b412308f26
- Resolves: rhbz#2040619 - Changing default pac type to 'nfs:NONE and MS-PAC' doesnot display error 'ipa: ERROR: no modifications to be performed' - Resolves: rhbz#2048510 - [rhel-9.0] Backport latest test fixes in python3-ipatests - Resolves: rhbz#2049104 - User can't log in after ipa-user-mod --user-auth-type=hardened - Resolves: rhbz#2049174 - KRA GetStatus service blocked by IPA proxy
45 lines
2.4 KiB
Diff
45 lines
2.4 KiB
Diff
From 9bae5492270d8b695999cd82831cbee62b04626b Mon Sep 17 00:00:00 2001
|
|
From: Florence Blanc-Renaud <flo@redhat.com>
|
|
Date: Fri, 28 Jan 2022 16:58:42 +0100
|
|
Subject: [PATCH] ipa-pki-proxy.conf: provide access to
|
|
/kra/admin/kra/getStatus
|
|
|
|
The access to /kra/admin/kra/getStatus will be needed
|
|
in order to fix pki-healthcheck.
|
|
Note that this commit is a pre-requisite for the fix
|
|
to be done on PKI side. No test added since the full
|
|
integration test already exists in test_replica_promotion.py,
|
|
in TestHiddenReplicaPromotion::test_ipahealthcheck_hidden_replica
|
|
|
|
Fixes: https://pagure.io/freeipa/issue/9099
|
|
Related: https://pagure.io/freeipa/issue/8582
|
|
|
|
Signed-off-by: Florence Blanc-Renaud <flo@redhat.com>
|
|
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
|
|
---
|
|
install/share/ipa-pki-proxy.conf.template | 4 ++--
|
|
1 file changed, 2 insertions(+), 2 deletions(-)
|
|
|
|
diff --git a/install/share/ipa-pki-proxy.conf.template b/install/share/ipa-pki-proxy.conf.template
|
|
index 96708482cdac128930efaca33a806daaeba68042..7a46f20b9058bab63238f56295a92533c232d47a 100644
|
|
--- a/install/share/ipa-pki-proxy.conf.template
|
|
+++ b/install/share/ipa-pki-proxy.conf.template
|
|
@@ -1,4 +1,4 @@
|
|
-# VERSION 16 - DO NOT REMOVE THIS LINE
|
|
+# VERSION 17 - DO NOT REMOVE THIS LINE
|
|
|
|
ProxyRequests Off
|
|
|
|
@@ -11,7 +11,7 @@ ProxyRequests Off
|
|
</LocationMatch>
|
|
|
|
# matches for admin port and installer
|
|
-<LocationMatch "^/ca/admin/ca/getCertChain|^/ca/admin/ca/getConfigEntries|^/ca/admin/ca/getCookie|^/ca/admin/ca/getStatus|^/ca/admin/ca/securityDomainLogin|^/ca/admin/ca/getDomainXML|^/ca/admin/ca/updateNumberRange|^/ca/admin/ca/tokenAuthenticate|^/ca/admin/ca/updateNumberRange|^/ca/admin/ca/updateDomainXML|^/ca/admin/ca/updateConnector|^/ca/admin/ca/getSubsystemCert|^/kra/admin/kra/updateNumberRange|^/kra/admin/kra/getConfigEntries">
|
|
+<LocationMatch "^/ca/admin/ca/getCertChain|^/ca/admin/ca/getConfigEntries|^/ca/admin/ca/getCookie|^/ca/admin/ca/getStatus|^/ca/admin/ca/securityDomainLogin|^/ca/admin/ca/getDomainXML|^/ca/admin/ca/updateNumberRange|^/ca/admin/ca/tokenAuthenticate|^/ca/admin/ca/updateNumberRange|^/ca/admin/ca/updateDomainXML|^/ca/admin/ca/updateConnector|^/ca/admin/ca/getSubsystemCert|^/kra/admin/kra/updateNumberRange|^/kra/admin/kra/getConfigEntries|^/kra/admin/kra/getStatus">
|
|
SSLOptions +StdEnvVars +ExportCertData +StrictRequire +OptRenegotiate
|
|
SSLVerifyClient none
|
|
ProxyPassMatch ajp://localhost:$DOGTAG_PORT $DOGTAG_AJP_SECRET
|
|
--
|
|
2.34.1
|
|
|