mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
Rely more on kerberos.
Don't read ipa.conf to get the realm, the kerberos libs do that for you. Use the krbPrincipalName to change passwords Make it possible to specify the principal at user creation. Mail is not a required attribute so far, don't require it.
This commit is contained in:
parent
5750ebdd83
commit
cfac4acf9f
@ -28,6 +28,7 @@ import ipa.config
|
|||||||
|
|
||||||
import xmlrpclib
|
import xmlrpclib
|
||||||
import kerberos
|
import kerberos
|
||||||
|
import krbV
|
||||||
import ldap
|
import ldap
|
||||||
import getpass
|
import getpass
|
||||||
|
|
||||||
@ -51,8 +52,10 @@ def parse_options():
|
|||||||
help="Set user's login shell to shell")
|
help="Set user's login shell to shell")
|
||||||
parser.add_option("-G", "--groups", dest="groups",
|
parser.add_option("-G", "--groups", dest="groups",
|
||||||
help="Add account to one or more groups (comma-separated)")
|
help="Add account to one or more groups (comma-separated)")
|
||||||
|
parser.add_option("-k", "--krb-principal", dest="principal",
|
||||||
|
help="Set user's Kerberos Principal Name")
|
||||||
parser.add_option("-M", "--mailAddress", dest="mail",
|
parser.add_option("-M", "--mailAddress", dest="mail",
|
||||||
help="Set uesr's e-mail address")
|
help="Set user's e-mail address")
|
||||||
parser.add_option("--usage", action="store_true",
|
parser.add_option("--usage", action="store_true",
|
||||||
help="Program usage")
|
help="Program usage")
|
||||||
|
|
||||||
@ -66,8 +69,9 @@ def main():
|
|||||||
givenname = ""
|
givenname = ""
|
||||||
lastname = ""
|
lastname = ""
|
||||||
username = ""
|
username = ""
|
||||||
|
principal = ""
|
||||||
password = ""
|
password = ""
|
||||||
mail = ""
|
mail = ""
|
||||||
gecos = ""
|
gecos = ""
|
||||||
directory = ""
|
directory = ""
|
||||||
shell = ""
|
shell = ""
|
||||||
@ -100,7 +104,7 @@ def main():
|
|||||||
cont = False
|
cont = False
|
||||||
if not options.sn:
|
if not options.sn:
|
||||||
while (cont != True):
|
while (cont != True):
|
||||||
lastname = raw_input(" Last name: ")
|
lastname = raw_input("Last name: ")
|
||||||
if (ipavalidate.plain(lastname, notEmpty=True)):
|
if (ipavalidate.plain(lastname, notEmpty=True)):
|
||||||
print "Field is required and must be letters or '"
|
print "Field is required and must be letters or '"
|
||||||
else:
|
else:
|
||||||
@ -140,18 +144,10 @@ def main():
|
|||||||
else:
|
else:
|
||||||
password = options.sn
|
password = options.sn
|
||||||
|
|
||||||
cont = False
|
if options.mail:
|
||||||
if not options.mail:
|
|
||||||
while (cont != True):
|
|
||||||
mail = raw_input("E-mail addr: ")
|
|
||||||
if (ipavalidate.email(mail)):
|
|
||||||
print "Field is required and must include a user and domain name"
|
|
||||||
else:
|
|
||||||
cont = True
|
|
||||||
else:
|
|
||||||
mail = options.mail
|
mail = options.mail
|
||||||
if (ipavalidate.email(mail)):
|
if (ipavalidate.email(mail)):
|
||||||
print "E-mail is required and must include a user and domain name"
|
print "The email provided seem not a valid email."
