{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":13797797,"defaultBranch":"master","name":"puppet-certs","ownerLogin":"theforeman","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2013-10-23T08:46:31.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1439844?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1715787750.0","currentOid":""},"activityList":{"items":[{"before":"95a9a34e75492b7ad1833d9723a6295b3a78735f","after":"53108c569daa07803e627213e8fd903712b86a69","ref":"refs/heads/master","pushedAt":"2024-06-06T10:42:15.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"ekohl","name":"Ewoud Kohl van Wijngaarden","path":"/ekohl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/155810?s=80&v=4"},"commit":{"message":"Add AlmaLinux 8 & 9 support\n\nAdded AlmaLinux 8 and 9 to the supported operating systems in metadata.json.\n\nThese changes ensure that we start testing with AlmaLinux 8 and 9 instead\nof CentOS 8 Stream. This update is part of our transition to better support\nAlmaLinux in our Puppet modules.\n\nSee, for details: https://github.com/theforeman/foreman-infra/issues/2087","shortMessageHtmlLink":"Add AlmaLinux 8 & 9 support"}},{"before":"8e24284b31a530bad855145a1e725ba55093cc83","after":"95a9a34e75492b7ad1833d9723a6295b3a78735f","ref":"refs/heads/master","pushedAt":"2024-05-29T11:38:01.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"ekohl","name":"Ewoud Kohl van Wijngaarden","path":"/ekohl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/155810?s=80&v=4"},"commit":{"message":"Drop absent file declarations","shortMessageHtmlLink":"Drop absent file declarations"}},{"before":"b74f62ca20ba95b04c951e9832172b45481548e4","after":"8e24284b31a530bad855145a1e725ba55093cc83","ref":"refs/heads/master","pushedAt":"2024-05-15T15:31:55.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"ehelms","name":"Eric Helms","path":"/ehelms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/293363?s=80&v=4"},"commit":{"message":"Release 18.0.0","shortMessageHtmlLink":"Release 18.0.0"}},{"before":"91651c558ab9b0754680068105d61d6590ed8331","after":"b74f62ca20ba95b04c951e9832172b45481548e4","ref":"refs/heads/master","pushedAt":"2024-05-04T10:48:14.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"ekohl","name":"Ewoud Kohl van Wijngaarden","path":"/ekohl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/155810?s=80&v=4"},"commit":{"message":"Ensure hostname directory exists when copying server cert","shortMessageHtmlLink":"Ensure hostname directory exists when copying server cert"}},{"before":"b9667a02bebf6cce0b96fbd631ce34fb27c325ec","after":"91651c558ab9b0754680068105d61d6590ed8331","ref":"refs/heads/master","pushedAt":"2024-05-03T11:45:59.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"ehelms","name":"Eric Helms","path":"/ehelms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/293363?s=80&v=4"},"commit":{"message":"Drop deployment ability of providers and RPM support","shortMessageHtmlLink":"Drop deployment ability of providers and RPM support"}},{"before":"8b4ce222cec5349d426abf73f508a7632d32d371","after":null,"ref":"refs/heads/1711","pushedAt":"2024-04-25T11:10:30.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"}},{"before":"720862433ecb3930e7593ed1478339d8c388be51","after":"86b03a2f608118c52c0039663b037901172cc16a","ref":"refs/heads/17.1-stable","pushedAt":"2024-04-25T11:10:29.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Release 17.1.1","shortMessageHtmlLink":"Release 17.1.1"}},{"before":"152b23be1f7466e89c833a2259fb827f4d341072","after":null,"ref":"refs/heads/1701","pushedAt":"2024-04-25T11:10:21.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"}},{"before":"818b7f2c9cee7724cb87637c2c613e8f6a9a76d4","after":"74feba44c62319aef57ed593ce4f40521b450fb5","ref":"refs/heads/17.0-stable","pushedAt":"2024-04-25T11:10:20.