summaryrefslogtreecommitdiffstats
path: root/ipalib/plugins/hbacrule.py
diff options
context:
space:
mode:
authorPetr Viktorin <pviktori@redhat.com>2014-03-26 15:33:49 +0100
committerPetr Viktorin <pviktori@redhat.com>2014-04-09 13:40:42 +0200
commit39327dbb75e92e4184bdda2dbd802cf349866861 (patch)
treee221a698e3e9681e755c9533371e52e6d2fc3173 /ipalib/plugins/hbacrule.py
parent218a2617427a63c7e3d79427923e7986411af786 (diff)
downloadfreeipa-39327dbb75e92e4184bdda2dbd802cf349866861.tar.gz
freeipa-39327dbb75e92e4184bdda2dbd802cf349866861.tar.xz
freeipa-39327dbb75e92e4184bdda2dbd802cf349866861.zip
Add managed read permissions to HBAC objects
Part of the work for: https://fedorahosted.org/freeipa/ticket/3566 Reviewed-By: Martin Kosek <mkosek@redhat.com>
Diffstat (limited to 'ipalib/plugins/hbacrule.py')
-rw-r--r--ipalib/plugins/hbacrule.py15
1 files changed, 15 insertions, 0 deletions
diff --git a/ipalib/plugins/hbacrule.py b/ipalib/plugins/hbacrule.py
index 99758b25a..52abb408b 100644
--- a/ipalib/plugins/hbacrule.py
+++ b/ipalib/plugins/hbacrule.py
@@ -115,6 +115,7 @@ class hbacrule(LDAPObject):
object_name = _('HBAC rule')
object_name_plural = _('HBAC rules')
object_class = ['ipaassociation', 'ipahbacrule']
+ permission_filter_objectclasses = ['ipahbacrule']
default_attributes = [
'cn', 'ipaenabledflag',
'description', 'usercategory', 'hostcategory',
@@ -130,6 +131,20 @@ class hbacrule(LDAPObject):
'sourcehost': ['host', 'hostgroup'],
'memberservice': ['hbacsvc', 'hbacsvcgroup'],
}
+ managed_permissions = {
+ 'System: Read HBAC Rules': {
+ 'replaces_global_anonymous_aci': True,
+ 'ipapermbindruletype': 'all',
+ 'ipapermright': {'read', 'search', 'compare'},
+ 'ipapermdefaultattr': {
+ 'accessruletype', 'accesstime', 'cn', 'description',
+ 'externalhost', 'hostcategory', 'ipaenabledflag',
+ 'ipauniqueid', 'memberhost', 'memberservice', 'memberuser',
+ 'servicecategory', 'sourcehost', 'sourcehostcategory',
+ 'usercategory', 'objectclass',
+ },
+ },
+ }
label = _('HBAC Rules')
label_singular = _('HBAC Rule')