summaryrefslogtreecommitdiffstats
path: root/ipalib
diff options
context:
space:
mode:
authorPetr Vobornik <pvoborni@redhat.com>2014-10-13 14:57:45 +0200
committerTomas Babej <tbabej@redhat.com>2014-11-11 10:56:16 +0100
commit95a492caec03570cb2b6399c97f196245d11c1f4 (patch)
treeb70a6314d8110af8f402c7d8cc24bf67f177c45f /ipalib
parenta8e2a242bec1ce68d6b14be27e1b5b8d94f0deb9 (diff)
downloadfreeipa-95a492caec03570cb2b6399c97f196245d11c1f4.tar.gz
freeipa-95a492caec03570cb2b6399c97f196245d11c1f4.tar.xz
freeipa-95a492caec03570cb2b6399c97f196245d11c1f4.zip
ranges: prohibit setting --rid-base with ipa-trust-ad-posix type
We should not allow setting --rid-base for ranges of ipa-trust-ad-posix since we do not perform any RID -> UID/GID mappings for these ranges (objects have UID/GID set in AD). Thus, setting RID base makes no sense. Since ipaBaseRID is a MUST in ipaTrustedADDomainRange object class, value '0' is allowed and used internally for 'ipa-trust-ad-posix' range type. No schema change is done. https://fedorahosted.org/freeipa/ticket/4221 Reviewed-By: Tomas Babej <tbabej@redhat.com>
Diffstat (limited to 'ipalib')
-rw-r--r--ipalib/plugins/idrange.py61
1 files changed, 47 insertions, 14 deletions
diff --git a/ipalib/plugins/idrange.py b/ipalib/plugins/idrange.py
index 9e0481e94..6c3be6e69 100644
--- a/ipalib/plugins/idrange.py
+++ b/ipalib/plugins/idrange.py
@@ -248,6 +248,12 @@ class idrange(LDAPObject):
if not options.get('all', False) or options.get('pkey_only', False):
entry_attrs.pop('objectclass', None)
+ def handle_ipabaserid(self, entry_attrs, options):
+ if any((options.get('pkey_only', False), options.get('raw', False))):
+ return
+ if entry_attrs['iparangetype'][0] == u'ipa-ad-trust-posix':
+ entry_attrs.pop('ipabaserid', None)
+
def check_ids_in_modified_range(self, old_base, old_size, new_base,
new_size):
if new_base is None and new_size is None:
@@ -414,6 +420,7 @@ class idrange_add(LDAPCreate):
rid_base = kw.get('ipabaserid', None)
secondary_rid_base = kw.get('ipasecondarybaserid', None)
+ range_type = kw.get('iparangetype', None)
def set_from_prompt(param):
value = self.prompt_param(self.params[param])
@@ -424,7 +431,7 @@ class idrange_add(LDAPCreate):
# This is a trusted range
# Prompt for RID base if domain SID / name was given
- if rid_base is None:
+ if rid_base is None and range_type != u'ipa-ad-trust-posix':
set_from_prompt('ipabaserid')
else:
@@ -486,23 +493,33 @@ class idrange_add(LDAPCreate):
if not is_set('iparangetype'):
entry_attrs['iparangetype'] = u'ipa-ad-trust'
- if entry_attrs['iparangetype'] not in (u'ipa-ad-trust',
- u'ipa-ad-trust-posix'):
+ if entry_attrs['iparangetype'] == u'ipa-ad-trust':
+ if not is_set('ipabaserid'):
+ raise errors.ValidationError(
+ name='ID Range setup',
+ error=_('Options dom-sid/dom-name and rid-base must '
+ 'be used together')
+ )
+ elif entry_attrs['iparangetype'] == u'ipa-ad-trust-posix':
+ if is_set('ipabaserid') and entry_attrs['ipabaserid'] != 0:
+ raise errors.ValidationError(
+ name='ID Range setup',
+ error=_('Option rid-base must not be used when IPA '
+ 'range type is ipa-ad-trust-posix')
+ )
+ else:
+ entry_attrs['ipabaserid'] = 0
+ else:
raise errors.ValidationError(name='ID Range setup',
error=_('IPA Range type must be one of ipa-ad-trust '
'or ipa-ad-trust-posix when SID of the trusted '
- 'domain is specified.'))
+ 'domain is specified'))
if is_set('ipasecondarybaserid'):
raise errors.ValidationError(name='ID Range setup',
error=_('Options dom-sid/dom-name and secondary-rid-base '
'cannot be used together'))
- if not is_set('ipabaserid'):
- raise errors.ValidationError(name='ID Range setup',
- error=_('Options dom-sid/dom-name and rid-base must '
- 'be used together'))
-
# Validate SID as the one of trusted domains
self.obj.validate_trusted_domain_sid(
entry_attrs['ipanttrusteddomainsid'])
@@ -557,6 +574,7 @@ class idrange_add(LDAPCreate):
def post_callback(self, ldap, dn, entry_attrs, *keys, **options):
assert isinstance(dn, DN)
+ self.obj.handle_ipabaserid(entry_attrs, options)
self.obj.handle_iparangetype(entry_attrs, options,
keep_objectclass=True)
return dn
@@ -628,6 +646,7 @@ class idrange_find(LDAPSearch):
def post_callback(self, ldap, entries, truncated, *args, **options):
for entry in entries:
+ self.obj.handle_ipabaserid(entry, options)
self.obj.handle_iparangetype(entry, options)
return truncated
@@ -643,6 +662,7 @@ class idrange_show(LDAPRetrieve):
def post_callback(self, ldap, dn, entry_attrs, *keys, **options):
assert isinstance(dn, DN)
+ self.obj.handle_ipabaserid(entry_attrs, options)
self.obj.handle_iparangetype(entry_attrs, options)
return dn
@@ -699,11 +719,23 @@ class idrange_mod(LDAPUpdate):
raise errors.ValidationError(name='ID Range setup',
error=_('Options dom-sid and secondary-rid-base cannot '
'be used together'))
-
- if not in_updated_attrs('ipabaserid'):
- raise errors.ValidationError(name='ID Range setup',
- error=_('Options dom-sid and rid-base must '
- 'be used together'))
+ range_type = old_attrs['iparangetype'][0]
+ if range_type == u'ipa-ad-trust':
+ if not in_updated_attrs('ipabaserid'):
+ raise errors.ValidationError(
+ name='ID Range setup',
+ error=_('Options dom-sid and rid-base must '
+ 'be used together'))
+ elif (range_type == u'ipa-ad-trust-posix' and
+ 'ipabaserid' in entry_attrs):
+ if entry_attrs['ipabaserid'] is None:
+ entry_attrs['ipabaserid'] = 0
+ elif entry_attrs['ipabaserid'] != 0:
+ raise errors.ValidationError(
+ name='ID Range setup',
+ error=_('Option rid-base must not be used when IPA '
+ 'range type is ipa-ad-trust-posix')
+ )
if is_set('ipanttrusteddomainsid'):
# Validate SID as the one of trusted domains
@@ -766,6 +798,7 @@ class idrange_mod(LDAPUpdate):
def post_callback(self, ldap, dn, entry_attrs, *keys, **options):
assert isinstance(dn, DN)
+ self.obj.handle_ipabaserid(entry_attrs, options)
self.obj.handle_iparangetype(entry_attrs, options)
return dn