[Pkg-freeipa-devel] [Git][freeipa-team/freeipa][master-next] 8 commits: fix-fontawesome-path.diff: Fix the path to font-awesome. (LP: #1772921)

Timo Aaltonen gitlab at salsa.debian.org
Tue Jun 26 08:46:55 BST 2018


Timo Aaltonen pushed to branch master-next at FreeIPA packaging / freeipa


Commits:
2004a807 by Timo Aaltonen at 2018-05-23T19:11:14+03:00
fix-fontawesome-path.diff: Fix the path to font-awesome. (LP: #1772921)

- - - - -
c5a3a823 by Timo Aaltonen at 2018-05-23T19:24:49+03:00
fix-krb5kdc-cert-path.diff: Apache can't access KDC certs, move them to /var/lib/ipa/certs. (LP: #1772447)

- - - - -
d6513447 by Timo Aaltonen at 2018-05-23T19:39:36+03:00
ipa-httpd-pwdreader-force-fqdn.diff: Make sure HOSTNAME is a FQDN. (LP: #1769485)

- - - - -
8e303cfb by Timo Aaltonen at 2018-05-23T20:02:01+03:00
refresh patches

- - - - -
68b3fb58 by Timo Aaltonen at 2018-05-23T22:58:44+03:00
fix fontawesome patch

- - - - -
a6f5ee5b by Timo Aaltonen at 2018-05-24T22:16:49+03:00
dont-allow-compressed-certs.diff

mod_deflate is enabled by default on Debian, but the current apache config doesn't know how to uncompress the received cert data so disallow gzip content for now. (LP: #1772450)

- - - - -
01aa27f6 by Timo Aaltonen at 2018-06-26T09:53:12+03:00
control: Add libjs-scriptaculous to server depends.

- - - - -
c27a35ea by Timo Aaltonen at 2018-06-26T09:56:03+03:00
fix-gzip-path.diff: Fix path to gzip. (LP: #1778236)

- - - - -


18 changed files:

- debian/changelog
- debian/control.server
- debian/patches/create-sysconfig-ods.diff
- + debian/patches/dont-allow-compressed-certs.diff
- debian/patches/fix-apache-ssl-setup.diff
- + debian/patches/fix-fontawesome-path.diff
- + debian/patches/fix-gzip-path.diff
- debian/patches/fix-httpd-group.diff
- + debian/patches/fix-krb5kdc-cert-path.diff
- debian/patches/fix-named-conf-template.diff
- debian/patches/fix-opendnssec-setup.diff
- debian/patches/fix-paths.diff
- debian/patches/fix-replicainstall.diff
- debian/patches/hack-tomcat-race.diff
- + debian/patches/ipa-httpd-pwdreader-force-fqdn.diff
- debian/patches/ldap-multiarch.diff
- debian/patches/series
- debian/patches/support-pam-mkhomedir.diff


Changes:

=====================================
debian/changelog
=====================================
--- a/debian/changelog
+++ b/debian/changelog
@@ -3,6 +3,7 @@ freeipa (4.7.0~pre2-1) UNRELEASED; urgency=medium
   * New upstream prerelease.
     - fix-version.diff: Dropped, not needed
     - hack-duplicate-cert-directive.diff: Dropped, fixed upstream
+    - refresh patches
   * tests/server-install: Fix the fake domain, single label domains are not
     supported anymore.
   * tests: If the server install fails, just dump the log and exit
@@ -10,6 +11,17 @@ freeipa (4.7.0~pre2-1) UNRELEASED; urgency=medium
   * server.postinst: Fix upgrade from earlier version.
   * Create-kadm5.acl-if-it-doesn-t-exist.diff: Fix kadmind startup issue
     if kadm5.acl doesn't exist. (LP: #1772447)
+  * fix-fontawesome-path.diff: Fix the path to font-awesome. (LP:
+    #1772921)
+  * fix-krb5kdc-cert-path.diff: Apache can't access KDC certs, move them
+    to /var/lib/ipa/certs. (LP: #1772447)
+  * ipa-httpd-pwdreader-force-fqdn.diff: Make sure HOSTNAME is a FQDN. (LP:
+    #1769485)
+  * dont-allow-compressed-certs.diff: mod_deflate is enabled by default on
+    Debian, but the current apache config doesn't know how to uncompress the
+    received cert data so disallow gzip content for now. (LP: #1772450)
+  * control: Add libjs-scriptaculous to server depends.
+  * fix-gzip-path.diff: Fix path to gzip. (LP: #1778236)
 
