freeipa/ipaserver
Fraser Tweedale 49c0a7b4d4 ipa-cacert-manage: handle alternative tracking request CA name
For an externally-signed CA, if an earlier run of ipa-cacert-manage
was interrupted, the CA name in the IPA CA tracking request may have
been left as "dogtag-ipa-ca-renew-agent-reuse" (it gets reverted to
"dogtag-ipa-ca-renew-agent" at the end of the CSR generation
procedure).  `ipa-cacert-manage renew` currently only looks for a
tracking request with the "dogtag-ipa-ca-renew-agent" CA, so in this
scenario the program fails with message "CA certificate is not
tracked by certmonger".

To handle this scenario, if the IPA CA tracking request is not
found, try once again but with the "dogtag-ipa-ca-renew-agent-renew"
CA name.

Part of: https://pagure.io/freeipa/issue/6858

Reviewed-By: Florence Blanc-Renaud <frenaud@redhat.com>
2017-10-04 10:09:18 +02:00
..
advise logging: do not log into the root logger 2017-07-14 15:55:59 +02:00
dnssec dnssec: fix localhsm.py utility script 2017-08-30 16:00:23 +02:00
install ipa-cacert-manage: handle alternative tracking request CA name 2017-10-04 10:09:18 +02:00
plugins Use TLS for the cert-find operation 2017-09-18 11:44:08 +02:00
secrets pylint: fix missing module 2017-09-18 11:41:15 +02:00
__init__.py Change FreeIPA license to GPLv3+ 2010-12-20 17:19:53 -05:00
dcerpc.py py3: set samba dependencies 2017-09-14 14:06:09 +02:00
dns_data_management.py DNS update: reduce timeout for CA records 2017-08-30 13:02:59 +02:00
Makefile.am Build: Makefiles for Python packages 2016-11-09 13:08:32 +01:00
p11helper.py py3: softhsm key_id must be bytes 2017-06-01 09:24:24 +02:00
rpcserver.py rpcserver: don't call xmlserver.Command 2017-09-08 15:42:07 +02:00
servroles.py Do not remove the old masters when setting the attribute fails 2017-07-04 14:42:43 +02:00
setup.cfg Port all setup.py to setuptools 2016-10-20 18:43:37 +02:00
setup.py Turn on NSSOCSP check in mod_nss conf 2017-05-10 09:08:34 +02:00
topology.py fix incorrect suffix handling in topology checks 2017-06-05 18:37:37 +02:00