New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove forgotten print from DN.__str__ implementation #2
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
These debug prints were forgotten there and should be removed, because str(DN) is often operation and we may save time with handling exceptions and printing unwanted debug
| Makes sence. |
|
Makes sence. |
|
Makes sense. |
|
m
a
s
t
e
r
:
8 R f p f D i |
|
Sorry testing phase of tools :) Fixed upstream |
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 16, 2019
is successful after adding ldap_deref_threshold=0 in sssd.conf Problem: After adding ldap_deref_threshold=0 setting for sssd for performance enhancement ssh fro ipa client was failing Test Procedure: 1. setup a master and a client 2. add ldap_deref_threshold=0 to sssd.conf 3. add an ipa user 4. ssh from client to master using the user created in step 3 related ticket: https://pagure.io/SSSD/sssd/issue/3979 Removed test_client.py since this test can has added to test_commands.py. SSH after adding performance parameter is tested from controller machine instead of a client machine. Patch freeipa#2 Fixed missing import Patch freeipa#3 Added test cleanup post test Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 17, 2019
Problem: If a replica installation fails before all the services have been enabled then it could leave things in a bad state. ipa-replica-manage del <replica> --cleanup --force invalid 'PKINIT enabled server': all masters must have IPA master role enabled Test Steps: 1. Setup server 2. Setup replica 3. modify the replica entry on Master: ldapmodify -D cn="Directory Manager"-w <passwd> dn: cn=KDC,cn=<replicaFQDN>,cn=masters,cn=ipa,cn=etc,<baseDN> changetype: modify replace: ipaconfigstring ipaconfigstring: pkinitEnabled ipaconfigstring: configuredService 4. On master, run ipa-replica-manage del <replicaFQDN> --cleanup --force Related Ticket: https://pagure.io/freeipa/issue/7929 Patch freeipa#2 fixed linting errors Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 17, 2019
Problem: If a replica installation fails before all the services have been enabled then it could leave things in a bad state. ipa-replica-manage del <replica> --cleanup --force invalid 'PKINIT enabled server': all masters must have IPA master role enabled Test Steps: 1. Setup server 2. Setup replica 3. modify the replica entry on Master: ldapmodify -D cn="Directory Manager"-w <passwd> dn: cn=KDC,cn=<replicaFQDN>,cn=masters,cn=ipa,cn=etc,<baseDN> changetype: modify replace: ipaconfigstring ipaconfigstring: pkinitEnabled ipaconfigstring: configuredService 4. On master, run ipa-replica-manage del <replicaFQDN> --cleanup --force Related Ticket: https://pagure.io/freeipa/issue/7929 Patch freeipa#2 fixed linting errors Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 17, 2019
is successful after adding ldap_deref_threshold=0 in sssd.conf Problem: After adding ldap_deref_threshold=0 setting for sssd for performance enhancement ssh fro ipa client was failing Test Procedure: 1. setup a master and a client 2. add ldap_deref_threshold=0 to sssd.conf 3. add an ipa user 4. ssh from client to master using the user created in step 3 related ticket: https://pagure.io/SSSD/sssd/issue/3979 Removed test_client.py since this test can has added to test_commands.py. SSH after adding performance parameter is tested from controller machine instead of a client machine. Patch freeipa#2 Fixed missing import Patch freeipa#3 Added test cleanup post test Patch freeipa#4 Used modify_sssd_conf instead of parsing lines Patch freeipa#5 Added pytest.xfail based on the sssd package version Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 18, 2019
is successful after adding ldap_deref_threshold=0 in sssd.conf Problem: After adding ldap_deref_threshold=0 setting for sssd for performance enhancement ssh fro ipa client was failing Test Procedure: 1. setup a master and a client 2. add ldap_deref_threshold=0 to sssd.conf 3. add an ipa user 4. ssh from client to master using the user created in step 3 related ticket: https://pagure.io/SSSD/sssd/issue/3979 Removed test_client.py since this test can has added to test_commands.py. SSH after adding performance parameter is tested from controller machine instead of a client machine. Patch freeipa#2 Fixed missing import Patch freeipa#3 Added test cleanup post test Patch freeipa#4 Used modify_sssd_conf instead of parsing lines Patch freeipa#5 Added pytest.xfail based on the sssd package version Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 18, 2019
