diff --git a/.gitignore b/.gitignore index 2d87067..5a98fc1 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1 @@ -SOURCES/freeipa-4.7.90.pre1.tar.gz +SOURCES/freeipa-4.8.4.tar.gz diff --git a/.ipa.metadata b/.ipa.metadata index ff45819..8d08b2e 100644 --- a/.ipa.metadata +++ b/.ipa.metadata @@ -1 +1 @@ -a61a3e7f174a021934368252c4773da6238de820 SOURCES/freeipa-4.7.90.pre1.tar.gz +72c91f01b2039795223417dc6761edf8ee0f36ee SOURCES/freeipa-4.8.4.tar.gz diff --git a/README.debrand b/README.debrand deleted file mode 100644 index 01c46d2..0000000 --- a/README.debrand +++ /dev/null @@ -1,2 +0,0 @@ -Warning: This package was configured for automatic debranding, but the changes -failed to apply. diff --git a/SOURCES/0001-Correct-default-fontawesome-path-broken-by-da2cf1c5.patch b/SOURCES/0001-Correct-default-fontawesome-path-broken-by-da2cf1c5.patch deleted file mode 100644 index 5d479d6..0000000 --- a/SOURCES/0001-Correct-default-fontawesome-path-broken-by-da2cf1c5.patch +++ /dev/null @@ -1,30 +0,0 @@ -From 486ba017ceab1fb240f2fc48fea6169bc8c97319 Mon Sep 17 00:00:00 2001 -From: Adam Williamson -Date: Wed, 1 May 2019 16:19:53 -0700 -Subject: [PATCH] Correct default fontawesome path (broken by da2cf1c5) - -On Fedora/RHEL, it does not have a dash in it. The changes in -da2cf1c5 inadvertently added a dash to the path in the 'base' -paths definition (used on Fedora/RHEL), so the font wasn't found. - -Signed-off-by: Adam Williamson ---- - ipaplatform/base/paths.py | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/ipaplatform/base/paths.py b/ipaplatform/base/paths.py -index 1cd2591bc..e1d396690 100644 ---- a/ipaplatform/base/paths.py -+++ b/ipaplatform/base/paths.py -@@ -249,7 +249,7 @@ class BasePathNamespace: - USERADD = "/usr/sbin/useradd" - FONTS_DIR = "/usr/share/fonts" - FONTS_OPENSANS_DIR = "/usr/share/fonts/open-sans" -- FONTS_FONTAWESOME_DIR = "/usr/share/fonts/font-awesome" -+ FONTS_FONTAWESOME_DIR = "/usr/share/fonts/fontawesome" - USR_SHARE_IPA_DIR = "/usr/share/ipa/" - USR_SHARE_IPA_CLIENT_DIR = "/usr/share/ipa/client" - CA_TOPOLOGY_ULDIF = "/usr/share/ipa/ca-topology.uldif" --- -2.21.0 - diff --git a/SOURCES/0001-DNS-install-check-Fix-overlapping-DNS-zone-from-the-master-itself_2c2cef7_rhbz#1784003.patch b/SOURCES/0001-DNS-install-check-Fix-overlapping-DNS-zone-from-the-master-itself_2c2cef7_rhbz#1784003.patch new file mode 100644 index 0000000..9fba237 --- /dev/null +++ b/SOURCES/0001-DNS-install-check-Fix-overlapping-DNS-zone-from-the-master-itself_2c2cef7_rhbz#1784003.patch @@ -0,0 +1,47 @@ +From 2c2cef7063315766d893b275185b422be3f3c019 Mon Sep 17 00:00:00 2001 +From: Thomas Woerner +Date: Dec 16 2019 20:37:17 +0000 +Subject: DNS install check: Fix overlapping DNS zone from the master itself + + +The change to allow overlapping zone to be from the master itself has +introduced two issues: The check for the master itself should only executed +if options.force and options.allow_zone_overlap are both false and the +reverse zone check later on was still handling ValueError instead of +dnsutil.DNSZoneAlreadyExists. + +Both issues have been fixed and the deployment with existing name servers +is properly working again. + +Fixes: https://pagure.io/freeipa/issue/8150 +Signed-off-by: Thomas Woerner +Reviewed-By: Florence Blanc-Renaud + +--- + +diff --git a/ipaserver/install/dns.py b/ipaserver/install/dns.py +index 36ba6f8..9f08e86 100644 +--- a/ipaserver/install/dns.py ++++ b/ipaserver/install/dns.py +@@ -135,15 +135,15 @@ def install_check(standalone, api, replica, options, hostname): + logger.warning("%s Please make sure that the domain