Endi S. Dewata
Endi S. Dewata
> https://github.com/edewata/pki/actions/runs/7895266006/job/21547523359 The test for CA with request notification should be fixed by PR https://github.com/dogtagpki/pki/pull/4670.
`rpminspect` failure: https://github.com/dogtagpki/pki/actions/runs/8057343646/job/22008485308#step:8:4678
@abbra Thanks. The fortify level is mostly fixed by PR #4687 but `rpminspect` is still complaining about that on `tpsclient`: https://github.com/dogtagpki/pki/actions/runs/8253539008/job/22575904372#step:8:5006
This is how the sources are compiled for `tpsclient` according to the build log: > cd /root/pki/build/BUILD/pki-11.6.0-alpha1/redhat-linux-build/base/tools/src/main/native/tpsclient && /usr/bin/g++ -DHAVE_CONFIG_H -I/root/pki/build/BUILD/pki-11.6.0-alpha1/redhat-linux-build/base/tools/src/main/native/tpsclient -I/root/pki/build/BUILD/pki-11.6.0-alpha1/base/tools/src/main/native/tpsclient -I/root/pki/build/BUILD/pki-11.6.0-alpha1/base/tools/src/main/native/tpsclient/src/include -I/root/pki/build/BUILD/pki-11.6.0-alpha1/redhat-linux-build -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/apr-1 -O2 -flto=auto -ffat-lto-objects...
@fmarco76 fyi
@flo-renaud Since we're in exception phase, could you open a RHEL Jira ticket for this and provide the justification?
Thanks. I've added some tests for this (PR #4679) and ran it multiple times but so far the `ipa ca-add` command never fails. Are you using a replica to run...
I've invited you to dogtagpki so you can review the PR.
Hi, thanks for the ticket! Are you using ACME with IPA or with a standalone Dogtag PKI?
Looks like it's used with IPA. Thanks!