|
||||||
return 1
|
return 1
|
||||||
|
|
||||||
# Ask the questions we don't normally force. We don't require answers
|
# Ask the questions we don't normally force. We don't require answers
|
||||||
@ -168,8 +164,10 @@ def main():
|
|||||||
cont = False
|
cont = False
|
||||||
if not options.directory:
|
if not options.directory:
|
||||||
while (cont != True):
|
while (cont != True):
|
||||||
directory = raw_input("home directory []: ")
|
directory = raw_input("home directory [/home/"+username+"]: ")
|
||||||
if (ipavalidate.path(gecos, notEmpty=False)):
|
if directory == "":
|
||||||
|
directory = "/home/"+username
|
||||||
|
if (ipavalidate.path(directory, notEmpty=False)):
|
||||||
print "Must be letters, numbers, spaces or '"
|
print "Must be letters, numbers, spaces or '"
|
||||||
else:
|
else:
|
||||||
cont = True
|
cont = True
|
||||||
@ -180,29 +178,26 @@ def main():
|
|||||||
|
|
||||||
if len(shell) < 1:
|
if len(shell) < 1:
|
||||||
shell = None
|
shell = None
|
||||||
cont = True
|
cont = True
|
||||||
cont = False
|
|
||||||
if not options.groups:
|
|
||||||
while (cont != True):
|
|
||||||
g = raw_input("Add to group [blank to exit]: ")
|
|
||||||
|
|
||||||
if len(g) < 1:
|
|
||||||
cont = True
|
|
||||||
else:
|
|
||||||
if (ipavalidate.path(g, notEmpty=False)):
|
|
||||||
print "Must be letters, numbers, spaces or '"
|
|
||||||
else:
|
|
||||||
groups = groups + "," + g
|
|
||||||
else:
|
else:
|
||||||
gecos = options.gecos
|
gecos = options.gecos
|
||||||
directory = options.directory
|
directory = options.directory
|
||||||
shell = options.shell
|
shell = options.shell
|
||||||
groups = options.groups
|
groups = options.groups
|
||||||
|
|
||||||
|
if options.principal:
|
||||||
|
principal = options.principal
|
||||||
|
else:
|
||||||
|
ctx = krbV.default_context()
|
||||||
|
principal = username + "@" + ctx.default_realm
|
||||||
|
|
||||||
user.setValue('givenname', givenname)
|
user.setValue('givenname', givenname)
|
||||||
user.setValue('sn', lastname)
|
user.setValue('sn', lastname)
|
||||||
user.setValue('uid', username)
|
user.setValue('uid', username)
|
||||||
user.setValue('mail', mail)
|
user.setValue('krbprincipalname', principal)
|
||||||
|
if mail:
|
||||||
|
user.setValue('mail', mail)
|
||||||
if gecos:
|
if gecos:
|
||||||
user.setValue('gecos', gecos)
|
user.setValue('gecos', gecos)
|
||||||
if directory:
|
if directory:
|
||||||
@ -231,7 +226,7 @@ def main():
|
|||||||
# Set the User's password
|
# Set the User's password
|
||||||
if password is not None:
|
if password is not None:
|
||||||
try:
|
try:
|
||||||
client.modifyPassword(username, None, password)
|
client.modifyPassword(principal, None, password)
|
||||||
except ipa.ipaerror.IPAError, e:
|
except ipa.ipaerror.IPAError, e:
|
||||||
print "User added but setting the password failed."
|
print "User added but setting the password failed."