is " + "properly delegated to this IPA server.", + e) +- +- hst = dnsutil.DNSName(hostname).make_absolute().to_text() +- if hst not in e.kwargs['ns']: +- raise ValueError(str(e)) ++ else: ++ hst = dnsutil.DNSName(hostname).make_absolute().to_text() ++ if hst not in e.kwargs['ns']: ++ raise ValueError(str(e)) + + for reverse_zone in options.reverse_zones: + try: + dnsutil.check_zone_overlap(reverse_zone) +- except ValueError as e: ++ except dnsutil.DNSZoneAlreadyExists as e: + if options.force or options.allow_zone_overlap: + logger.warning('%s', str(e)) + else: + diff --git a/SOURCES/0001-No-need-to-call-rhel-specific-domainname-service.patch b/SOURCES/0001-No-need-to-call-rhel-specific-domainname-service.patch deleted file mode 100644 index bcc4ceb..0000000 --- a/SOURCES/0001-No-need-to-call-rhel-specific-domainname-service.patch +++ /dev/null @@ -1,32 +0,0 @@ -From b3378c32603e83ea3d4651cee3af99e644a30457 Mon Sep 17 00:00:00 2001 -From: Rob Crittenden -Date: Fri, 20 Jul 2018 11:06:55 -0400 -Subject: [PATCH] No need to call rhel-specific domainname service - -It was moved upstream into hostname package which named it -nis-domainname. When it was in the initscripts package there were -separate fedora-domainname and rhel-domainname services. - -From F29+ it will be nis-domainname. We can use that as well in -RHEL 8. ---- - ipaplatform/rhel/services.py | 3 --- - 1 file changed, 3 deletions(-) - -diff --git a/ipaplatform/rhel/services.py b/ipaplatform/rhel/services.py -index 1403d08..06fa633 100644 ---- a/ipaplatform/rhel/services.py -+++ b/ipaplatform/rhel/services.py -@@ -30,9 +30,6 @@ from ipaplatform.redhat import services as redhat_services - # to their actual systemd service names - rhel_system_units = redhat_services.redhat_system_units - --# Service that sets domainname on RHEL is called rhel-domainname.service --rhel_system_units['domainname'] = 'rhel-domainname.service' -- - - # Service classes that implement RHEL-specific behaviour - --- -2.13.6 - diff --git a/SOURCES/0001-revert-minssf-defaults.patch b/SOURCES/0001-revert-minssf-defaults.patch deleted file mode 100644 index 777c13e..0000000 --- a/SOURCES/0001-revert-minssf-defaults.patch +++ /dev/null @@ -1,136 +0,0 @@ -From 8177734d3b6c141c251c74ee29d223a7d414ab13 Mon Sep 17 00:00:00 2001 -From: Alexander Bokovoy -Date: Wed, 1 May 2019 21:25:31 +0300 -Subject: [PATCH] Revert "Require a minimum SASL security factor of 56" - -This reverts commit 350954589774499d99bf87cb5631c664bb0707c4. ---- - install/share/Makefile.am | 1 - - install/share/min-ssf.ldif | 14 -------------- - ipalib/constants.py | 3 --- - ipapython/ipaldap.py | 17 ++--------------- - ipaserver/install/dsinstance.py | 5 ----- - 5 files changed, 2 insertions(+), 38 deletions(-) - delete mode 100644 install/share/min-ssf.ldif - -diff --git a/install/share/Makefile.am b/install/share/Makefile.am -index be83bdf75..8d039d95c 100644 ---- a/install/share/Makefile.am -+++ b/install/share/Makefile.am -@@ -94,7 +94,6 @@ dist_app_DATA = \ - ipa-kdc-proxy.conf.template \ - ipa-pki-proxy.conf.template \ - ipa-rewrite.conf.template \ -- min-ssf.ldif \ - ipaca_default.ini \ - ipaca_customize.ini \ - ipaca_softhsm2.ini \ -diff --git a/install/share/min-ssf.ldif b/install/share/min-ssf.ldif -deleted file mode 100644 -index 1c2566f84..000000000 ---- a/install/share/min-ssf.ldif -+++ /dev/null -@@ -1,14 +0,0 @@ --# config --# pretend SSF for LDAPI connections --# nsslapd-localssf must be equal to or greater than nsslapd-minssf --dn: cn=config --changetype: modify --replace: nsslapd-localssf --nsslapd-localssf: 256 -- --# minimum security