  -- Timo Aaltonen <tjaalton at debian.org>  Wed, 18 Apr 2018 17:50:11 +0300
 


=====================================
debian/control.server
=====================================
--- a/debian/control.server
+++ b/debian/control.server
@@ -25,6 +25,7 @@ Depends:
  libapache2-mod-wsgi,
  libjs-dojo-core,
  libjs-jquery,
+ libjs-scriptaculous,
  libnss3-tools,
  libsasl2-modules-gssapi-mit,
  oddjob (>= 0.34.3-2),


=====================================
debian/patches/create-sysconfig-ods.diff
=====================================
--- a/debian/patches/create-sysconfig-ods.diff
+++ b/debian/patches/create-sysconfig-ods.diff
@@ -1,6 +1,6 @@
 --- a/ipaserver/install/opendnssecinstance.py
 +++ b/ipaserver/install/opendnssecinstance.py
-@@ -197,6 +197,9 @@ class OpenDNSSECInstance(service.Service
+@@ -199,6 +199,9 @@ class OpenDNSSECInstance(service.Service
          if not self.fstore.has_file(paths.SYSCONFIG_ODS):
              self.fstore.backup_file(paths.SYSCONFIG_ODS)
  


=====================================
debian/patches/dont-allow-compressed-certs.diff
=====================================
--- /dev/null
+++ b/debian/patches/dont-allow-compressed-certs.diff
@@ -0,0 +1,12 @@
+--- a/ipaserver/plugins/dogtag.py
++++ b/ipaserver/plugins/dogtag.py
+@@ -1918,8 +1918,7 @@ class ra(rabase.rabase, RestClient):
+             client_keyfile=None,
+             cafile=self.ca_cert,
+             method='POST',
+-            headers={'Accept-Encoding': 'gzip, deflate',
+-                     'User-Agent': 'IPA',
++            headers={'User-Agent': 'IPA',
+                      'Content-Type': 'application/xml'},
+             body=payload
+         )


=====================================
debian/patches/fix-apache-ssl-setup.diff
=====================================
--- a/debian/patches/fix-apache-ssl-setup.diff
+++ b/debian/patches/fix-apache-ssl-setup.diff
@@ -10,7 +10,7 @@
      HTTPD_PASSWD_FILE_FMT = "/var/lib/ipa/passwds/{host}-443-RSA"
 --- a/ipaplatform/debian/paths.py
 +++ b/ipaplatform/debian/paths.py
-@@ -26,6 +26,8 @@ class DebianPathNamespace(BasePathNamesp
+@@ -28,6 +28,8 @@ class DebianPathNamespace(BasePathNamesp
      HTTPD_IPA_REWRITE_CONF = "/etc/apache2/conf-available/ipa-rewrite.conf"
      HTTPD_IPA_CONF = "/etc/apache2/conf-enabled/ipa.conf"
      HTTPD_NSS_CONF = "/etc/apache2/mods-available/nss.conf"
@@ -30,7 +30,7 @@
  
  logger = logging.getLogger(__name__)
  
-@@ -208,6 +208,7 @@ class HTTPInstance(service.Service):
+@@ -214,6 +214,7 @@ class HTTPInstance(service.Service):
  
      def backup_ssl_conf(self):
          self.fstore.backup_file(paths.HTTPD_SSL_CONF)
@@ -38,7 +38,7 @@
  
      def disable_nss_conf(self):
          """
-@@ -229,12 +230,13 @@ class HTTPInstance(service.Service):
+@@ -235,12 +236,13 @@ class HTTPInstance(service.Service):
                                     '+TLSv1 +TLSv1.1 +TLSv1.2', False)
  
      def set_mod_ssl_logdir(self):
@@ -58,7 +58,7 @@
  
      def disable_mod_ssl_ocsp(self):
          if sysupgrade.get_upgrade_state('http', OCSP_ENABLED) is None:
-@@ -266,14 +268,14 @@ class HTTPInstance(service.Service):
+@@ -272,14 +274,14 @@ class HTTPInstance(service.Service):
  
      def __add_include(self):
          """This should run after __set_mod_nss_port so is already backed up"""
@@ -75,7 +75,7 @@
  
      def configure_certmonger_renewal_guard(self):
          certmonger = services.knownservices.certmonger
-@@ -398,10 +400,10 @@ class HTTPInstance(service.Service):
+@@ -404,10 +406,10 @@ class HTTPInstance(service.Service):
  
