range with incorrect size was created
* Print ipa-ldap-updater errors during RPM upgrade
* Enforce CNAME constrains for DNS commands
* Avoid redundant info message during RPM update
* Bump bind-dyndb-ldap version for F18
* Fix winsync agreements creation

Petr Viktorin (7):
* Fix batch command error reporting
* Fix wrong option name in ipa-managed-entries man page
* Fix updating minimum_connections in ipa-upgradeconfig
* Framework for admin/install tools, with ipa-ldap-updater
* Arrange stripping .po files
* Update translations
* Create /etc/sysconfig/network if it doesn't exist

Petr Vobornik (31):
* Moved configuration to last position in navigation
* Display loginas information only after login
* Password policy measurement units.
* Web UI: kerberos ticket policy measurement units
* Add and remove dns per-domain permission in Web UI
* Differentiation of widget type and text_widget input type
* Fixed display of attributes_widget in IE9
* Bigger textarea for