strength factor for SASL and TLS --# 56 is considered weak, but some old clients announce wrong SSF. --dn: cn=config --changetype: modify --replace: nsslapd-minssf --nsslapd-minssf: 56 -diff --git a/ipalib/constants.py b/ipalib/constants.py -index bcf6f3373..c22dd26ae 100644 ---- a/ipalib/constants.py -+++ b/ipalib/constants.py -@@ -311,9 +311,6 @@ TLS_VERSIONS = [ - ] - TLS_VERSION_MINIMAL = "tls1.0" - --# minimum SASL secure strength factor for LDAP connections --# 56 provides backwards compatibility with old libraries. --LDAP_SSF_MIN_THRESHOLD = 56 - - # Use cache path - USER_CACHE_PATH = ( -diff --git a/ipapython/ipaldap.py b/ipapython/ipaldap.py -index d9d67be1d..9ff443fe4 100644 ---- a/ipapython/ipaldap.py -+++ b/ipapython/ipaldap.py -@@ -43,9 +43,7 @@ import six - - # pylint: disable=ipa-forbidden-import - from ipalib import errors, x509, _ --from ipalib.constants import ( -- LDAP_GENERALIZED_TIME_FORMAT, LDAP_SSF_MIN_THRESHOLD --) -+from ipalib.constants import LDAP_GENERALIZED_TIME_FORMAT - # pylint: enable=ipa-forbidden-import - from ipaplatform.paths import paths - from ipapython.ipautil import format_netloc, CIDict -@@ -105,8 +103,7 @@ def realm_to_ldapi_uri(realm_name): - return 'ldapi://' + ldapurl.ldapUrlEscape(socketname) - - --def ldap_initialize(uri, cacertfile=None, -- ssf_min_threshold=LDAP_SSF_MIN_THRESHOLD): -+def ldap_initialize(uri, cacertfile=None): - """Wrapper around ldap.initialize() - - The function undoes global and local ldap.conf settings that may cause -@@ -117,10 +114,6 @@ def ldap_initialize(uri, cacertfile=None, - locations, also known as system-wide trust store. - * Cert validation is enforced. - * SSLv2 and SSLv3 are disabled. -- * Require a minimum SASL security factor of 56. That level ensures -- data integrity and confidentiality. Although at least AES128 is -- enforced pretty much everywhere, 56 is required for backwards -- compatibility with systems that announce wrong SSF. - """ - conn = ldap.initialize(uri) - -@@ -128,12 +121,6 @@ def ldap_initialize(uri, cacertfile=None, - conn.set_option(ldap.OPT_X_SASL_NOCANON, ldap.OPT_ON) - - if not uri.startswith('ldapi://'): -- # require a minimum SSF for TCP connections, but don't lower SSF_MIN -- # if the current value is already larger. -- cur_min_ssf = conn.get_option(ldap.OPT_X_SASL_SSF_MIN) -- if cur_min_ssf < ssf_min_threshold: -- conn.set_option(ldap.OPT_X_SASL_SSF_MIN, ssf_min_threshold) -- - if cacertfile: - if not os.path.isfile(cacertfile): - raise IOError(errno.ENOENT, cacertfile) -diff --git a/ipaserver/install/dsinstance.py b/ipaserver/install/dsinstance.py -index 8240e3043..9f05db1db 100644 ---- a/ipaserver/install/dsinstance.py -+++ b/ipaserver/install/dsinstance.py -@@ -324,8 +324,6 @@ class DsInstance(service.Service): - else: - self.step("importing CA certificates from LDAP", - self.__import_ca_certs) -- # set min SSF after DS is configured for TLS -- self.step("require minimal SSF", self.__min_ssf) - self.step("restarting directory server", self.__restart_instance) - - self.start_creation() -@@ -1243,9 +1241,6 @@ class DsInstance(service.Service): - dm_password=self.dm_password - ) - -- def __min_ssf(self): -- self._ldap_mod("min-ssf.ldif") -- - def __add_sudo_binduser(self): - self._ldap_mod("sudobind.ldif", self.sub_dict) - --- -2.21.0 - diff --git a/SOURCES/0002-upgrade-adtrust-when-no-trusts.patch b/SOURCES/0002-upgrade-adtrust-when-no-trusts.patch deleted file mode 100644 index b98c49f..0000000 --- a/SOURCES/0002-upgrade-adtrust-when-no-trusts.patch +++ /dev/null @@ -1,44 +0,0 @@ -From 528a21996734467be193673e4f987e7e3acc3ad9 Mon Sep 