      def configure_mod_ssl_certs(self):
          """Configure the mod_ssl certificate directives"""
@@ -88,7 +88,7 @@
                                     'SSLCertificateKeyFile',
                                     paths.HTTPD_KEY_FILE, False)
          installutils.set_directive(
-@@ -409,7 +411,7 @@ class HTTPInstance(service.Service):
+@@ -415,7 +417,7 @@ class HTTPInstance(service.Service):
              'SSLPassPhraseDialog',
              'exec:{passread}'.format(passread=paths.IPA_HTTPD_PASSWD_READER),
              False)
@@ -96,8 +96,8 @@
 +        installutils.set_directive(paths.HTTPD_SSL_SITE_CONF,
                                     'SSLCACertificateFile',
                                     paths.IPA_CA_CRT, False)
- 
-@@ -501,7 +503,7 @@ class HTTPInstance(service.Service):
+         # set SSLVerifyDepth for external CA installations
+@@ -512,7 +514,7 @@ class HTTPInstance(service.Service):
                               'external-helper', helper)
  
          for f in [paths.HTTPD_IPA_CONF, paths.HTTPD_SSL_CONF,
@@ -108,7 +108,7 @@
              except ValueError as error:
 --- a/ipaserver/install/ipa_backup.py
 +++ b/ipaserver/install/ipa_backup.py
-@@ -152,6 +152,7 @@ class Backup(admintool.AdminTool):
+@@ -153,6 +153,7 @@ class Backup(admintool.AdminTool):
          paths.HTTPD_IPA_PKI_PROXY_CONF,
          paths.HTTPD_IPA_REWRITE_CONF,
          paths.HTTPD_SSL_CONF,


=====================================
debian/patches/fix-fontawesome-path.diff
=====================================
--- /dev/null
+++ b/debian/patches/fix-fontawesome-path.diff
@@ -0,0 +1,41 @@
+--- a/install/share/ipa.conf.template
++++ b/install/share/ipa.conf.template
+@@ -181,7 +181,7 @@ Alias /ipa/crl "$CRL_PUBLISH_PATH"
+ 
+ #  List explicitly only the fonts we want to serve
+ Alias /ipa/ui/fonts/open-sans "${FONTS_DIR}/open-sans"
+-Alias /ipa/ui/fonts/fontawesome "${FONTS_DIR}/fontawesome"
++Alias /ipa/ui/fonts/fontawesome "${FONTS_DIR}/${FONT_AWESOME_DIR}"
+ <Directory "${FONTS_DIR}">
+   SetHandler None
+   AllowOverride None
+--- a/ipaplatform/base/paths.py
++++ b/ipaplatform/base/paths.py
+@@ -244,6 +244,7 @@ class BasePathNamespace(object):
+     SMBD = "/usr/sbin/smbd"
+     USERADD = "/usr/sbin/useradd"
+     FONTS_DIR = "/usr/share/fonts"
++    FONT_AWESOME_DIR = "fontawesome"
+     USR_SHARE_IPA_DIR = "/usr/share/ipa/"
+     CA_TOPOLOGY_ULDIF = "/usr/share/ipa/ca-topology.uldif"
+     IPA_HTML_DIR = "/usr/share/ipa/html"
+--- a/ipaplatform/debian/paths.py
++++ b/ipaplatform/debian/paths.py
+@@ -87,6 +87,7 @@ class DebianPathNamespace(BasePathNamesp
+     REMOVE_DS_PL = "/usr/sbin/remove-ds"
+     SETUP_DS_PL = "/usr/sbin/setup-ds"
+     FONTS_DIR = "/usr/share/fonts/truetype"
++    FONT_AWESOME_DIR = "font-awesome"
+     VAR_KERBEROS_KRB5KDC_DIR = "/var/lib/krb5kdc/"
+     VAR_KRB5KDC_K5_REALM = "/var/lib/krb5kdc/.k5."
+     CACERT_PEM = "/var/lib/krb5kdc/cacert.pem"
+--- a/ipaserver/install/httpinstance.py
++++ b/ipaserver/install/httpinstance.py
+@@ -103,6 +103,7 @@ class HTTPInstance(service.Service):
+             AUTOREDIR='' if auto_redirect else '#',
+             CRL_PUBLISH_PATH=paths.PKI_CA_PUBLISH_DIR,
+             FONTS_DIR=paths.FONTS_DIR,
++            FONT_AWESOME_DIR=paths.FONT_AWESOME_DIR,
+             GSSAPI_SESSION_KEY=paths.GSSAPI_SESSION_KEY,
+             IPA_CUSTODIA_SOCKET=paths.IPA_CUSTODIA_SOCKET,
+             IPA_CCACHES=paths.IPA_CCACHES,


