freeipa/install
Michael Simacek aad73fad60 Port from python-krbV to python-gssapi
python-krbV library is deprecated and doesn't work with python 3. Replacing all
it's usages with python-gssapi.

- Removed Backend.krb and KRB5_CCache classes
  They were wrappers around krbV classes that cannot really work without them
- Added few utility functions for querying GSSAPI credentials
  in krb_utils module. They provide replacements for KRB5_CCache.
- Merged two kinit_keytab functions
- Changed ldap plugin connection defaults to match ipaldap
- Unified getting default realm
  Using api.env.realm instead of krbV call

Reviewed-By: Jan Cholasta <jcholast@redhat.com>
Reviewed-By: Robbie Harwood <rharwood@redhat.com>
Reviewed-By: Simo Sorce <ssorce@redhat.com>
2015-08-26 09:41:36 +02:00
..
certmonger Modernize 'except' clauses 2015-08-12 18:17:23 +02:00
conf Provide Kerberos over HTTP (MS-KKDCP) 2015-06-24 10:43:58 +02:00
ffextension webui: append network.negotiate-auth.trusted-uris 2014-09-11 09:41:51 +02:00
html webui: add Kerberos configuration instructions for Chrome 2015-07-27 13:50:49 +02:00
migration Replace dict.has_key with the 'in' operator 2015-08-12 18:17:23 +02:00
oddjob Port from python-krbV to python-gssapi 2015-08-26 09:41:36 +02:00
po Replace dict.has_key with the 'in' operator 2015-08-12 18:17:23 +02:00
restart_scripts Modernize 'except' clauses 2015-08-12 18:17:23 +02:00
share Added CLI param and ACL for vault service operations. 2015-08-17 08:10:59 +02:00
tools Port from python-krbV to python-gssapi 2015-08-26 09:41:36 +02:00
ui webui: add LDAP vs Kerberos behavior description to user auth types 2015-08-10 14:54:16 +02:00
updates trusts: harden trust-fetch-domains oddjobd-based script 2015-08-18 18:48:12 +02:00
wsgi Modernize 'except' clauses 2015-08-12 18:17:23 +02:00
configure.ac trusts: add support for one-way trust and switch to it by default 2015-07-08 01:56:52 +02:00
Makefile.am trusts: add support for one-way trust and switch to it by default 2015-07-08 01:56:52 +02:00
README.schema Add some basic rules for adding new schema 2010-08-27 13:40:37 -04:00

Ground rules on adding new schema

Brand new schema, particularly when written specifically for IPA, should be
added in share/*.ldif. Any new files need to be explicitly loaded in
ipaserver/install/dsinstance.py. These simply get copied directly into
the new instance schema directory.

Existing schema (e.g. in an LDAP draft) may either be added as a separate
ldif in share or as an update in the updates directory. The advantage of
adding the schema as an update is if 389-ds ever adds the schema then the
installation won't fail due to existing schema failing to load during
bootstrap.

If the new schema requires a new container then this should be added
to install/bootstrap-template.ldif.