|
||||||
print "%s" % (e.message)
|
print "%s" % (e.message)
|
||||||
|
@ -44,12 +44,12 @@ def parse_options():
|
|||||||
|
|
||||||
return options, args
|
return options, args
|
||||||
|
|
||||||
def get_principal():
|
def get_principal(krbctx):
|
||||||
try:
|
try:
|
||||||
ctx = krbV.default_context()
|
ccache = krbctx.default_ccache()
|
||||||
ccache = ctx.default_ccache()
|
|
||||||
cprinc = ccache.principal()
|
cprinc = ccache.principal()
|
||||||
except krbV.Krb5Error, e:
|
except krbV.Krb5Error, e:
|
||||||
|
#TODO: do a kinit
|
||||||
print "Unable to get kerberos principal: %s" % e[1]
|
print "Unable to get kerberos principal: %s" % e[1]
|
||||||
return None
|
return None
|
||||||
|
|
||||||
@ -57,39 +57,47 @@ def get_principal():
|
|||||||
|
|
||||||
def main():
|
def main():
|
||||||
match = False
|
match = False
|
||||||
|
username = None
|
||||||
|
principal = None
|
||||||
|
|
||||||
|
krbctx = krbV.default_context()
|
||||||
options, args = parse_options()
|
options, args = parse_options()
|
||||||
|
|
||||||
if len(args) == 2:
|
if len(args) == 2:
|
||||||
username = args[1]
|
username = args[1]
|
||||||
else:
|
else:
|
||||||
username = get_principal()
|
principal = get_principal(krbctx)
|
||||||
if username is None:
|
if principal is None:
|
||||||
return 1
|
return 1
|
||||||
|
|
||||||
u = username.split('@')
|
if not principal:
|
||||||
if len(u) > 1:
|
u = username.split('@')
|
||||||
username = u[0]
|
if len(u) > 2 or len(u) == 0:
|
||||||
|
print "Invalid user name (%s)" % username
|
||||||
|
if len(u) == 1:
|
||||||
|
principal = username+"@"+krbctx.default_realm
|
||||||
|
else:
|
||||||
|
principal = username
|
||||||
|
|
||||||
print "Changing password for %s" % username
|
print "Changing password for %s" % principal
|
||||||
|
|
||||||
while (match != True):
|
while (match != True):
|
||||||
# No syntax checking of the password is required because that is done
|
# No syntax checking of the password is required because that is done
|
||||||
# on the server side
|
# on the server side
|
||||||
password = getpass.getpass(" New Password: ")
|
password = getpass.getpass(" New Password: ")
|
||||||
confirm = getpass.getpass(" New Password (again): ")
|
confirm = getpass.getpass(" Confirm Password: ")
|
||||||
if (password != confirm):
|
if (password != confirm):
|
||||||
print "Passwords do not match"
|
print "Passwords do not match"
|
||||||
match = False
|
match = False
|
||||||
|
elif (len(password) < 1):
|
||||||
|
print "Password cannot be empty"
|
||||||
|
match = False
|
||||||
else:
|
else:
|
||||||
match = True
|
match = True
|
||||||
if (len(password) < 1):
|
|
||||||
print "Password cannot be empty"
|
|
||||||
match = False
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
client = ipaclient.IPAClient()
|
client = ipaclient.IPAClient()
|
||||||
client.modifyPassword(username, None, password)
|
client.modifyPassword(principal, None, password)
|
||||||
except ipa.ipaerror.IPAError, e:
|
except ipa.ipaerror.IPAError, e:
|
||||||
print "%s" % (e.message)
|
print "%s" % (e.message)
|
||||||
return 1
|
return 1
|
||||||
|
@ -35,7 +35,6 @@ class IPAClient:
|
|||||||
|
|
||||||
def __init__(self,local=None):
|
def __init__(self,local=None):
|
||||||
self.local = local
|
self.local = local
|
||||||
ipa.config.init_config()
|
|
||||||
if local:
|
if local:
|
||||||
self.transport = funcs.IPAServer()
|
self.transport = funcs.IPAServer()
|
||||||
# client needs to call set_principal(user@REALM)
|
# client needs to call set_principal(user@REALM)
|
||||||
@ -69,6 +68,13 @@ class IPAClient:
|
|||||||
result = self.transport.get_user_by_dn(dn,sattrs)
|
result = self.transport.get_user_by_dn(dn,sattrs)
|
||||||
return user.User(result)
|
return user.User(result)
|
||||||
|
|
||||||
|
def get_user_by_principal(self,principal,sattrs=None):
|
||||||
|
"""Get a specific user by uid. If sattrs is set then only those
|
||||||
|
attributes will be returned, otherwise all available attributes
|
||||||
|
are returned."""
|
||||||
|
result = self.transport.get_user_by_principal(principal,sattrs)
|
||||||
|
return user.User(result)
|
||||||
|
|
||||||
def get_users_by_manager(self,manager_dn,sattrs=None):
|
def get_users_by_manager(self,manager_dn,sattrs=None):
|
||||||
"""Gets the users the report to a particular manager.