=====================================
debian/patches/fix-gzip-path.diff
=====================================
--- /dev/null
+++ b/debian/patches/fix-gzip-path.diff
@@ -0,0 +1,9 @@
+--- a/ipaplatform/debian/paths.py
++++ b/ipaplatform/debian/paths.py
+@@ -105,5 +105,6 @@ class DebianPathNamespace(BasePathNamesp
+     IPA_CUSTODIA_SOCKET = "/run/apache2/ipa-custodia.sock"
+     IPA_CUSTODIA_AUDIT_LOG = '/var/log/ipa-custodia.audit.log'
+     WSGI_PREFIX_DIR = "/run/apache2/wsgi"
++    GZIP = "/bin/gzip"
+ 
+ paths = DebianPathNamespace()


=====================================
debian/patches/fix-httpd-group.diff
=====================================
--- a/debian/patches/fix-httpd-group.diff
+++ b/debian/patches/fix-httpd-group.diff
@@ -1,6 +1,6 @@
 --- a/ipaplatform/debian/constants.py
 +++ b/ipaplatform/debian/constants.py
-@@ -12,6 +12,7 @@ from ipaplatform.base.constants import B
+@@ -14,6 +14,7 @@ from ipaplatform.base.constants import B
  
  class DebianConstantsNamespace(BaseConstantsNamespace):
      HTTPD_USER = "www-data"


=====================================
debian/patches/fix-krb5kdc-cert-path.diff
=====================================
--- /dev/null
+++ b/debian/patches/fix-krb5kdc-cert-path.diff
@@ -0,0 +1,18 @@
+--- a/ipaplatform/debian/paths.py
++++ b/ipaplatform/debian/paths.py
+@@ -90,12 +90,12 @@ class DebianPathNamespace(BasePathNamesp
+     FONT_AWESOME_DIR = "font-awesome"
+     VAR_KERBEROS_KRB5KDC_DIR = "/var/lib/krb5kdc/"
+     VAR_KRB5KDC_K5_REALM = "/var/lib/krb5kdc/.k5."
+-    CACERT_PEM = "/var/lib/krb5kdc/cacert.pem"
++    CACERT_PEM = "/var/lib/ipa/certs/cacert.pem"
+     KRB5KDC_KADM5_ACL = "/etc/krb5kdc/kadm5.acl"
+     KRB5KDC_KADM5_KEYTAB = "/etc/krb5kdc/kadm5.keytab"
+     KRB5KDC_KDC_CONF = "/etc/krb5kdc/kdc.conf"
+-    KDC_CERT = "/var/lib/krb5kdc/kdc.crt"
+-    KDC_KEY = "/var/lib/krb5kdc/kdc.key"
++    KDC_CERT = "/var/lib/ipa/certs/kdc.crt"
++    KDC_KEY = "/var/lib/ipa/certs/kdc.key"
+     VAR_LOG_HTTPD_DIR = "/var/log/apache2"
+     VAR_LOG_HTTPD_ERROR = "/var/log/apache2/error.log"
+     NAMED_RUN = "/var/cache/bind/named.run"


=====================================
debian/patches/fix-named-conf-template.diff
=====================================
--- a/debian/patches/fix-named-conf-template.diff
+++ b/debian/patches/fix-named-conf-template.diff
@@ -18,7 +18,7 @@ Description: fix named.conf template
  
  	// Any host is permitted to issue recursive queries
  	allow-recursion { any; };
-@@ -27,18 +27,14 @@ options {
+@@ -30,18 +30,14 @@ options {
   * By default, SELinux policy does not allow named to modify the /var/named directory,
   * so put the default debug log file in data/ :
   */


=====================================
debian/patches/fix-opendnssec-setup.diff
=====================================
--- a/debian/patches/fix-opendnssec-setup.diff
+++ b/debian/patches/fix-opendnssec-setup.diff
@@ -12,7 +12,7 @@ Description: Fix ODS setup with 2.0.x
  	</RepositoryList>
 --- a/ipaserver/install/opendnssecinstance.py
 +++ b/ipaserver/install/opendnssecinstance.py
-@@ -282,20 +282,15 @@ class OpenDNSSECInstance(service.Service
+@@ -284,20 +284,15 @@ class OpenDNSSECInstance(service.Service
              os.chmod(paths.OPENDNSSEC_KASP_DB, 0o660)
  
