Learn more about these different git repos.
Other Git URLs
If certificates are stored in the user entry they can be used to generate public SSH keys. If multiple certificates are stored in the user entry and one if them is invalid, the whole SSH key generation is canceled. It would be better if only the invalid certificates are skipped on the others are used to generate the public SSH keys.
Fields changed
owner: somebody => sbose status: new => assigned
rhbz: => todo
This should be a 1.14 stretch goal, but we're not sure we will have the capacity to fix the bug in 1.14.0
milestone: NEEDS_TRIAGE => SSSD 1.14 backlog
patch: 0 => 1
milestone: SSSD 1.14 backlog => SSSD 1.14 alpha
resolution: => fixed status: assigned => closed
Ticket has been cloned to Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1372681
rhbz: todo => [https://bugzilla.redhat.com/show_bug.cgi?id=1372681 1372681]
Linked to Bugzilla bug: https://bugzilla.redhat.com/show_bug.cgi?id=1372042 (Red Hat Enterprise Linux 7)
rhbz: [https://bugzilla.redhat.com/show_bug.cgi?id=1372681 1372681] => [https://bugzilla.redhat.com/show_bug.cgi?id=1372681 1372681], [https://bugzilla.redhat.com/show_bug.cgi?id=1372042 1372042]
Metadata Update from @sbose: - Issue assigned to sbose - Issue set to the milestone: SSSD 1.14 alpha
SSSD is moving from Pagure to Github. This means that new issues and pull requests will be accepted only in SSSD's github repository.
This issue has been cloned to Github and is available here: - https://github.com/SSSD/sssd/issues/4018
If you want to receive further updates on the issue, please navigate to the github issue and click on subscribe button.
subscribe
Thank you for understanding. We apologize for all inconvenience.
Log in to comment on this ticket.