summaryrefslogtreecommitdiffstats
path: root/ipalib/plugins/user.py
diff options
context:
space:
mode:
authorPetr Viktorin <pviktori@redhat.com>2014-06-09 17:59:53 +0200
committerPetr Viktorin <pviktori@redhat.com>2014-06-11 13:21:29 +0200
commit2f3cdba54620989afba0ce1b423cddb56b841ab3 (patch)
tree9a2375c4dbdb117f39bc3f6f0a86130b20f190d4 /ipalib/plugins/user.py
parent6acaf73b0c6f7301d5a5d4292a4f9926cc370867 (diff)
downloadfreeipa-2f3cdba54620989afba0ce1b423cddb56b841ab3.tar.gz
freeipa-2f3cdba54620989afba0ce1b423cddb56b841ab3.tar.xz
freeipa-2f3cdba54620989afba0ce1b423cddb56b841ab3.zip
Make 'permission' the default bind type for managed permissions
This reduces typing (or copy/pasting), and draws a bit of attention to any non-default privileges (currently 'any' or 'anonymous'). Leaving the bindtype out by mistake isn't dangerous: by default a permission is not granted to anyone, since it is not included in any priviliges. Reviewed-By: Martin Kosek <mkosek@redhat.com>
Diffstat (limited to 'ipalib/plugins/user.py')
-rw-r--r--ipalib/plugins/user.py9
1 files changed, 0 insertions, 9 deletions
diff --git a/ipalib/plugins/user.py b/ipalib/plugins/user.py
index 73203405e..a1b0643a3 100644
--- a/ipalib/plugins/user.py
+++ b/ipalib/plugins/user.py
@@ -310,7 +310,6 @@ class user(LDAPObject):
},
'System: Read User Kerberos Login Attributes': {
'replaces_global_anonymous_aci': True,
- 'ipapermbindruletype': 'permission',
'ipapermright': {'read', 'search', 'compare'},
'ipapermdefaultattr': {
'krblastsuccessfulauth', 'krblastfailedauth',
@@ -334,13 +333,11 @@ class user(LDAPObject):
'non_object': True,
'ipapermlocation': UPG_DEFINITION_DN,
'ipapermtarget': UPG_DEFINITION_DN,
- 'ipapermbindruletype': 'permission',
'ipapermright': {'read', 'search', 'compare'},
'ipapermdefaultattr': {'*'},
'default_privileges': {'User Administrators'},
},
'System: Add Users': {
- 'ipapermbindruletype': 'permission',
'ipapermright': {'add'},
'replaces': [
'(target = "ldap:///uid=*,cn=users,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Add Users";allow (add) groupdn = "ldap:///cn=Add Users,cn=permissions,cn=pbac,$SUFFIX";)',
@@ -349,7 +346,6 @@ class user(LDAPObject):
},
'System: Add User to default group': {
'non_object': True,
- 'ipapermbindruletype': 'permission',
'ipapermright': {'write'},
'ipapermlocation': DN(api.env.container_group, api.env.basedn),
'ipapermtarget': DN('cn=ipausers', api.env.container_group,
@@ -361,7 +357,6 @@ class user(LDAPObject):
'default_privileges': {'User Administrators'},
},
'System: Change User password': {
- 'ipapermbindruletype': 'permission',
'ipapermright': {'write'},
'ipapermtargetfilter': [
'(objectclass=posixaccount)',
@@ -383,7 +378,6 @@ class user(LDAPObject):
},
},
'System: Manage User SSH Public Keys': {
- 'ipapermbindruletype': 'permission',
'ipapermright': {'write'},
'ipapermdefaultattr': {'ipasshpubkey'},
'replaces': [
@@ -392,7 +386,6 @@ class user(LDAPObject):
'default_privileges': {'User Administrators'},
},
'System: Modify Users': {
- 'ipapermbindruletype': 'permission',
'ipapermright': {'write'},
'ipapermdefaultattr': {
'businesscategory', 'carlicense', 'cn', 'description',
@@ -413,7 +406,6 @@ class user(LDAPObject):
},
},
'System: Remove Users': {
- 'ipapermbindruletype': 'permission',
'ipapermright': {'delete'},
'replaces': [
'(target = "ldap:///uid=*,cn=users,cn=accounts,$SUFFIX")(version 3.0;acl "permission:Remove Users";allow (delete) groupdn = "ldap:///cn=Remove Users,cn=permissions,cn=pbac,$SUFFIX";)',
@@ -421,7 +413,6 @@ class user(LDAPObject):
'default_privileges': {'User Administrators'},
},
'System: Unlock User': {
- 'ipapermbindruletype': 'permission',
'ipapermright': {'write'},
'ipapermdefaultattr': {
'krblastadminunlock', 'krbloginfailedcount', 'nsaccountlock',