On 02/20/2013 12:31 PM, Tomas Babej wrote:
On 02/19/2013 10:33 PM, Rob Crittenden wrote:
Tomas Babej wrote:
On 02/06/2013 07:57 PM, Rob Crittenden wrote:
Tomas Babej wrote:
Hi,
this pair of patches improves HBAC rule handling in selinuxusermap
commands.
Patch 0031 deals with:
On 02/22/2013 04:02 PM, Ana Krivokapic wrote:
On 02/22/2013 10:19 AM, Petr Spacek wrote:
On 20.2.2013 11:03, Ana Krivokapic wrote:
On 02/18/2013 01:08 PM, Martin Kosek wrote:
On 02/18/2013 12:47 PM, Sumit Bose wrote:
On Mon, Feb 18, 2013 at 12:27:35PM +0100, Petr Spacek wrote:
On 15.2.2013
On 02/26/2013 06:03 PM, Martin Kosek wrote:
IA5 string syntax does not have a compatible ORDERING matching rule.
Simply use default ORDERING for these attributeTypes as we already
do in other cases.
https://fedorahosted.org/freeipa/ticket/3398
-
This is a follow-up ticket for regression
On Mon, Feb 25, 2013 at 04:35:20PM +0100, Martin Kosek wrote:
On 02/21/2013 04:24 PM, Sumit Bose wrote:
Hi,
this series of patches fix https://fedorahosted.org/freeipa/ticket/2960
The related design page is
http://freeipa.org/page/V3/Read_and_use_per_service_pac_type .
It was
Hi,
the attached patches 102-107 fix issues found by Coverity which are
tracked by tickets #3422-#3427 and remove an unused variable
(patch 101).
bye,
Sumit
From 97b3b7dedac28704d51e2fa4b4dc975a20d17ada Mon Sep 17 00:00:00 2001
From: Sumit Bose sb...@redhat.com
Date: Tue, 19 Feb 2013 12:48:58
Hello,
A big refactoring of our LDAP code should be merged soon-ish now. Here's
a summary for developers.
If you see these outside ipaldap.py, you're looking at deprecated API:
- methods with camelCaseNames
- methods with _s and _ext postfixes (modify_s, search_ext, ...)
The exception is
On 02/27/2013 11:58 AM, Petr Viktorin wrote:
On 02/26/2013 06:03 PM, Martin Kosek wrote:
IA5 string syntax does not have a compatible ORDERING matching rule.
Simply use default ORDERING for these attributeTypes as we already
do in other cases.
https://fedorahosted.org/freeipa/ticket/3398
On 02/27/2013 01:39 PM, Martin Kosek wrote:
On 02/27/2013 12:35 PM, Sumit Bose wrote:
Hi,
the attached patches 102-107 fix issues found by Coverity which are
tracked by tickets #3422-#3427 and remove an unused variable
(patch 101).
bye,
Sumit
I see just one issue. In patch 0105:
-
Hello list,
during our last meeting with Simo we discussed support for name constraint
extension in CA certificates and clients.
The Name Constraints Extensions is defined here:
http://tools.ietf.org/html/rfc5280#section-4.2.1.10
Following article could be interesting for you if you like
On 26.2.2013 11:03, Petr Viktorin wrote:
Thanks. I think you should also add a tearDown method to test_LDAPEntry
which disconnects self.conn if it is connected (the same thing test_ldap
does).
Thanks for the catch, added.
ACK.
--
Jan Cholasta
On Wed, 2013-02-27 at 13:55 +0100, Petr Spacek wrote:
Hello list,
during our last meeting with Simo we discussed support for name constraint
extension in CA certificates and clients.
