New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix anonymous principal handling in replica install #666
Conversation
ipaserver/install/server/upgrade.py
Outdated
| krb.setup_pkinit() | ||
| if not os.path.exists(paths.KDC_CERT): | ||
| root_logger.info("Requesting PKINIT certificate") | ||
| krb.setup_pkinit() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You should probably stop the execution here in case PKINIT is already set up.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you could perhaps add the outcome of the offline discussion here, please :)
|
I actually did the review of #631 alongside this. |
|
needs rebase |
The anonymous principal will now be checked for presence and created on both server and replica install. This fixes errors caused during replica installation against older master that do not have anonymous principal present. https://pagure.io/freeipa/issue/6799
Since krbinstance code can now handle all operations of the `enabled_anonymous_principal` function from upgrade we can remove extraneous function altogether. https://pagure.io/freeipa/issue/6799
e82000f
to
26bb2d6
Compare
This PR should unblock replica install against <4.5 masters if
--no-pkinitoption is given. Be aware of the non-working WebUI after install, this will be
fixed once local PKINIT will be implemented.
Requires #631