Bug 2215542

Summary: [ansible-freeipa] Fix handling of ipapwpolicy attributes usercheck and dictcheck
Product: Red Hat Enterprise Linux 9 Reporter: Thomas Woerner <twoerner>
Component: ansible-freeipaAssignee: Rafael Jeffman <rjeffman>
Status: CLOSED ERRATA QA Contact: Varun Mylaraiah <mvarun>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 9.3CC: mvarun, rjeffman
Target Milestone: rcKeywords: Triaged
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ansible-freeipa-1.11.1-1.el9 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 2215543 (view as bug list) Environment:
Last Closed: 2023-11-07 08:25:33 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2215543    

Description Thomas Woerner 2023-06-16 12:19:57 UTC
Fix handling of ipapwpolicy attributes usercheck and dictcheck. The handling of boolean values that can be cleared by using an empty string should include the same parsing method as the one used by Ansible.

Comment 1 Rafael Jeffman 2023-07-14 14:27:21 UTC
Upstream PR is merged: https://github.com/freeipa/ansible-freeipa/pull/1076

Comment 6 Varun Mylaraiah 2023-08-03 07:44:34 UTC
Verified
ansible-core-2.14.7-1.el9.x86_64
ansible-freeipa-1.11.1-1.el9.noarch

PASSED ansible_freeipa_tests/pwpolicy/test_pwpolicy.py::Testpwpolicy::test_pwpolicy_reset_dictcheck
PASSED ansible_freeipa_tests/pwpolicy/test_pwpolicy.py::Testpwpolicy::test_pwpolicy_reset_usercheck

Based on the above test result, marking the bug Verified

Comment 9 errata-xmlrpc 2023-11-07 08:25:33 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (ansible-freeipa bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:6354