summaryrefslogtreecommitdiffstats
path: root/ipa-server/xmlrpc-server
Commit message (Collapse)AuthorAgeFilesLines
* Rename memberOf to group_members in xml-rpc interface.Karl MacMillan2007-10-312-2/+2
|
* Add memberOf API call to the XML-RPC interfaceRob Crittenden2007-10-302-0/+32
| | | | Make find-groups use memberOf to have a prettier dispaly of members
* Create configuration for MIT Windows kerberos client and install intoRob Crittenden2007-10-291-1/+4
| | | | | http://hostname/config so users can point their MIT client at the IPA server and automatically fetch the configuration.
* Add delete user and group to webgui.Kevin McCarthy2007-10-231-3/+2
| | | | NOTE: this doesn't handle referential integrity.
* Add an LDAP attribute -> label mapping function to XML-RPC layerRob Crittenden2007-10-224-0/+66
| | | | Move some ACI functions around in preparation for cli delegation
* update_user and update_group need to be defined differently in orderRob Crittenden2007-10-221-2/+6
| | | | to be available to the XML-RPC interface
* Finish the email autosuggest.Kevin McCarthy2007-10-182-1/+11
| | | | | For now I've added a new API call. The field-specific searching is a ways off.
* Require SSL for the XML-RPC interfaceRob Crittenden2007-10-191-0/+7
|
* Autotool ipa-server - patch from William Jon McCann <mccann@jhu.edu>.Karl MacMillan2007-10-173-13/+44
|
* Creates an update_entry api call, aliases update_user and update_group to it.Kevin McCarthy2007-10-152-6/+7
|
* Adds delegation listing and creation to the GUI.Kevin McCarthy2007-10-122-0/+10
|
* Remove buggy connection caching. Create a new connection for each LDAPRob Crittenden2007-10-121-36/+7
| | | | request.
* Add inetUser objectclass. Remove test-users ldif.Kevin McCarthy2007-10-111-3/+5
|
* Refactor the __get_entry into __get_base_entry and __get_sub_entry().Kevin McCarthy2007-10-111-11/+31
| | | | | The API needs to be thought about, but this is a quick fix w/minimal impact to allow get_entry_by_dn do work on non-leaf entries.
* Merge.Karl MacMillan2007-10-092-34/+27
|\
| * Combine get_user/group by dn/cn into get_entry_by_cn/dn.Kevin McCarthy2007-10-092-34/+27
| | | | | | | | Also a couple double-escaping fixes I missed in the last patch.
* | Karl MacMillan wrote:Karl MacMillan2007-10-091-5/+5
|/ | | | | | | | | | | | | > > This largish patch makes the build and installation work on 64bit > > machines. The only catch here is that to get a 64bit build you need to > > set LIBDIR on make: > > > > make install LIBDIR=/usr/lib64 > > > > The spec file does this correctly. I couldn't find any reliable way to > > guess this that works both on real systems and in the almost entirely > > empty rpm build root (you can't, for example, check for the existence > > of /usr/lib64).
* Several escaping fixes:Kevin McCarthy2007-10-051-2/+7
| | | | | | - illegal dn characters need to be escaped - null characters in search filters - dynamicedit.js was double html escaping (the python layer does it already)
* New LDAP connection pool that does lockingRob Crittenden2007-10-081-24/+62
|
* Try to catch more error conditions during installationrcritten@redhat.com2007-10-031-2/+5
| | | | | | Modify the way we detect SELinux to use selinuxenabled instead of using a try/except. Handle SASL/GSSAPI authentication failures when getting a connection
* Add the rest of the user fields to the user pages.Kevin McCarthy2007-10-031-1/+1
|
* I broke add_groups_to_user and remove_groups_from_user with myrcritten@redhat.com2007-10-021-6/+2
| | | | "use group DN" patch. This fixes it.
* Do group operations based on the group DN, not the CNrcritten@redhat.com2007-10-021-31/+30
| | | | | Add new class of errors for connections Raise an exception if a connection cannot be made due to missing ccache
* Rely more on kerberos.Simo Sorce2007-10-012-27/+31
| | | | | | | Don't read ipa.conf to get the realm, the kerberos libs do that for you. Use the krbPrincipalName to change passwords Make it possible to specify the principal at user creation. Mail is not a required attribute so far, don't require it.