17 00:00:00 2001 -From: Alexander Bokovoy -Date: Sat, 11 May 2019 11:54:40 +0300 -Subject: [PATCH] upgrade: adtrust - catch empty result when retrieving list of - trusts - -Upgrade failure when ipa-server-upgrade is being run on a system with no -trust established but trust configured - -Fixes: https://pagure.io/freeipa/issue/7939 ---- - ipaserver/install/plugins/adtrust.py | 16 +++++++++++----- - 1 file changed, 11 insertions(+), 5 deletions(-) - -diff --git a/ipaserver/install/plugins/adtrust.py b/ipaserver/install/plugins/adtrust.py -index 6b4e2caa2..cdc3a8b04 100644 ---- a/ipaserver/install/plugins/adtrust.py -+++ b/ipaserver/install/plugins/adtrust.py -@@ -609,11 +609,17 @@ class update_tdo_to_new_layout(Updater): - - trusts_dn = self.api.env.container_adtrusts + self.api.env.basedn - -- trusts = ldap.get_entries( -- base_dn=trusts_dn, -- scope=ldap.SCOPE_ONELEVEL, -- filter=self.trust_filter, -- attrs_list=self.trust_attrs) -+ # We might be in a situation when no trusts exist yet -+ # In such case there is nothing to upgrade but we have to catch -+ # an exception or it will abort the whole upgrade process -+ try: -+ trusts = ldap.get_entries( -+ base_dn=trusts_dn, -+ scope=ldap.SCOPE_ONELEVEL, -+ filter=self.trust_filter, -+ attrs_list=self.trust_attrs) -+ except errors.EmptyResult: -+ trusts = [] - - # For every trust, retrieve its principals and convert - for t_entry in trusts: --- -2.21.0 - diff --git a/SOURCES/1001-Change-branding-to-IPA-and-Identity-Management.patch b/SOURCES/1001-Change-branding-to-IPA-and-Identity-Management.patch index dd6dc07..be93e35 100644 --- a/SOURCES/1001-Change-branding-to-IPA-and-Identity-Management.patch +++ b/SOURCES/1001-Change-branding-to-IPA-and-Identity-Management.patch @@ -1,15 +1,15 @@ -From 63b3030e2e2f6411ad29448746b96bb9658467f8 Mon Sep 17 00:00:00 2001 +From a98b0595fce7dea121c743455ac5d44a2e282e80 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 02/72] client/man/default.conf.5: Change branding to IPA - and Identity Management +Subject: [PATCH 01/71] client/man/default.conf.5: Change branding to IPA and + Identity Management --- client/man/default.conf.5 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/client/man/default.conf.5 b/client/man/default.conf.5 -index f21d9d5b7..d6c1e42d1 100644 +index 728fc08..6ec8616 100644 --- a/client/man/default.conf.5 +++ b/client/man/default.conf.5 @@ -16,7 +16,7 @@ @@ -22,21 +22,21 @@ index f21d9d5b7..d6c1e42d1 100644 default.conf \- IPA configuration file .SH "SYNOPSIS" -- -2.17.1 +2.21.0 -From 3fe816976ea30d363ae5c6086b8daaaadaa5d7f7 Mon Sep 17 00:00:00 2001 +From 67d0b5bf5b4ce068d3d5a89a36fca44589ba7040 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 03/72] client/man/ipa-certupdate.1: Change branding to IPA - and Identity Management +Subject: [PATCH 02/71] client/man/ipa-certupdate.1: Change branding to IPA and + Identity Management --- client/man/ipa-certupdate.1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/client/man/ipa-certupdate.1 b/client/man/ipa-certupdate.1 -index d95790a36..431b395a9 100644 +index d95790a..431b395 100644 --- a/client/man/ipa-certupdate.1 +++ b/client/man/ipa-certupdate.1 @@ -16,7 +16,7 @@ @@ -49,21 +49,21 @@ index d95790a36..431b395a9 100644 ipa\-certupdate \- Update local IPA certificate databases with certificates from the server .SH "SYNOPSIS" -- -2.17.1 +2.21.0 -From eca4cf0eabb4dee96ca01c02910153147e58ec4d Mon Sep 17 00:00:00 2001 +From 84addd7681276f065e6c974997127d394133d51c Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 04/72] client/man/ipa-client-automount.1: Change branding - to IPA and