Name: | ipa-python-compat |
---|---|
Version: | 4.6.5 |
Release: | 11.0.1.el7_7.3 |
Architecture: | noarch |
Group: | System Environment/Libraries |
Size: | 40724 |
License: | GPLv3+ |
RPM: | ipa-python-compat-4.6.5-11.0.1.el7_7.3.noarch.rpm |
Source RPM: | ipa-4.6.5-11.0.1.el7_7.3.src.rpm |
Build Date: | Tue Oct 15 2019 |
Build Host: | x86-ol7-builder-01.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.freeipa.org/ |
Summary: | Compatiblity package for Python libraries used by IPA |
Description: | IPA is an integrated solution to provide centrally managed Identity (users, hosts, services), Authentication (SSO, 2FA), and Authorization (host access control, SELinux user roles, services). The solution provides features for further integration with Linux based clients (SUDO, automount) and integration with Active Directory based infrastructures (Trusts). This is a compatibility package to accommodate ipa-python split into python2-ipalib and ipa-common. Packages still depending on ipa-python should be fixed to depend on python2-ipaclient or ipa-common instead. |
- Blank out header-logo.png product-name.png - Replace login-screen-logo.png [Orabug: 20362818]
- Resolves: #1756914 - Sub-CA key replication failure - Handle missing LWCA certificate or chain - Fix CustodiaClient ccache handling - CustodiaClient: use ldapi when ldap_uri not specified - CustodiaClient: fix IPASecStore config on ipa-4-7 - Bump krb5 min version
- Resolves: #1752740 - when migrating trusted domain object structure, add default access control definitions, if they were missing in old trust objects - add default access control when migrating trust objects - adtrust: add default read_keys permission for TDO objects - Disable deprecated-lambda check in adtrust upgrade code
- Resolves: 1723473 - ipa upgrade fails with trust entry already exists - adtrust upgrade: fix wrong primary principal name, part 2 - Resolves: 1686302 - ipa trust fetch-domains, server parameter ignored - trust-fetch-domains: make sure we use right KDC when --server is specified
- Resolves: 1723473 - ipa upgrade fails with trust entry already exists - adtrust upgrade: fix wrong primary principal name
- Resolves: 1712794 - ERROR: invalid 'PKINIT enabled server': all masters must have IPA master role enabled - Consider configured servers as valid
- Resolves: 1702651 - Command ipa conole is broken - ipa console: catch proper exception when history file can not be open - Resolves: 1704796 - Wrong CA replication topology created with two replicas - replica install: acknowledge ca_host override - Resolves: 1708873 - Unable to upgrade ipa data: IPA version error: data needs to be upgraded (expected version '4.7.90.pre1-3.fc30', current version '4.7.2-8.fc30') - upgrade: adtrust - catch empty result when retrieving list of trusts
- Resolves: 1704227 - Wrong logic in ipactl restart leads to start instead of restart pki-tomcatd - ipactl restart: fix wrong logic when checking service list
- Resolves: 1700804 - Update Red Hat logo in IdM Server
- Resolves: 1697242 Communication with oddjob helper fails - Bypass D-BUS interface definition deficiences for trust-fetch-domains