is successful after adding ldap_deref_threshold=0 in sssd.conf Problem: After adding ldap_deref_threshold=0 setting for sssd for performance enhancement ssh fro ipa client was failing Test Procedure: 1. setup a master and a client 2. add ldap_deref_threshold=0 to sssd.conf 3. add an ipa user 4. ssh from client to master using the user created in step 3 related ticket: https://pagure.io/SSSD/sssd/issue/3979 Removed test_client.py since this test can has added to test_commands.py. SSH after adding performance parameter is tested from controller machine instead of a client machine. Patch freeipa#2 Fixed missing import Patch freeipa#3 Added test cleanup post test Patch freeipa#4 Used modify_sssd_conf instead of parsing lines Patch freeipa#5 Added pytest.xfail based on the sssd package version Patch freeipa#6 Replaced `rpm -qa sssd` call to `sssd --version` Added kinit <username> call Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 18, 2019
is successful after adding ldap_deref_threshold=0 in sssd.conf Problem: After adding ldap_deref_threshold=0 setting for sssd for performance enhancement ssh fro ipa client was failing Test Procedure: 1. setup a master and a client 2. add ldap_deref_threshold=0 to sssd.conf 3. add an ipa user 4. ssh from client to master using the user created in step 3 related ticket: https://pagure.io/SSSD/sssd/issue/3979 Removed test_client.py since this test can has added to test_commands.py. SSH after adding performance parameter is tested from controller machine instead of a client machine. Patch freeipa#2 Fixed missing import Patch freeipa#3 Added test cleanup post test Patch freeipa#4 Used modify_sssd_conf instead of parsing lines Patch freeipa#5 Added pytest.xfail based on the sssd package version Patch freeipa#6 Replaced `rpm -qa sssd` call to `sssd --version` Added kinit <username> call Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 19, 2019
Problem: If a replica installation fails before all the services have been enabled then it could leave things in a bad state. ipa-replica-manage del <replica> --cleanup --force invalid 'PKINIT enabled server': all masters must have IPA master role enabled Test Steps: 1. Setup server 2. Setup replica 3. modify the replica entry on Master: ldapmodify -D cn="Directory Manager"-w <passwd> dn: cn=KDC,cn=<replicaFQDN>,cn=masters,cn=ipa,cn=etc,<baseDN> changetype: modify replace: ipaconfigstring ipaconfigstring: pkinitEnabled ipaconfigstring: configuredService 4. On master, run ipa-replica-manage del <replicaFQDN> --cleanup --force Related Ticket: https://pagure.io/freeipa/issue/7929 Patch freeipa#2 fixed linting errors Patch freeipa#3 Fixed review comments Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 24, 2019
Problem: If a replica installation fails before all the services have been enabled then it could leave things in a bad state. ipa-replica-manage del <replica> --cleanup --force invalid 'PKINIT enabled server': all masters must have IPA master role enabled Test Steps: 1. Setup server 2. Setup replica 3. modify the replica entry on Master: ldapmodify -D cn="Directory Manager"-w <passwd> dn: cn=KDC,cn=<replicaFQDN>,cn=masters,cn=ipa,cn=etc,<baseDN> changetype: modify replace: ipaconfigstring ipaconfigstring: pkinitEnabled ipaconfigstring: configuredService 4. On master, run ipa-replica-manage del <replicaFQDN> --cleanup --force Related Ticket: https://pagure.io/freeipa/issue/7929 Patch freeipa#2 fixed linting errors Patch freeipa#3 Fixed review comments Patch freeipa#4 Removed hard coded realm Other minor changes Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 24, 2019
Problem: If a replica installation fails before all the services have been enabled then it could leave things in a bad state. ipa-replica-manage del <replica> --cleanup --force invalid 'PKINIT enabled server': all masters must have IPA master role enabled Test Steps: 1. Setup server 2. Setup replica 3. modify the replica entry on Master: ldapmodify -D cn="Directory Manager"-w <passwd> dn: cn=KDC,cn=<replicaFQDN>,cn=masters,cn=ipa,cn=etc,<baseDN> changetype: modify replace: ipaconfigstring ipaconfigstring: pkinitEnabled ipaconfigstring: configuredService 4. On master, run ipa-replica-manage del <replicaFQDN> --cleanup --force Related Ticket: https://pagure.io/freeipa/issue/7929 Patch freeipa#2 fixed linting errors Patch freeipa#3 Fixed review comments Patch freeipa#4 Removed hard coded realm Other minor changes Fixed import error Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 24, 2019
is successful after adding ldap_deref_threshold=0 in sssd.conf Problem: After adding ldap_deref_threshold=0 setting for sssd on master for performance enhancement ssh from ipa client was failing Test Procedure: 1. setup a master 2. add ldap_deref_threshold=0 to sssd.conf on master 3. add an ipa user 4. ssh from client to master using the user created in step 3 related ticket: https://pagure.io/SSSD/sssd/issue/3979 Removed test_client.py since this test can has added to test_commands.py. SSH after adding performance parameter is tested from controller machine instead of a client machine. Patch freeipa#2 Fixed missing import Patch freeipa#3 Added test cleanup post test Patch freeipa#4 Used modify_sssd_conf instead of parsing lines Patch freeipa#5 Added pytest.xfail based on the sssd package version Patch freeipa#6 Replaced `rpm -qa sssd` call to `sssd --version` Added kinit <username> call Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 24, 2019