Identity Management +Subject: [PATCH 03/71] client/man/ipa-client-automount.1: Change branding to + IPA and Identity Management --- client/man/ipa-client-automount.1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/client/man/ipa-client-automount.1 b/client/man/ipa-client-automount.1 -index 343f64160..3f7c7d506 100644 +index 4c3caee..3f6edab 100644 --- a/client/man/ipa-client-automount.1 +++ b/client/man/ipa-client-automount.1 @@ -16,7 +16,7 @@ @@ -76,21 +76,21 @@ index 343f64160..3f7c7d506 100644 ipa\-client\-automount \- Configure automount and NFS for IPA .SH "SYNOPSIS" -- -2.17.1 +2.21.0 -From e4097608a167f41998e863dfed0e3d135c54b6a0 Mon Sep 17 00:00:00 2001 +From d63e2ce893f3fb8a3fcf0ec91893847f942380f6 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 05/72] client/man/ipa-client-install.1: Change branding to - IPA and Identity Management +Subject: [PATCH 04/71] client/man/ipa-client-install.1: Change branding to IPA + and Identity Management --- client/man/ipa-client-install.1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/client/man/ipa-client-install.1 b/client/man/ipa-client-install.1 -index a20bec9a1..d7347ed37 100644 +index 94b4b04..743fa6a 100644 --- a/client/man/ipa-client-install.1 +++ b/client/man/ipa-client-install.1 @@ -1,7 +1,7 @@ @@ -103,21 +103,21 @@ index a20bec9a1..d7347ed37 100644 ipa\-client\-install \- Configure an IPA client .SH "SYNOPSIS" -- -2.17.1 +2.21.0 -From 3bfd21f6778e288b5094262aa481a835b49cc0f4 Mon Sep 17 00:00:00 2001 +From 959face241f87ba6c703b7ae4aa71ff9da60d175 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 06/72] client/man/ipa-getkeytab.1: Change branding to IPA - and Identity Management +Subject: [PATCH 05/71] client/man/ipa-getkeytab.1: Change branding to IPA and + Identity Management --- client/man/ipa-getkeytab.1 | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/client/man/ipa-getkeytab.1 b/client/man/ipa-getkeytab.1 -index 20ceee2e6..061798693 100644 +index f06fcd9..01a2618 100644 --- a/client/man/ipa-getkeytab.1 +++ b/client/man/ipa-getkeytab.1 @@ -17,7 +17,7 @@ @@ -129,7 +129,7 @@ index 20ceee2e6..061798693 100644 .SH "NAME" ipa\-getkeytab \- Get a keytab for a Kerberos principal .SH "SYNOPSIS" -@@ -117,7 +117,7 @@ GSSAPI or EXTERNAL. +@@ -118,7 +118,7 @@ GSSAPI or EXTERNAL. \fB\-r\fR Retrieve mode. Retrieve an existing key from the server instead of generating a new one. This is incompatible with the \-\-password option, and will work only @@ -139,13 +139,13 @@ index 20ceee2e6..061798693 100644 .SH "EXAMPLES" Add and retrieve a keytab for the NFS service principal on -- -2.17.1 +2.21.0 -From 812ccffd549367cac3e4d2896b231b7b278e0b92 Mon Sep 17 00:00:00 2001 +From f6a2e0baebd1969de46a0ea92b68bb0742459235 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 07/72] client/man/ipa-join.1: Change branding to IPA and +Subject: [PATCH 06/71] client/man/ipa-join.1: Change branding to IPA and Identity Management --- @@ -153,7 +153,7 @@ Subject: [PATCH 07/72] client/man/ipa-join.1: Change branding to IPA and 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/client/man/ipa-join.1 b/client/man/ipa-join.1 -index d88160784..30b667558 100644 +index d881607..30b6675 100644 --- a/client/man/ipa-join.1 +++ b/client/man/ipa-join.1 @@ -16,7 +16,7 @@ @@ -166,21 +166,21 @@ index d88160784..30b667558 100644 ipa\-join \- Join a machine to an IPA realm and get a keytab for the host service principal .SH "SYNOPSIS" -- -2.17.1 +2.21.0 -From 3cac7f131059c01306b1db34fc30345add3fcf11 Mon Sep 17 00:00:00 2001 +From fcf92b11295321a8df6eb27babcc959926a59fe3 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 