The Name Constraints Extensions is defined here:
http://tools.ietf.org/html/rfc5280#section-4.2.1.10
El mar, 26-02-2013 a las 15:11 -0500, Dmitri Pal escribió:
On 02/25/2013 02:15 PM, Loris Santamaria wrote:
Hi all,
some customers of ours are interested in managing desktop policies for
their linux workstations, really nothing fancy, corporate background and
proxy settings are the
On Wed, 2013-02-27 at 11:58 +0100, Sumit Bose wrote:
On Mon, Feb 25, 2013 at 04:35:20PM +0100, Martin Kosek wrote:
On 02/21/2013 04:24 PM, Sumit Bose wrote:
Hi,
this series of patches fix https://fedorahosted.org/freeipa/ticket/2960
The related design page is
On Wed, 2013-02-27 at 08:16 -0500, Simo Sorce wrote:
On Wed, 2013-02-27 at 13:55 +0100, Petr Spacek wrote:
Hello list,
during our last meeting with Simo we discussed support for name constraint
extension in CA certificates and clients.
The Name Constraints Extensions is defined
Hi,
this patch fixes https://fedorahosted.org/freeipa/ticket/3464.
Honza
--
Jan Cholasta
From c40f1f123b905fdd0ee4d05d32f3d86e6ffdccc0 Mon Sep 17 00:00:00 2001
From: Jan Cholasta jchol...@redhat.com
Date: Wed, 27 Feb 2013 14:14:33 +0100
Subject: [PATCH] Fix remove while iterating in
Sumit Bose wrote:
On Mon, Feb 25, 2013 at 03:12:19PM +0100, Martin Kosek wrote:
On 02/25/2013 03:09 PM, Rob Crittenden wrote:
Martin Kosek wrote:
...
4) What does NOTE: We will need to be clear that this range has nothing to do
with Trust ranges. actually mean? AFAIU, IPA should have all
On 31.1.2013 11:03, Petr Viktorin wrote:
And hee is another batch of patches. This one is about converting the
legacy IPAdmin and raw python-ldap calls to the new wrappers.
Patch 165:
I have noticed two things that are not really related to your work, but
here they are nonetheless:
+
Add support for Realm Domains to web UI.
https://fedorahosted.org/freeipa/ticket/3407
--
Regards,
Ana Krivokapic
Associate Software Engineer
FreeIPA team
Red Hat Inc.
From a44867fdcd4fda8cce531d689f94f466ca6bb52d Mon Sep 17 00:00:00 2001
From: Ana Krivokapic akriv...@redhat.com
Date: Wed, 27
On 12.2.2013 13:58, Petr Spacek wrote:
Hello,
Make log messages related to Kerberos more verbose.
This change should help people supporting bind-dyndb-ldap to figure out what
is happening under covers.
Added explanatory error message for case where Kerberos context initialization
Hi,
these patches add the ability to access and manipulate raw attribute
values as they are returned from python-ldap to the LDAPEntry class.
This is useful for comparing entries, computing modlists for the modify
operation, deleting values that don't match the syntax of an attribute,
etc.,
On 02/27/2013 06:46 AM, Petr Viktorin wrote:
Hello,
A big refactoring of our LDAP code should be merged soon-ish now. Here's
a summary for developers.
Great, that's fabulous news and thanks for the good work!
IPA plugins traditionally use (dn, entry_attrs) pairs to represent
entries. To make
On 02/27/2013 04:20 PM, Ana Krivokapic wrote:
Add support for Realm Domains to web UI.
https://fedorahosted.org/freeipa/ticket/3407
The patch looks good, but there is a issue we don't have a precedence for.
The mod command is doing dns check for new domains. Currently we can't
specify
Hi,
On 27.2.2013 17:09, John Dennis wrote:
IPA plugins traditionally use (dn, entry_attrs) pairs to represent
entries. To make that work, iterating over an LDAPEntry will, for now,
yield the DN and the entry itself. Always use keys() or values() when
iterating over an entry.
