summaryrefslogtreecommitdiffstats
path: root/ipalib
diff options
context:
space:
mode:
authorMartin Kosek <mkosek@redhat.com>2012-08-17 11:00:37 +0200
committerRob Crittenden <rcritten@redhat.com>2012-08-26 23:10:25 -0400
commita5c8dcd996f5b3e39b9b1306453e2a8de4c3a8c0 (patch)
tree0231405bcc015ebddd471ecb05a883b8a9deb705 /ipalib
parent2bf68115cea1bae09c3b45e88ed9e405c57e70d2 (diff)
downloadfreeipa-a5c8dcd996f5b3e39b9b1306453e2a8de4c3a8c0.tar.gz
freeipa-a5c8dcd996f5b3e39b9b1306453e2a8de4c3a8c0.tar.xz
freeipa-a5c8dcd996f5b3e39b9b1306453e2a8de4c3a8c0.zip
Fix managedBy label for DNS zone
Even though managedBy output parameter was only used for failed host managedBy memberships, it was defined in global baseldap.py classes. Incorrect label was then being displayed also for DNS zone per-zone permission attribute with the same name. Move managedBy output parameter to host plugin. Define proper managedBy output parameter in DNS plugin to improve clarity of this attribute. https://fedorahosted.org/freeipa/ticket/2946
Diffstat (limited to 'ipalib')
-rw-r--r--ipalib/plugins/baseldap.py3
-rw-r--r--ipalib/plugins/dns.py13
-rw-r--r--ipalib/plugins/host.py3
3 files changed, 16 insertions, 3 deletions
diff --git a/ipalib/plugins/baseldap.py b/ipalib/plugins/baseldap.py
index 011d62629..5805ba9b7 100644
--- a/ipalib/plugins/baseldap.py
+++ b/ipalib/plugins/baseldap.py
@@ -169,9 +169,6 @@ global_output_params = (
Str('memberservice',
label=_('Failed service/service groups'),
),
- Str('managedby',
- label=_('Failed managedby'),
- ),
Str('failed',
label=_('Failed to remove'),
flags=['suppress_empty'],
diff --git a/ipalib/plugins/dns.py b/ipalib/plugins/dns.py
index 991eb0164..bd637dcd8 100644
--- a/ipalib/plugins/dns.py
+++ b/ipalib/plugins/dns.py
@@ -1531,6 +1531,12 @@ def default_zone_update_policy(zone):
else:
return get_dns_forward_zone_update_policy(api.env.realm)
+dnszone_output_params = (
+ Str('managedby',
+ label=_('Managedby permission'),
+ ),
+)
+
class dnszone(LDAPObject):
"""
DNS Zone, container for resource records.
@@ -1717,6 +1723,7 @@ api.register(dnszone)
class dnszone_add(LDAPCreate):
__doc__ = _('Create new DNS zone (SOA record).')
+ has_output_params = LDAPCreate.has_output_params + dnszone_output_params
takes_options = LDAPCreate.takes_options + (
Flag('force',
label=_('Force'),
@@ -1783,12 +1790,16 @@ api.register(dnszone_del)
class dnszone_mod(LDAPUpdate):
__doc__ = _('Modify DNS zone (SOA record).')
+ has_output_params = LDAPUpdate.has_output_params + dnszone_output_params
+
api.register(dnszone_mod)
class dnszone_find(LDAPSearch):
__doc__ = _('Search for DNS zones (SOA records).')
+ has_output_params = LDAPSearch.has_output_params + dnszone_output_params
+
def args_options_2_params(self, *args, **options):
# FIXME: Check that name_from_ip is valid. This is necessary because
# custom validation rules, including _validate_ipnet, are not
@@ -1833,6 +1844,8 @@ api.register(dnszone_find)
class dnszone_show(LDAPRetrieve):
__doc__ = _('Display information about a DNS zone (SOA record).')
+ has_output_params = LDAPRetrieve.has_output_params + dnszone_output_params
+
api.register(dnszone_show)
diff --git a/ipalib/plugins/host.py b/ipalib/plugins/host.py
index a417ba0f7..319bdf720 100644
--- a/ipalib/plugins/host.py
+++ b/ipalib/plugins/host.py
@@ -172,6 +172,9 @@ host_output_params = (
Str('revocation_reason?',
label=_('Revocation reason'),
),
+ Str('managedby',
+ label=_('Failed managedby'),
+ ),
)
def validate_ipaddr(ugettext, ipaddr):