* Add group management to the user edit page.Kevin McCarthy2007-09-282-0/+52
| | | | Added a couple more API calls to make the inverse operations easier.
* Don't include opts in any public argument lists. It is used internally only.rcritten@redhat.com2007-10-011-0/+3
|
* patch queue: add_filters.patchKevin McCarthy2007-09-271-0/+3
|
* Make timelimit a parameter to the find methods.Kevin McCarthy2007-09-271-8/+4
|
* Misc small fixes:Kevin McCarthy2007-09-251-5/+25
| | | | | | | | | | - Members of groups are clickable - Combine name and uid into a single column in find users - Remove license plate from searching - Mailto links on user emails - Add timelimit to finds. This is experimental... - Fix usersearch to only search on objectClass=Person - Change search to use get parameter
* Adds methods to manipulate groups by dns.Kevin McCarthy2007-09-262-40/+100
| | | | | Renamed some of the user_group parameters to be self-evident. Binary wrapping isn't necessary on strings, so removed from xmlrpc calls.
* Fix a couple of XML-RPC functions that were missing the opts argumentrcritten@redhat.com2007-09-263-4/+67
| | | | Include a kerberized XML-RPC client that will list the XML-RPC API
* Adds manager and direct reports to usershow page.Kevin McCarthy2007-09-252-2/+17
| | | | Fixes a bug with the group by member where is wasn't trapping not found errors.
* Show the list of groups a user belongs to.Kevin McCarthy2007-09-252-2/+26
|
* Use a different directory for test programsrcritten@redhat.com2007-09-252-3/+4
|
* Make doing basic testing of Kerberos ticket forwarding and system setuprcritten@redhat.com2007-09-254-12/+203
| | | | easier.
* Fix error when using with TurboGearsrcritten@redhat.com2007-09-251-2/+3
|
* Install the error web pagesrcritten@redhat.com2007-09-241-0/+2
|
* Show (hopefully) useful information if the Kerberos connection fails.rcritten@redhat.com2007-09-243-0/+86
|
* Print the request environment for debugging purposes.rcritten@redhat.com2007-09-241-0/+11
|
* Enable LDAP debugging using the mod_python Apache configuration directivercritten@redhat.com2007-09-213-8/+17
| | | | PythonOption IPADebug On/Off
* Don't fall back on proxy authentication. We don't generate the certificatesrcritten@redhat.com2007-09-241-4/+7
| | | | anymore and that failure just causes more confusion.
* Merge conflicts between rob and kevin patchesSimo Sorce2007-09-201-13/+60
|\
| * Handle add/remove failures a little bit better.Kevin McCarthy2007-09-191-2/+2
| | | | | | | | | | Still some refinements that can be done, but at least it shows the failures now.
| * Implement asynchronous search for groups.Kevin McCarthy2007-09-191-8/+55
| | | | | | | | Use the filter generation code to search on multiple fields.
| * Add client-side search limit parameter for user search.Kevin McCarthy2007-09-181-3/+3
| | | | | | | | | | Limit editgroup user ajax search. Minor UI cleanup for editgroup.
* | Use ticket forwarding with TurboGears. mod_proxy forwards the principalrcritten@redhat.com2007-09-143-21/+24
| | | | | | | | | | | | name and location of the keytab. In order for this keytab to be usable TurboGears and Apache will need to run as the same user. We will also need to listen only on localhost in TG.
* | Add function to allow user's to set/reset their kerberos passwordrcritten@redhat.com2007-09-112-0/+19
|/ | | | Remove some unused calls to retrieve the current realm
* Enable mod_proxy to sit in front of TurboGears and pass along thercritten2007-09-101-2/+34
| | | | | | | | | | kerberos principal name Add an identity an visit class to TurboGears that can handle the user without requiring a database Update the UI to show the user correctly. Note that this is currently disabled. It is hardcoded to always return the principal test@FREEIPA.ORG in proxyprovider.py It doesn't handle an unauthorized request because that can never happen.
* small release fixes:Kevin McCarthy2007-09-071-1/+1
| | | | | - Make password not required for add person - Fix for searching on '*' or ''
* Enable LDAP SASL authentication using a forwarded kerberos ticketrcritten@redhat.com2007-09-052-121/+128
| | | | | | Handle both SASL auth and proxied authentication Refactor LDAP connection code to be simpler Other small bug fixes