              # regenerate zonelist.xml
@@ -37,7 +37,7 @@ Description: Fix ODS setup with 2.0.x
  
 --- a/ipaplatform/base/paths.py
 +++ b/ipaplatform/base/paths.py
-@@ -167,7 +167,8 @@ class BasePathNamespace(object):
+@@ -182,7 +182,8 @@ class BasePathNamespace(object):
      NET = "/usr/bin/net"
      BIN_NISDOMAINNAME = "/usr/bin/nisdomainname"
      NSUPDATE = "/usr/bin/nsupdate"


=====================================
debian/patches/fix-paths.diff
=====================================
--- a/debian/patches/fix-paths.diff
+++ b/debian/patches/fix-paths.diff
@@ -1,6 +1,6 @@
 --- a/ipaplatform/debian/paths.py
 +++ b/ipaplatform/debian/paths.py
-@@ -37,6 +37,7 @@ class DebianPathNamespace(BasePathNamesp
+@@ -39,6 +39,7 @@ class DebianPathNamespace(BasePathNamesp
      NAMED_ROOT_KEY = "/etc/bind/bind.keys"
      NAMED_BINDKEYS_FILE = "/etc/bind/bind.keys"
      NAMED_MANAGED_KEYS_DIR = "/var/cache/bind/dynamic"
@@ -8,7 +8,7 @@
      OPENLDAP_LDAP_CONF = "/etc/ldap/ldap.conf"
      ETC_DEBIAN_VERSION = "/etc/debian_version"
      IPA_P11_KIT = "/usr/local/share/ca-certificates/ipa-ca.crt"
-@@ -60,6 +61,7 @@ class DebianPathNamespace(BasePathNamesp
+@@ -62,6 +63,7 @@ class DebianPathNamespace(BasePathNamesp
      DNSSEC_TRUSTED_KEY = "/etc/bind/trusted-key.key"
      GSSAPI_SESSION_KEY = "/etc/apache2/ipasession.key"
      OLD_KRA_AGENT_PEM = "/etc/apache2/nssdb/kra-agent.pem"
@@ -16,7 +16,7 @@
      SBIN_SERVICE = "/usr/sbin/service"
      CERTMONGER_COMMAND_TEMPLATE = "/usr/lib/ipa/certmonger/%s"
      UPDATE_CA_TRUST = "/usr/sbin/update-ca-certificates"
-@@ -78,6 +80,7 @@ class DebianPathNamespace(BasePathNamesp
+@@ -80,6 +82,7 @@ class DebianPathNamespace(BasePathNamesp
      IPA_DNSKEYSYNCD = "/usr/lib/ipa/ipa-dnskeysyncd"
      IPA_HTTPD_KDCPROXY = "/usr/lib/ipa/ipa-httpd-kdcproxy"
      IPA_ODS_EXPORTER = "/usr/lib/ipa/ipa-ods-exporter"


=====================================
debian/patches/fix-replicainstall.diff
=====================================
--- a/debian/patches/fix-replicainstall.diff
+++ b/debian/patches/fix-replicainstall.diff
@@ -1,6 +1,6 @@
 --- a/ipaserver/install/server/replicainstall.py
 +++ b/ipaserver/install/server/replicainstall.py
-@@ -758,7 +758,7 @@ def install_check(installer):
+@@ -765,7 +765,7 @@ def install_check(installer):
          finally:
              shutil.rmtree(tmp_db_dir)
  


=====================================
debian/patches/hack-tomcat-race.diff
=====================================
--- a/debian/patches/hack-tomcat-race.diff
+++ b/debian/patches/hack-tomcat-race.diff
@@ -1,6 +1,6 @@
 --- a/ipaserver/install/cainstance.py
 +++ b/ipaserver/install/cainstance.py
-@@ -1755,6 +1755,8 @@ def migrate_profiles_to_ldap():
+@@ -1754,6 +1754,8 @@ def migrate_profiles_to_ldap():
      match = re.search(r'^profile\.list=(\S*)', cs_cfg, re.MULTILINE)
      profile_ids = match.group(1).split(',')
  


