diff options
author | Ondrej Hamada <ohamada@redhat.com> | 2012-02-07 13:07:09 +0100 |
---|---|---|
committer | Martin Kosek <mkosek@redhat.com> | 2012-02-08 10:43:25 +0100 |
commit | 616d543a54833a1fde6b0098d91ac0f4e14f7a57 (patch) | |
tree | 6b88c2a83ccf1f02c6e1204240105392f396b25f /ipalib | |
parent | 304b70843a96ce2e4effbc1d45144f79fd761d63 (diff) | |
download | freeipa-616d543a54833a1fde6b0098d91ac0f4e14f7a57.tar.gz freeipa-616d543a54833a1fde6b0098d91ac0f4e14f7a57.tar.xz freeipa-616d543a54833a1fde6b0098d91ac0f4e14f7a57.zip |
Memberof attribute control and update
Checking of parameters used by _make_aci funcion was rewritten.
Additional attributes of ACI(type, attribute, memberof, targetgroup,
subtree, filter) could be unset.
Permission plugin now allows to unset memberof value.
https://fedorahosted.org/freeipa/ticket/2255
Added checking of existence of groups that are specified in permission
and delegation module.
https://fedorahosted.org/freeipa/ticket/2286
https://fedorahosted.org/freeipa/ticket/2305
Diffstat (limited to 'ipalib')
-rw-r--r-- | ipalib/plugins/aci.py | 36 |
1 files changed, 21 insertions, 15 deletions
diff --git a/ipalib/plugins/aci.py b/ipalib/plugins/aci.py index e87ac9bff..f0b81f48a 100644 --- a/ipalib/plugins/aci.py +++ b/ipalib/plugins/aci.py @@ -208,22 +208,24 @@ def _make_aci(ldap, current, aciname, kw): Given a name and a set of keywords construct an ACI. """ # Do some quick and dirty validation. - t1 = 'type' in kw - t2 = 'filter' in kw - t3 = 'subtree' in kw - t4 = 'targetgroup' in kw - t5 = 'attrs' in kw - t6 = 'memberof' in kw - if t1 + t2 + t3 + t4 > 1: + checked_args=['type','filter','subtree','targetgroup','attrs','memberof'] + valid={} + for arg in checked_args: + if arg in kw: + valid[arg]=kw[arg] is not None + else: + valid[arg]=False + + if valid['type'] + valid['filter'] + valid['subtree'] + valid['targetgroup'] > 1: raise errors.ValidationError(name='target', error=_('type, filter, subtree and targetgroup are mutually exclusive')) if 'aciprefix' not in kw: raise errors.ValidationError(name='aciprefix', error=_('ACI prefix is required')) - if t1 + t2 + t3 + t4 + t5 + t6 == 0: + if sum(valid.itervalues()) == 0: raise errors.ValidationError(name='target', error=_('at least one of: type, filter, subtree, targetgroup, attrs or memberof are required')) - if t2 + t6 > 1: + if valid['filter'] + valid['memberof'] > 1: raise errors.ValidationError(name='target', error=_('filter and memberof are mutually exclusive')) group = 'group' in kw @@ -262,12 +264,16 @@ def _make_aci(ldap, current, aciname, kw): else: dn = entry_attrs['dn'] a.set_bindrule('groupdn = "ldap:///%s"' % dn) - if 'attrs' in kw: + if valid['attrs']: a.set_target_attr(kw['attrs']) - if 'memberof' in kw: + if valid['memberof']: + try: + api.Command['group_show'](kw['memberof']) + except errors.NotFound: + api.Object['group'].handle_not_found(kw['memberof']) groupdn = _group_from_memberof(kw['memberof']) a.set_target_filter('memberOf=%s' % groupdn) - if 'filter' in kw: + if valid['filter']: # Test the filter by performing a simple search on it. The # filter is considered valid if either it returns some entries # or it returns no entries, otherwise we let whatever exception @@ -279,15 +285,15 @@ def _make_aci(ldap, current, aciname, kw): except errors.NotFound: pass a.set_target_filter(kw['filter']) - if 'type' in kw: + if valid['type']: target = _type_map[kw['type']] a.set_target(target) - if 'targetgroup' in kw: + if valid['targetgroup']: # Purposely no try here so we'll raise a NotFound entry_attrs = api.Command['group_show'](kw['targetgroup'])['result'] target = 'ldap:///%s' % entry_attrs['dn'] a.set_target(target) - if 'subtree' in kw: + if valid['subtree']: # See if the subtree is a full URI target = kw['subtree'] if not target.startswith('ldap:///'): |