is successful after adding ldap_deref_threshold=0 in sssd.conf Problem: After adding ldap_deref_threshold=0 setting for sssd on master for performance enhancement ssh from ipa client was failing Test Procedure: 1. setup a master 2. add ldap_deref_threshold=0 to sssd.conf on master 3. add an ipa user 4. ssh from controller to master using the user created in step 3 related ticket: https://pagure.io/SSSD/sssd/issue/3979 Removed test_client.py since this test can has added to test_commands.py. SSH after adding performance parameter is tested from controller machine instead of a client machine. Patch freeipa#2 Fixed missing import Patch freeipa#3 Added test cleanup post test Patch freeipa#4 Used modify_sssd_conf instead of parsing lines Patch freeipa#5 Added pytest.xfail based on the sssd package version Patch freeipa#6 Replaced `rpm -qa sssd` call to `sssd --version` Added kinit <username> call Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 24, 2019
Problem: If a replica installation fails before all the services have been enabled then it could leave things in a bad state. ipa-replica-manage del <replica> --cleanup --force invalid 'PKINIT enabled server': all masters must have IPA master role enabled Test Steps: 1. Setup server 2. Setup replica 3. modify the replica entry on Master: ldapmodify -D cn="Directory Manager"-w <passwd> dn: cn=KDC,cn=<replicaFQDN>,cn=masters,cn=ipa,cn=etc,<baseDN> changetype: modify replace: ipaconfigstring ipaconfigstring: pkinitEnabled ipaconfigstring: configuredService 4. On master, run ipa-replica-manage del <replicaFQDN> --cleanup --force Related Ticket: https://pagure.io/freeipa/issue/7929 Patch freeipa#2 fixed linting errors Patch freeipa#3 Fixed review comments Patch freeipa#4 Removed hard coded realm Other minor changes Fixed import error Patch freeipa#5 added test to nightly yamls Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
ssidhaye
added a commit
to ssidhaye/freeipa
that referenced
this pull request
Jul 24, 2019
Problem: If a replica installation fails before all the services have been enabled then it could leave things in a bad state. ipa-replica-manage del <replica> --cleanup --force invalid 'PKINIT enabled server': all masters must have IPA master role enabled Test Steps: 1. Setup server 2. Setup replica 3. modify the replica entry on Master: ldapmodify -D cn="Directory Manager"-w <passwd> dn: cn=KDC,cn=<replicaFQDN>,cn=masters,cn=ipa,cn=etc,<baseDN> changetype: modify replace: ipaconfigstring ipaconfigstring: pkinitEnabled ipaconfigstring: configuredService 4. On master, run ipa-replica-manage del <replicaFQDN> --cleanup --force Related Ticket: https://pagure.io/freeipa/issue/7929 Patch freeipa#2 fixed linting errors Patch freeipa#3 Fixed review comments Patch freeipa#4 Removed hard coded realm Other minor changes Fixed import error Patch freeipa#5 added test to nightly yamls Patch freeipa#6 removed test added to fedora 28 nightly as it is not needed Signed-off-by: Sumedh Sidhaye <ssidhaye@redhat.com>
tiran
referenced
this pull request
in tiran/freeipa
Mar 18, 2020
Added vagrant-libvirt-doc rpm and polkit rule
abbra
pushed a commit
that referenced
this pull request
Jul 23, 2021
test_cert and test_SubCAkeyReplication are randomly failing. The suspect for test_SubCAkeyReplication is an nss bug: https://bugzilla.redhat.com/show_bug.cgi?id=1985061 The reason for test_cert failures was not identified, the only relevant line in the log contains: 2021-07-22T17:37:21.0873339Z tests: cert, result: 1, time: 30:08.98 2021-07-22T17:37:21.0874172Z Command exited with non-zero status 1 Disable these tests in gating until the NSS bug is fixed and the related build is available in Fedora. Related: https://pagure.io/freeipa/issue/8864 Signed-off-by: François Cami <fcami@redhat.com> Reviewed-By: Michal Polovka <mpolovka@redhat.com> Reviewed-By: Stanislav Levin <slev@altlinux.org>
abbra
pushed a commit
that referenced
this pull request
Jul 23, 2021
test_cert and test_SubCAkeyReplication are randomly failing. The suspect for test_SubCAkeyReplication is an nss bug: https://bugzilla.redhat.com/show_bug.cgi?id=1985061 The reason for test_cert failures was not identified, the only relevant line in the log contains: 2021-07-22T17:37:21.0873339Z tests: cert, result: 1, time: 30:08.98 2021-07-22T17:37:21.0874172Z Command exited with non-zero status 1 Disable these tests in gating until the NSS bug is fixed and the related build is available in Fedora. Related: https://pagure.io/freeipa/issue/8864 Signed-off-by: François Cami <fcami@redhat.com> Reviewed-By: Michal Polovka <mpolovka@redhat.com> Reviewed-By: Stanislav Levin <slev@altlinux.org> Reviewed-By: Michal Polovka <mpolovka@redhat.com> Reviewed-By: Stanislav Levin <slev@altlinux.org>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
These debug prints were forgotten there and should be removed, because
str(DN) is often operation and we may save time with handling exceptions
and printing unwanted debug