I'm trying parse
On 02/27/2013 11:23 AM, Jan Cholasta wrote:
Hi,
On 27.2.2013 17:09, John Dennis wrote:
IPA plugins traditionally use (dn, entry_attrs) pairs to represent
entries. To make that work, iterating over an LDAPEntry will, for now,
yield the DN and the entry itself. Always use keys() or values() when
On 27.2.2013 18:14, John Dennis wrote:
On 02/27/2013 11:23 AM, Jan Cholasta wrote:
Hi,
On 27.2.2013 17:09, John Dennis wrote:
IPA plugins traditionally use (dn, entry_attrs) pairs to represent
entries. To make that work, iterating over an LDAPEntry will, for now,
yield the DN and the entry
On 02/27/2013 12:22 PM, Jan Cholasta wrote:
On 27.2.2013 18:14, John Dennis wrote:
On 02/27/2013 11:23 AM, Jan Cholasta wrote:
Hi,
On 27.2.2013 17:09, John Dennis wrote:
IPA plugins traditionally use (dn, entry_attrs) pairs to represent
entries. To make that work, iterating over an LDAPEntry
On Wed, Feb 27, 2013 at 09:50:21AM -0500, Rob Crittenden wrote:
Sumit Bose wrote:
On Mon, Feb 25, 2013 at 03:12:19PM +0100, Martin Kosek wrote:
On 02/25/2013 03:09 PM, Rob Crittenden wrote:
Martin Kosek wrote:
...
4) What does NOTE: We will need to be clear that this range has nothing
to
Sumit Bose wrote:
On Wed, Feb 27, 2013 at 09:50:21AM -0500, Rob Crittenden wrote:
Sumit Bose wrote:
On Mon, Feb 25, 2013 at 03:12:19PM +0100, Martin Kosek wrote:
On 02/25/2013 03:09 PM, Rob Crittenden wrote:
Martin Kosek wrote:
...
4) What does NOTE: We will need to be clear that this
On Wed, Feb 27, 2013 at 06:48:27PM +0100, Sumit Bose wrote:
On Wed, Feb 27, 2013 at 08:37:18AM -0500, Simo Sorce wrote:
On Wed, 2013-02-27 at 11:58 +0100, Sumit Bose wrote:
On Mon, Feb 25, 2013 at 04:35:20PM +0100, Martin Kosek wrote:
On 02/21/2013 04:24 PM, Sumit Bose wrote:
Hi,
Sumit Bose wrote:
On Wed, Feb 27, 2013 at 02:03:24PM -0500, Rob Crittenden wrote:
Sumit Bose wrote:
But it looks like dnarange-set and dnanextrange-set can also be used to
not only move existing DNA ranges but to create new DNA ranges which
will lead to ID which are not in the idrange of the
On Wed, 2013-02-27 at 15:00 -0500, Rob Crittenden wrote:
Sumit Bose wrote:
On Wed, Feb 27, 2013 at 02:03:24PM -0500, Rob Crittenden wrote:
Sumit Bose wrote:
But it looks like dnarange-set and dnanextrange-set can also be used to
not only move existing DNA ranges but to create new DNA
On Wed, Feb 27, 2013 at 03:00:10PM -0500, Rob Crittenden wrote:
Sumit Bose wrote:
On Wed, Feb 27, 2013 at 02:03:24PM -0500, Rob Crittenden wrote:
Sumit Bose wrote:
But it looks like dnarange-set and dnanextrange-set can also be used to
not only move existing DNA ranges but to create new DNA
On 02/27/2013 06:48 PM, Sumit Bose wrote:
On Wed, Feb 27, 2013 at 08:37:18AM -0500, Simo Sorce wrote:
On Wed, 2013-02-27 at 11:58 +0100, Sumit Bose wrote:
On Mon, Feb 25, 2013 at 04:35:20PM +0100, Martin Kosek wrote:
On 02/21/2013 04:24 PM, Sumit Bose wrote:
Hi,
this series of patches fix
33 matches
Mail list logo