|
"""Gets the users the report to a particular manager.
|
||||||
If sattrs is not None then only those
|
If sattrs is not None then only those
|
||||||
@ -81,8 +87,6 @@ class IPAClient:
|
|||||||
def add_user(self,user,user_container=None):
|
def add_user(self,user,user_container=None):
|
||||||
"""Add a user. user is a ipa.user.User object"""
|
"""Add a user. user is a ipa.user.User object"""
|
||||||
|
|
||||||
realm = config.config.get_realm()
|
|
||||||
|
|
||||||
user_dict = user.toDict()
|
user_dict = user.toDict()
|
||||||
|
|
||||||
# dn is set on the server-side
|
# dn is set on the server-side
|
||||||
@ -126,31 +130,25 @@ class IPAClient:
|
|||||||
def update_user(self,user):
|
def update_user(self,user):
|
||||||
"""Update a user entry."""
|
"""Update a user entry."""
|
||||||
|
|
||||||
realm = config.config.get_realm()
|
|
||||||
|
|
||||||
result = self.transport.update_user(user.origDataDict(), user.toDict())
|
result = self.transport.update_user(user.origDataDict(), user.toDict())
|
||||||
return result
|
return result
|
||||||
|
|
||||||
def delete_user(self,uid):
|
def delete_user(self,uid):
|
||||||
"""Delete a user entry."""
|
"""Delete a user entry."""
|
||||||
|
|
||||||
realm = config.config.get_realm()
|
|
||||||
|
|
||||||
result = self.transport.delete_user(uid)
|
result = self.transport.delete_user(uid)
|
||||||
return result
|
return result
|
||||||
|
|
||||||
def modifyPassword(self,uid,oldpass,newpass):
|
def modifyPassword(self,principal,oldpass,newpass):
|
||||||
"""Modify a user's password"""
|
"""Modify a user's password"""
|
||||||
|
|
||||||
result = self.transport.modifyPassword(uid,oldpass,newpass)
|
result = self.transport.modifyPassword(principal,oldpass,newpass)
|
||||||
|
|
||||||
return result
|
return result
|
||||||
|
|
||||||
def mark_user_deleted(self,uid):
|
def mark_user_deleted(self,uid):
|
||||||
"""Set a user as inactive by uid."""
|
"""Set a user as inactive by uid."""
|
||||||
|
|
||||||
realm = config.config.get_realm()
|
|
||||||
|
|
||||||
result = self.transport.mark_user_deleted(uid)
|
result = self.transport.mark_user_deleted(uid)
|
||||||
return result
|
return result
|
||||||
|
|
||||||
@ -182,8 +180,6 @@ class IPAClient:
|
|||||||
def add_group(self,group,group_container=None):
|
def add_group(self,group,group_container=None):
|
||||||
"""Add a group. group is a ipa.group.Group object"""
|
"""Add a group. group is a ipa.group.Group object"""
|
||||||
|
|
||||||
realm = config.config.get_realm()
|
|
||||||
|
|
||||||
group_dict = group.toDict()
|
group_dict = group.toDict()
|
||||||
|
|
||||||
# dn is set on the server-side
|
# dn is set on the server-side
|
||||||
@ -238,6 +234,8 @@ class IPAClient:
|
|||||||
|
|
||||||
def add_user_to_group(self, user_uid, group_cn):
|
def add_user_to_group(self, user_uid, group_cn):
|
||||||
"""Add a user to an existing group.
|
"""Add a user to an existing group.
|
||||||
|
user is a uid of the user to add
|
||||||
|
group is the cn of the group to be added to
|
||||||
"""
|
"""
|
||||||
|
|
||||||
return self.transport.add_user_to_group(user_uid, group_cn)
|
return self.transport.add_user_to_group(user_uid, group_cn)
|
||||||
@ -253,6 +251,8 @@ class IPAClient:
|
|||||||
|
|
||||||
def remove_user_from_group(self, user_uid, group_cn):
|
def remove_user_from_group(self, user_uid, group_cn):
|
||||||
"""Remove a user from an existing group.