08/72] client/man/ipa-rmkeytab.1: Change branding to IPA - and Identity Management +Subject: [PATCH 07/71] client/man/ipa-rmkeytab.1: Change branding to IPA and + Identity Management --- client/man/ipa-rmkeytab.1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/client/man/ipa-rmkeytab.1 b/client/man/ipa-rmkeytab.1 -index 53f775439..2c8218c94 100644 +index 53f7754..2c8218c 100644 --- a/client/man/ipa-rmkeytab.1 +++ b/client/man/ipa-rmkeytab.1 @@ -17,7 +17,7 @@ @@ -193,21 +193,21 @@ index 53f775439..2c8218c94 100644 ipa\-rmkeytab \- Remove a kerberos principal from a keytab .SH "SYNOPSIS" -- -2.17.1 +2.21.0 -From 0373bb1499f50bf4c04becabf2e773dd5977060e Mon Sep 17 00:00:00 2001 +From 8978dadb62b23014d5d82547e16c07c575c7cf56 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 09/72] client/man/ipa.1: Change branding to IPA and - Identity Management +Subject: [PATCH 08/71] client/man/ipa.1: Change branding to IPA and Identity + Management --- client/man/ipa.1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/client/man/ipa.1 b/client/man/ipa.1 -index f9fae7c0d..2fb21b52d 100644 +index f9fae7c..2fb21b5 100644 --- a/client/man/ipa.1 +++ b/client/man/ipa.1 @@ -16,7 +16,7 @@ @@ -220,21 +220,21 @@ index f9fae7c0d..2fb21b52d 100644 ipa \- IPA command\-line interface .SH "SYNOPSIS" -- -2.17.1 +2.21.0 -From 36b7dce706ec2b0b650c51cea24be0655fd0c096 Mon Sep 17 00:00:00 2001 +From d2a614533c0d7c1203d9251dc557871bc8962efd Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 10/72] install/html/ssbrowser.html: Change branding to IPA - and Identity Management +Subject: [PATCH 09/71] install/html/ssbrowser.html: Change branding to IPA and + Identity Management --- install/html/ssbrowser.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/install/html/ssbrowser.html b/install/html/ssbrowser.html -index faa7e657b..89ada7cb1 100644 +index faa7e65..89ada7c 100644 --- a/install/html/ssbrowser.html +++ b/install/html/ssbrowser.html @@ -2,7 +2,7 @@ @@ -256,21 +256,21 @@ index faa7e657b..89ada7cb1 100644 -- -2.17.1 +2.21.0 -From 9273d2fdee9baef212eeaac941b7c8b497d50728 Mon Sep 17 00:00:00 2001 +From 199f34178cd8dfff0fd5edd37472787bbd3b4320 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 11/72] install/html/unauthorized.html: Change branding to - IPA and Identity Management +Subject: [PATCH 10/71] install/html/unauthorized.html: Change branding to IPA + and Identity Management --- install/html/unauthorized.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/install/html/unauthorized.html b/install/html/unauthorized.html -index 630982da8..b8c64d69d 100644 +index 630982d..b8c64d6 100644 --- a/install/html/unauthorized.html +++ b/install/html/unauthorized.html @@ -2,7 +2,7 @@ @@ -292,13 +292,13 @@ index 630982da8..b8c64d69d 100644 -- -2.17.1 +2.21.0 -From b9d7e2a0d08d8d03f1fbaaae6268292934f894f0 Mon Sep 17 00:00:00 2001 +From 116e40f79a289aa4817cee7d8fbb4935b6346997 Mon Sep 17 00:00:00 2001 From: Alexander Bokovoy Date: Sun, 7 Oct 2018 12:25:39 +0300 -Subject: [PATCH 12/72] install/migration/index.html: Change branding to IPA +Subject: [PATCH 11/71] install/migration/index.html: Change branding to IPA and Identity Management --- @@ -306,7 +306,7 @@ Subject: [PATCH 12/72] install/migration/index.html: Change branding to IPA 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/install/migration/index.html b/install/migration/index.html -index fca517cdc..b5ac1f6df 100644 +index fca517c..b5ac1f6 100644 --- a/install/migration/index.html +++ b/install/migration/index.html @@ -2,7 +2,7 @@ @@ -319,21 +319,21 @@ index fca517cdc..b5ac1f6df 100644