=====================================
debian/patches/ipa-httpd-pwdreader-force-fqdn.diff
=====================================
--- /dev/null
+++ b/debian/patches/ipa-httpd-pwdreader-force-fqdn.diff
@@ -0,0 +1,10 @@
+--- a/install/tools/ipa-httpd-pwdreader
++++ b/install/tools/ipa-httpd-pwdreader
+@@ -4,6 +4,7 @@
+ # If you'd like to write your custom binary providing passwords to mod_ssl,
+ # see the documentation of the aforementioned directive of the mod_ssl module.
+ 
++HOSTNAME=`hostname -f`
+ USAGE="./ipa-pwdreader host:port RSA|DSA|ECC|number"
+ ERR_UNKNOWN_KEY="\
+ ERROR: You seem to be running a non-standard IPA installation.


=====================================
debian/patches/ldap-multiarch.diff
=====================================
--- a/debian/patches/ldap-multiarch.diff
+++ b/debian/patches/ldap-multiarch.diff
@@ -1,6 +1,6 @@
 --- a/ipaplatform/debian/paths.py
 +++ b/ipaplatform/debian/paths.py
-@@ -65,6 +65,7 @@ class DebianPathNamespace(BasePathNamesp
+@@ -67,6 +67,7 @@ class DebianPathNamespace(BasePathNamesp
      UPDATE_CA_TRUST = "/usr/sbin/update-ca-certificates"
      BIND_LDAP_DNS_IPA_WORKDIR = "/var/cache/bind/dyndb-ldap/ipa/"
      BIND_LDAP_DNS_ZONE_WORKDIR = "/var/cache/bind/dyndb-ldap/ipa/master/"
@@ -10,7 +10,7 @@
      LIB_SYSTEMD_SYSTEMD_DIR = "/lib/systemd/system/"
 --- a/ipaserver/install/ldapupdate.py
 +++ b/ipaserver/install/ldapupdate.py
-@@ -42,6 +42,7 @@ from ipalib import api, create_api
+@@ -43,6 +43,7 @@ from ipalib import api, create_api
  from ipalib import constants
  from ipaplatform.paths import paths
  from ipapython.dn import DN
@@ -18,7 +18,7 @@
  
  if six.PY3:
      unicode = str
-@@ -327,12 +328,15 @@ class LDAPUpdate(object):
+@@ -328,12 +329,15 @@ class LDAPUpdate(object):
             etc.  Determine if a suffix is needed based on the current
             architecture.
          """


=====================================
debian/patches/series
=====================================
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -14,3 +14,8 @@ fix-httpd-group.diff
 support-pam-mkhomedir.diff
 fix-paths.diff
 hack-tomcat-race.diff
+fix-fontawesome-path.diff
+fix-krb5kdc-cert-path.diff
+ipa-httpd-pwdreader-force-fqdn.diff
+dont-allow-compressed-certs.diff
+fix-gzip-path.diff


=====================================
debian/patches/support-pam-mkhomedir.diff
=====================================
--- a/debian/patches/support-pam-mkhomedir.diff
+++ b/debian/patches/support-pam-mkhomedir.diff
@@ -1,6 +1,6 @@
 --- a/ipaplatform/debian/tasks.py
 +++ b/ipaplatform/debian/tasks.py
-@@ -9,14 +9,20 @@ This module contains default Debian-spec
+@@ -11,14 +11,20 @@ from __future__ import absolute_import
  from ipaplatform.base.tasks import BaseTaskNamespace
  from ipaplatform.redhat.tasks import RedHatTaskNamespace
  
@@ -23,7 +23,7 @@
  
      @staticmethod
      def set_nisdomain(nisdomain):
-@@ -25,8 +31,13 @@ class DebianTaskNamespace(RedHatTaskName
+@@ -27,8 +33,13 @@ class DebianTaskNamespace(RedHatTaskName
  
      @staticmethod
      def modify_nsswitch_pam_stack(sssd, mkhomedir, statestore):



View it on GitLab: https://salsa.debian.org/freeipa-team/freeipa/compare/b650aaa87c5429f960de5817c9f3dafc15e5f1d0...c27a35ea0b250c09300a100dc20f0b308a68df7e

-- 
View it on GitLab: https://salsa.debian.org/freeipa-team/freeipa/compare/b650aaa87c5429f960de5817c9f3dafc15e5f1d0...c27a35ea0b250c09300a100dc20f0b308a68df7e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/pkg-freeipa-devel/attachments/20180626/b5621c53/attachment-0001.html>


More information about the Pkg-freeipa-devel mailing list