|
"""Remove a user from an existing group.
|
||||||
|
user is a uid of the user to remove
|
||||||
|
group is the cn of the group to be removed from
|
||||||
"""
|
"""
|
||||||
|
|
||||||
return self.transport.remove_user_from_group(user_uid, group_cn)
|
return self.transport.remove_user_from_group(user_uid, group_cn)
|
||||||
|
@ -84,7 +84,7 @@ class RPCClient:
|
|||||||
raise xmlrpclib.Fault(value, msg)
|
raise xmlrpclib.Fault(value, msg)
|
||||||
|
|
||||||
return ipautil.unwrap_binary_data(result)
|
return ipautil.unwrap_binary_data(result)
|
||||||
|
|
||||||
def get_user_by_dn(self,dn,sattrs=None):
|
def get_user_by_dn(self,dn,sattrs=None):
|
||||||
"""Get a specific user. If sattrs is not None then only those
|
"""Get a specific user. If sattrs is not None then only those
|
||||||
attributes will be returned, otherwise all available
|
attributes will be returned, otherwise all available
|
||||||
@ -101,6 +101,22 @@ class RPCClient:
|
|||||||
|
|
||||||
return ipautil.unwrap_binary_data(result)
|
return ipautil.unwrap_binary_data(result)
|
||||||
|
|
||||||
|
def get_user_by_principal(self,principal,sattrs=None):
|
||||||
|
"""Get a specific user. If sattrs is not None then only those
|
||||||
|
attributes will be returned, otherwise all available
|
||||||
|
attributes are returned. The result is a dict."""
|
||||||
|
server = self.setup_server()
|
||||||
|
if sattrs is None:
|
||||||
|
sattrs = "__NONE__"
|
||||||
|
try:
|
||||||
|
result = server.get_user_by_principal(principal, sattrs)
|
||||||
|
except xmlrpclib.Fault, fault:
|
||||||
|
raise ipaerror.gen_exception(fault.faultCode, fault.faultString)
|
||||||
|
except socket.error, (value, msg):
|
||||||
|
raise xmlrpclib.Fault(value, msg)
|
||||||
|
|
||||||
|
return ipautil.unwrap_binary_data(result)
|
||||||
|
|
||||||
def get_users_by_manager(self,manager_dn,sattrs=None):
|
def get_users_by_manager(self,manager_dn,sattrs=None):
|
||||||
"""Gets the users that report to a manager.
|
"""Gets the users that report to a manager.
|
||||||
If sattrs is not None then only those
|
If sattrs is not None then only those
|
||||||
@ -212,7 +228,7 @@ class RPCClient:
|
|||||||
|
|
||||||
return result
|
return result
|
||||||
|
|
||||||
def modifyPassword(self,uid,oldpass,newpass):
|
def modifyPassword(self,principal,oldpass,newpass):
|
||||||
"""Modify a user's password"""
|
"""Modify a user's password"""
|
||||||
server = self.setup_server()
|
server = self.setup_server()
|
||||||
|
|
||||||
@ -220,7 +236,7 @@ class RPCClient:
|
|||||||
oldpass = "__NONE__"
|
oldpass = "__NONE__"
|
||||||
|
|
||||||
try:
|
try:
|
||||||
result = server.modifyPassword(uid,oldpass,newpass)
|
result = server.modifyPassword(principal,oldpass,newpass)
|
||||||
except xmlrpclib.Fault, fault:
|
except xmlrpclib.Fault, fault:
|
||||||
raise ipaerror.gen_exception(fault.faultCode, fault.faultString)
|
raise ipaerror.gen_exception(fault.faultCode, fault.faultString)
|
||||||
except socket.error, (value, msg):
|
except socket.error, (value, msg):
|
||||||
|
@ -338,7 +338,7 @@ class Root(controllers.RootController):
|
|||||||
#
|
#
|
||||||
try:
|
try:
|
||||||
if password_change:
|
