freeipa/ipaserver/install
Rob Crittenden 5bbe1108d5 Identify CAs to trust from an imported PKCS#12 file
We used to use certutil -O to determine the cert chain to trust. This
behavior changed in F-11 such that untrusted CAs are not displayed.
This is only used when we import PKCS#12 files so use pk12util -l to
display the list of certs and keys in the file to determine the nickname(s)
of the CAs to trust.

509111
2009-07-27 16:04:53 -06:00
..
__init__.py Mass tree reorganization for IPAv2. To view previous history of files use: 2009-02-03 15:27:14 -05:00
bindinstance.py Make --setup-dns work on replica installation 2009-07-22 18:02:22 +02:00
cainstance.py Allow replicas of an IPA server using an internal dogtag server as the CA 2009-07-15 09:00:01 -04:00
certs.py Identify CAs to trust from an imported PKCS#12 file 2009-07-27 16:04:53 -06:00
dsinstance.py Allow replicas of an IPA server using an internal dogtag server as the CA 2009-07-15 09:00:01 -04:00
httpinstance.py Identify CAs to trust from an imported PKCS#12 file 2009-07-27 16:04:53 -06:00
installutils.py Add signing profile to CA installation so we can sign the firefox jar file. 2009-05-04 16:54:42 -04:00
krbinstance.py Use LDAP instead of flat file for zone storage 2009-06-02 12:32:01 +02:00
ldapupdate.py Use the csv module instead of my own hackish lexer. 2009-05-19 09:49:01 -04:00
Makefile.am Implement an installer for the Dogtag certificate system. 2009-04-03 14:06:09 -04:00
ntpinstance.py Rename ipa-python directory to ipapython so it is a real python library 2009-02-09 14:35:15 -05:00
replication.py Rename errors2.py to errors.py. Modify all affected files. 2009-04-23 10:29:14 -04:00
service.py Use LDAP instead of flat file for zone storage 2009-06-02 12:32:01 +02:00