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Release 17.0.1","shortMessageHtmlLink":"Release 17.0.1"}},{"before":null,"after":"8b4ce222cec5349d426abf73f508a7632d32d371","ref":"refs/heads/1711","pushedAt":"2024-04-25T10:23:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Release 17.1.1","shortMessageHtmlLink":"Release 17.1.1"}},{"before":null,"after":"152b23be1f7466e89c833a2259fb827f4d341072","ref":"refs/heads/1701","pushedAt":"2024-04-25T10:19:59.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Release 17.0.1","shortMessageHtmlLink":"Release 17.0.1"}},{"before":"cc7411054cfec65473bea8ab4600ce269e999fd0","after":null,"ref":"refs/heads/1701","pushedAt":"2024-04-25T10:09:30.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"}},{"before":"c1eaa9087a654d3a1bd5584bd9f3e9f2fff6119e","after":"818b7f2c9cee7724cb87637c2c613e8f6a9a76d4","ref":"refs/heads/17.0-stable","pushedAt":"2024-04-25T10:09:30.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fixes #37384 - properly pass fips=false when checking keystore\n\nIn a FIPS-enabled environment, calling `keytool -list` with a wrong\npassword doesn't yield an error, unless we also pass `fips=false` like\nwe do when creating the keystore:\n\n # keytool -list -keystore ./store -storepass wrong-password\n Keystore type: PKCS11\n Keystore provider: SunPKCS11-NSS-FIPS\n\n Your keystore contains 0 entries\n\nPassing `fips=false` makes it correctly raise the expected exception:\n\n # keytool -list -keystore ./store -storepass wrong-password -J-Dcom.redhat.fips=false\n keytool error: java.io.IOException: keystore password was incorrect\n\nFixes: 6fea0bbb4143ca439cff01bf9f0e54cf88140d10\n(cherry picked from commit b9667a02bebf6cce0b96fbd631ce34fb27c325ec)","shortMessageHtmlLink":"Fixes #37384 - properly pass fips=false when checking keystore"}},{"before":"ca88a47c22dc186a51f3e6bdcf946762de86c93b","after":null,"ref":"refs/heads/1711","pushedAt":"2024-04-25T10:09:20.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"}},{"before":"7d1d4d33049e51976bdc03bc0248bb49dbc01b94","after":"720862433ecb3930e7593ed1478339d8c388be51","ref":"refs/heads/17.1-stable","pushedAt":"2024-04-25T10:09:19.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fix tests on EL9\n\n(cherry picked from commit d7e8d4e981036ef5d237f708a5a5b48d69edc470)","shortMessageHtmlLink":"Fix tests on EL9"}},{"before":"ab6eee5311b926d8da6d87b82967dba266f898a6","after":"ca88a47c22dc186a51f3e6bdcf946762de86c93b","ref":"refs/heads/1711","pushedAt":"2024-04-25T09:19:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fix tests on EL9\n\n(cherry picked from commit d7e8d4e981036ef5d237f708a5a5b48d69edc470)","shortMessageHtmlLink":"Fix tests on EL9"}},{"before":"841f298a7af4911511ea8151508e01b9874764f1","after":"ab6eee5311b926d8da6d87b82967dba266f898a6","ref":"refs/heads/1711","pushedAt":"2024-04-25T09:08:46.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fix tests on EL9\n\n(cherry picked from commit d7e8d4e981036ef5d237f708a5a5b48d69edc470)","shortMessageHtmlLink":"Fix tests on EL9"}},{"before":null,"after":"841f298a7af4911511ea8151508e01b9874764f1","ref":"refs/heads/1711","pushedAt":"2024-04-25T08:59:08.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fixes #37384 - properly pass fips=false when checking keystore\n\nIn a FIPS-enabled environment, calling `keytool -list` with a wrong\npassword doesn't yield an error, unless we also pass `fips=false` like\nwe do when creating the keystore:\n\n # keytool -list -keystore ./store -storepass wrong-password\n Keystore type: PKCS11\n Keystore provider: SunPKCS11-NSS-FIPS\n\n Your keystore contains 0 entries\n\nPassing `fips=false` makes it correctly raise the expected exception:\n\n # keytool -list -keystore ./store -storepass wrong-password -J-Dcom.redhat.fips=false\n keytool error: java.io.IOException: keystore password was incorrect\n\nFixes: 6fea0bbb4143ca439cff01bf9f0e54cf88140d10\n(cherry picked from commit b9667a02bebf6cce0b96fbd631ce34fb27c325ec)","shortMessageHtmlLink":"Fixes #37384 - properly pass fips=false when checking keystore"}},{"before":null,"after":"7d1d4d33049e51976bdc03bc0248bb49dbc01b94","ref":"refs/heads/17.1-stable","pushedAt":"2024-04-25T08:58:52.