summaryrefslogtreecommitdiffstats
path: root/ipalib/plugins/sudorule.py
diff options
context:
space:
mode:
authorJr Aquino <jr.aquino@citrixonline.com>2010-10-04 15:56:40 -0700
committerRob Crittenden <rcritten@redhat.com>2010-10-05 21:37:59 -0400
commitbfd2e383dcb0cd5ce156775982e87d6ac32513a3 (patch)
treea65f666dbb982cdd8c1f957469fabdbe6307a401 /ipalib/plugins/sudorule.py
parent7058df65ac4ed9cc45468d17f607f625434283ca (diff)
downloadfreeipa-bfd2e383dcb0cd5ce156775982e87d6ac32513a3.tar.gz
freeipa-bfd2e383dcb0cd5ce156775982e87d6ac32513a3.tar.xz
freeipa-bfd2e383dcb0cd5ce156775982e87d6ac32513a3.zip
Added modifications to the sudorule plugin to reflect the schema update.
Diffstat (limited to 'ipalib/plugins/sudorule.py')
-rw-r--r--ipalib/plugins/sudorule.py58
1 files changed, 41 insertions, 17 deletions
diff --git a/ipalib/plugins/sudorule.py b/ipalib/plugins/sudorule.py
index 3e7038605..434e23ab1 100644
--- a/ipalib/plugins/sudorule.py
+++ b/ipalib/plugins/sudorule.py
@@ -34,14 +34,15 @@ class sudorule(LDAPObject):
object_name_plural = 'Sudo Rules'
object_class = ['ipaassociation', 'ipasudorule']
default_attributes = [
- 'cn', 'accessruletype', 'description',
+ 'cn', 'description',
]
uuid_attribute = 'ipauniqueid'
attribute_members = {
'memberuser': ['user', 'group'],
'memberhost': ['host', 'hostgroup'],
- 'membercmd': ['sudocmd', 'sudocmdgroup'],
+ 'memberallowcmd': ['sudocmd', 'sudocmdgroup'],
+ 'memberdenycmd': ['sudocmd', 'sudocmdgroup'],
}
label = _('SudoRule')
@@ -56,12 +57,6 @@ class sudorule(LDAPObject):
cli_name='desc',
label=_('Description'),
),
- StrEnum('accessruletype',
- cli_name='type',
- doc=_('Rule type (allow or deny)'),
- label=_('Rule type'),
- values=(u'allow', u'deny'),
- ),
Str('memberuser_user?',
label=_('Users'),
flags=['no_create', 'no_update', 'no_search'],
@@ -74,14 +69,23 @@ class sudorule(LDAPObject):
label=_('Host Groups'),
flags=['no_create', 'no_update', 'no_search'],
),
- Str('membercmd_sudocmd?',
- label=_('Sudo Commands'),
+ Str('memberallowcmd_sudocmd?',
+ label=_('Sudo Allow Commands'),
+ flags=['no_create', 'no_update', 'no_search'],
+ ),
+ Str('memberdenycmd_sudocmd?',
+ label=_('Sudo Deny Commands'),
+ flags=['no_create', 'no_update', 'no_search'],
+ ),
+ Str('memberallowcmd_sudocmdgroup?',
+ label=_('Sudo Command Groups'),
flags=['no_create', 'no_update', 'no_search'],
),
- Str('membercmd_sudocmdgroup?',
+ Str('memberdenycmd_sudocmdgroup?',
label=_('Sudo Command Groups'),
flags=['no_create', 'no_update', 'no_search'],
),
+
)
def get_dn(self, *keys, **kwargs):
@@ -139,24 +143,44 @@ class sudorule_show(LDAPRetrieve):
api.register(sudorule_show)
-class sudorule_add_command(LDAPAddMember):
+class sudorule_add_allow_command(LDAPAddMember):
+ """
+ Add commands and sudo command groups affected by Sudo Rule.
+ """
+ member_attributes = ['memberallowcmd']
+ member_count_out = ('%i object added.', '%i objects added.')
+
+api.register(sudorule_add_allow_command)
+
+
+class sudorule_remove_allow_command(LDAPRemoveMember):
+ """
+ Remove commands and sudo command groups affected by Sudo Rule.
+ """
+ member_attributes = ['memberallowcmd']
+ member_count_out = ('%i object removed.', '%i objects removed.')
+
+api.register(sudorule_remove_allow_command)
+
+
+class sudorule_add_deny_command(LDAPAddMember):
"""
Add commands and sudo command groups affected by Sudo Rule.
"""
- member_attributes = ['membercmd']
+ member_attributes = ['memberdenycmd']
member_count_out = ('%i object added.', '%i objects added.')
-api.register(sudorule_add_command)
+api.register(sudorule_add_deny_command)
-class sudorule_remove_command(LDAPRemoveMember):
+class sudorule_remove_deny_command(LDAPRemoveMember):
"""
Remove commands and sudo command groups affected by Sudo Rule.
"""
- member_attributes = ['membercmd']
+ member_attributes = ['memberdenycmd']
member_count_out = ('%i object removed.', '%i objects removed.')
-api.register(sudorule_remove_command)
+api.register(sudorule_remove_deny_command)
class sudorule_add_user(LDAPAddMember):