Moving to POST as the fix is already available upstream.
An additional test fix is required: master: https://pagure.io/freeipa/c/5a42ab115e85698866219e3edc98ceaf439bab55
Additional test fix: ipa-4-9: https://pagure.io/freeipa/c/09481117b58f1a237bb1048d3fe8d44caf9e167f
Additional test fix: master: 27ab216 ipatests: fix check for AD topology being present ipa-4-9: b6b5f60 ipatests: fix check for AD topology being present
Verified using T1 nightly FIPS pipeline for RHEL9.1 with ipa-server-4.9.8-8.el9.x86_64 https://ci-jenkins-csb-idmops.apps.ocp-c1.prod.psi.redhat.com/view/IPA/job/ipa-RHEL9.1/job/Nightly-FIPS/view/tier-1/ Example particular run: https://ci-jenkins-csb-idmops.apps.ocp-c1.prod.psi.redhat.com/view/IPA/job/ipa-RHEL9.1/job/Nightly-FIPS/job/tier-1-RHEL9.1-Nightly-FIPS-bash-ipa-automember-cli/5/ Relevant problems fixed, marking as verified.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ipa bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:7988