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Release 17.1.0","shortMessageHtmlLink":"Release 17.1.0"}},{"before":null,"after":"cc7411054cfec65473bea8ab4600ce269e999fd0","ref":"refs/heads/1701","pushedAt":"2024-04-25T08:56:44.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fixes #37384 - properly pass fips=false when checking keystore\n\nIn a FIPS-enabled environment, calling `keytool -list` with a wrong\npassword doesn't yield an error, unless we also pass `fips=false` like\nwe do when creating the keystore:\n\n # keytool -list -keystore ./store -storepass wrong-password\n Keystore type: PKCS11\n Keystore provider: SunPKCS11-NSS-FIPS\n\n Your keystore contains 0 entries\n\nPassing `fips=false` makes it correctly raise the expected exception:\n\n # keytool -list -keystore ./store -storepass wrong-password -J-Dcom.redhat.fips=false\n keytool error: java.io.IOException: keystore password was incorrect\n\nFixes: 6fea0bbb4143ca439cff01bf9f0e54cf88140d10\n(cherry picked from commit b9667a02bebf6cce0b96fbd631ce34fb27c325ec)","shortMessageHtmlLink":"Fixes #37384 - properly pass fips=false when checking keystore"}},{"before":null,"after":"c1eaa9087a654d3a1bd5584bd9f3e9f2fff6119e","ref":"refs/heads/17.0-stable","pushedAt":"2024-04-25T08:56:04.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Release 17.0.0","shortMessageHtmlLink":"Release 17.0.0"}},{"before":"d7e8d4e981036ef5d237f708a5a5b48d69edc470","after":"b9667a02bebf6cce0b96fbd631ce34fb27c325ec","ref":"refs/heads/master","pushedAt":"2024-04-25T08:48:09.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fixes #37384 - properly pass fips=false when checking keystore\n\nIn a FIPS-enabled environment, calling `keytool -list` with a wrong\npassword doesn't yield an error, unless we also pass `fips=false` like\nwe do when creating the keystore:\n\n # keytool -list -keystore ./store -storepass wrong-password\n Keystore type: PKCS11\n Keystore provider: SunPKCS11-NSS-FIPS\n\n Your keystore contains 0 entries\n\nPassing `fips=false` makes it correctly raise the expected exception:\n\n # keytool -list -keystore ./store -storepass wrong-password -J-Dcom.redhat.fips=false\n keytool error: java.io.IOException: keystore password was incorrect\n\nFixes: 6fea0bbb4143ca439cff01bf9f0e54cf88140d10","shortMessageHtmlLink":"Fixes #37384 - properly pass fips=false when checking keystore"}},{"before":"50a039920354e2599d2478c936e730bb250c7a11","after":null,"ref":"refs/heads/i37384","pushedAt":"2024-04-25T08:48:09.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"}},{"before":"295eb04f149606eaea47f8c4f64dacd9ff6921ce","after":"50a039920354e2599d2478c936e730bb250c7a11","ref":"refs/heads/i37384","pushedAt":"2024-04-25T08:09:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fixes #37384 - properly pass fips=false when checking keystore\n\nIn a FIPS-enabled environment, calling `keytool -list` with a wrong\npassword doesn't yield an error, unless we also pass `fips=false` like\nwe do when creating the keystore:\n\n # keytool -list -keystore ./store -storepass wrong-password\n Keystore type: PKCS11\n Keystore provider: SunPKCS11-NSS-FIPS\n\n Your keystore contains 0 entries\n\nPassing `fips=false` makes it correctly raise the expected exception:\n\n # keytool -list -keystore ./store -storepass wrong-password -J-Dcom.redhat.fips=false\n keytool error: java.io.IOException: keystore password was incorrect\n\nFixes: 6fea0bbb4143ca439cff01bf9f0e54cf88140d10","shortMessageHtmlLink":"Fixes #37384 - properly pass fips=false when checking keystore"}},{"before":"41fbad8344f875ed2744952e0cd101b8b9255fb4","after":"295eb04f149606eaea47f8c4f64dacd9ff6921ce","ref":"refs/heads/i37384","pushedAt":"2024-04-25T08:08:13.