ipa/0071-Replace-fips-mode-setup.patch
Florence Blanc-Renaud 518fbd80d0 ipa-4.12.2-16
- Resolves: RHEL-84648 ipa-cacert-manage install fails with CAs having the same subject DN (subject key mismatch info)
- Resolves: RHEL-84279 IPU 9 -> 10: ipa-server breaks the in-place upgrade due to failed scriptlet
- Resolves: RHEL-84275 Search size limit tooltip has Search time limit tooltip text
- Resolves: RHEL-81200 Ipa client --raw --structured throws internal error
- Resolves: RHEL-68803 ipa-migrate with LDIF file from backup of remote server, fails with error 'change collided with another change'
- Resolves: RHEL-67686 [RFE] IDM support UIDs up to 4,294,967,293
- Resolves: RHEL-67633 ipa-healthcheck has tests which call fips-mode-setup
- Resolves: RHEL-4845 Protect *all* IPA service principals
2025-03-24 11:56:22 +01:00

66 lines
2.6 KiB
Diff

From 460281f4508864ef25b3b9992e5922e7947a3109 Mon Sep 17 00:00:00 2001
From: David Hanina <dhanina@redhat.com>
Date: Tue, 18 Feb 2025 15:36:12 +0100
Subject: [PATCH] Replace fips-mode-setup
RHEL10 no longer support fips-setup-mode, this has been
replaced in the healthcheck tool, but also needs to be replaced here.
Fixes: https://pagure.io/freeipa/issue/9750
Signed-off-by: David Hanina <dhanina@redhat.com>
Reviewed-By: Florence Blanc-Renaud <flo@redhat.com>
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
---
ipaplatform/base/paths.py | 1 -
ipatests/test_integration/test_ipahealthcheck.py | 15 ++++++---------
2 files changed, 6 insertions(+), 10 deletions(-)
diff --git a/ipaplatform/base/paths.py b/ipaplatform/base/paths.py
index b2da94992a031878fc20a98ff1023c2f5c80acca..6a62d7bd0a2f75f43f6dd62fccbaa84a1c9929c0 100644
--- a/ipaplatform/base/paths.py
+++ b/ipaplatform/base/paths.py
@@ -28,7 +28,6 @@ class BasePathNamespace:
BIN_HOSTNAMECTL = "/bin/hostnamectl"
CRYPTO_POLICY_OPENSSLCNF_FILE = None
ECHO = "/bin/echo"
- FIPS_MODE_SETUP = "/bin/fips-mode-setup"
GZIP = "/bin/gzip"
LS = "/bin/ls"
SYSTEMCTL = "/bin/systemctl"
diff --git a/ipatests/test_integration/test_ipahealthcheck.py b/ipatests/test_integration/test_ipahealthcheck.py
index 05a0adb24a3f26d70d0690462e7c0fefbf98c6e6..9f4017e35ec89d19f8d1bd354ecdd8fb21071e6a 100644
--- a/ipatests/test_integration/test_ipahealthcheck.py
+++ b/ipatests/test_integration/test_ipahealthcheck.py
@@ -377,21 +377,18 @@ class TestIpaHealthCheck(IntegrationTest):
failures_only=False)
assert returncode == 0
- cmd = self.master.run_command(
- [paths.FIPS_MODE_SETUP, "--is-enabled"], raiseonerr=False
- )
- returncode = cmd.returncode
+ is_fips_enabled = tasks.is_fips_enabled(self.master)
assert "fips" in check[0]["kw"]
if check[0]["kw"]["fips"] == "disabled":
- assert returncode == 2
+ assert not is_fips_enabled
elif check[0]["kw"]["fips"] == "enabled":
- assert returncode == 0
- elif check[0]["kw"]["fips"] == f"missing {paths.FIPS_MODE_SETUP}":
- assert returncode == 127
+ assert is_fips_enabled
else:
- assert returncode == 1
+ raise ValueError("File %s doesn't exist or contains unexpected "
+ "value, this is a kernel issue!"
+ % paths.PROC_FIPS_ENABLED)
def test_ipa_healthcheck_after_certupdate(self):
"""
--
2.48.1