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fixes #37384 - properly pass fips=false when checking keystore\n\nIn a FIPS-enabled environment, calling `keytool -list` with a wrong\npassword doesn't yield an error, unless we also pass `fips=false` like\nwe do when creating the keystore:\n\n # keytool -list -keystore ./store -storepass wrong-password\n Keystore type: PKCS11\n Keystore provider: SunPKCS11-NSS-FIPS\n\n Your keystore contains 0 entries\n\nPassing `fips=false` make it correctly raise the expected exception:\n\n # keytool -list -keystore ./store -storepass wrong-password -J-Dcom.redhat.fips=false\n keytool error: java.io.IOException: keystore password was incorrect\n\nFixes: 6fea0bbb4143ca439cff01bf9f0e54cf88140d10","shortMessageHtmlLink":"Fixes #37384 - properly pass fips=false when checking keystore"}},{"before":"249ea105a17a814d37b65c0c82d270b6d3a72111","after":"41fbad8344f875ed2744952e0cd101b8b9255fb4","ref":"refs/heads/i37384","pushedAt":"2024-04-25T08:07:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fixes #37384 - properly pass fips=false when checking keystore\n\nIn a FIPS-enabled environment, calling `keytool -list` with a wrong\npassword doesn't yield an error, unless we also pass `fips=false` like\nwe do when creating the keystore:\n\n # keytool -list -keystore ./store -storepass wrong-password\n Keystore type: PKCS11\n Keystore provider: SunPKCS11-NSS-FIPS\n\n Your keystore contains 0 entries\n\nPassing `fips=false` make it correctly raise the expected exception:\n\n # keytool -list -keystore ./store -storepass wrong-password -J-Dcom.redhat.fips=false\n keytool error: java.io.IOException: keystore password was incorrect\n\nFixes: 6fea0bbb4143ca439cff01bf9f0e54cf88140d10","shortMessageHtmlLink":"Fixes #37384 - properly pass fips=false when checking keystore"}},{"before":null,"after":"249ea105a17a814d37b65c0c82d270b6d3a72111","ref":"refs/heads/i37384","pushedAt":"2024-04-25T08:07:09.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"evgeni","name":"Evgeni Golov","path":"/evgeni","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/94284?s=80&v=4"},"commit":{"message":"Fixes #37384 - properly pass fips=false when checking keystore\n\nIn a FIPS-enabled environment, calling `keytool -list` with a wrong\npassword doesn't yield an error, unless we also pass `fips=false` like\nwe do when creating the keystore:\n\n # keytool -list -keystore ./store -storepass wrong-password\n Keystore type: PKCS11\n Keystore provider: SunPKCS11-NSS-FIPS\n\n Your keystore contains 0 entries\n\nPassing `fips=false` make it correctly raise the expected exception:\n\n # keytool -list -keystore ./store -storepass wrong-password -J-Dcom.redhat.fips=false\n keytool error: java.io.IOException: keystore password was incorrect","shortMessageHtmlLink":"Fixes #37384 - properly pass fips=false when checking keystore"}},{"before":"18bd6696299360b5d10fc66340c68358c7e3d18d","after":"d7e8d4e981036ef5d237f708a5a5b48d69edc470","ref":"refs/heads/master","pushedAt":"2024-04-23T17:22:00.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"ehelms","name":"Eric Helms","path":"/ehelms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/293363?s=80&v=4"},"commit":{"message":"Fix tests on EL9","shortMessageHtmlLink":"Fix tests on EL9"}},{"before":"39713ae873a7865d367ecbbc39a981e3c45d46a0","after":"18bd6696299360b5d10fc66340c68358c7e3d18d","ref":"refs/heads/master","pushedAt":"2024-04-23T12:43:57.000Z","pushType":"pr_merge","commitsCount":3,"pusher":{"login":"ehelms","name":"Eric Helms","path":"/ehelms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/293363?s=80&v=4"},"commit":{"message":"Copy server cert for Foreman Proxy using file resource","shortMessageHtmlLink":"Copy server cert for Foreman Proxy using file resource"}},{"before":"8626dae23ecb0a174614a54e93fdb38fb4854ef4","after":null,"ref":"refs/heads/copy-server-ca","pushedAt":"2024-03-22T13:49:19.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"ehelms","name":"Eric Helms","path":"/ehelms","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/293363?s=80&v=4"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEXhFGDAA","startCursor":null,"endCursor":null}},"title":"Activity ยท theforeman/puppet-certs"}