if password_change:
|
||||||
rv = client.modifyPassword(kw['uid'], "", kw.get('userpassword'))
|
rv = client.modifyPassword(kw['krbprincipalname'], "", kw.get('userpassword'))
|
||||||
except ipaerror.IPAError, e:
|
except ipaerror.IPAError, e:
|
||||||
turbogears.flash("User password change failed: " + str(e))
|
turbogears.flash("User password change failed: " + str(e))
|
||||||
return dict(form=user_edit_form, user=kw,
|
return dict(form=user_edit_form, user=kw,
|
||||||
|
@ -20,12 +20,12 @@
|
|||||||
import sys
|
import sys
|
||||||
sys.path.append("/usr/share/ipa")
|
sys.path.append("/usr/share/ipa")
|
||||||
|
|
||||||
|
import krbV
|
||||||
import ldap
|
import ldap
|
||||||
import ipaserver.dsinstance
|
import ipaserver.dsinstance
|
||||||
import ipaserver.ipaldap
|
import ipaserver.ipaldap
|
||||||
import ipa.ipautil
|
import ipa.ipautil
|
||||||
import xmlrpclib
|
import xmlrpclib
|
||||||
import ipa.config
|
|
||||||
import copy
|
import copy
|
||||||
from ipa import ipaerror
|
from ipa import ipaerror
|
||||||
|
|
||||||
@ -86,11 +86,12 @@ class IPAServer:
|
|||||||
self.bindcert = "/usr/share/ipa/cert.pem"
|
self.bindcert = "/usr/share/ipa/cert.pem"
|
||||||
self.bindkey = "/usr/share/ipa/key.pem"
|
self.bindkey = "/usr/share/ipa/key.pem"
|
||||||
self.bindca = "/usr/share/ipa/cacert.asc"
|
self.bindca = "/usr/share/ipa/cacert.asc"
|
||||||
|
self.krbctx = krbV.default_context()
|
||||||
|
self.realm = self.krbctx.default_realm
|
||||||
|
|
||||||
if _LDAPPool is None:
|
if _LDAPPool is None:
|
||||||
_LDAPPool = IPAConnPool()
|
_LDAPPool = IPAConnPool()
|
||||||
ipa.config.init_config()
|
self.basedn = ipa.ipautil.realm_to_suffix(self.realm)
|
||||||
self.basedn = ipa.ipautil.realm_to_suffix(ipa.config.config.get_realm())
|
|
||||||
self.scope = ldap.SCOPE_SUBTREE
|
self.scope = ldap.SCOPE_SUBTREE
|
||||||
self.princ = None
|
self.princ = None
|
||||||
self.krbccache = None
|
self.krbccache = None
|
||||||
@ -312,6 +313,15 @@ class IPAServer:
|
|||||||
filter = "(objectClass=*)"
|
filter = "(objectClass=*)"
|
||||||
return self.__get_entry(dn, filter, sattrs, opts)
|
return self.__get_entry(dn, filter, sattrs, opts)
|
||||||
|
|
||||||
|
def get_user_by_principal(self, principal, sattrs=None, opts=None):
|
||||||
|
"""Get a user entry searching by Kerberos Principal Name.
|
||||||
|
Return as a dict of values. Multi-valued fields are
|
||||||
|
represented as lists.
|
||||||
|
"""
|
||||||
|
|
||||||
|
filter = "(krbPrincipalName="+self.__safe_filter(principal)+")"
|
||||||
|
return self.__get_entry(self.basedn, filter, sattrs, opts)
|
||||||
|
|
||||||
def get_users_by_manager (self, manager_dn, sattrs=None, opts=None):
|
def get_users_by_manager (self, manager_dn, sattrs=None, opts=None):
|
||||||
"""Gets the users that report to a particular manager.
|
"""Gets the users that report to a particular manager.
|
||||||
"""
|
"""
|
||||||
@ -342,9 +352,9 @@ class IPAServer:
|
|||||||
|
|
||||||
# Let us add in some missing attributes
|
# Let us add in some missing attributes
|
||||||
if user.get('homedirectory') is None:
|
if user.get('homedirectory') is None:
|
||||||
user['homedirectory'] = '/home/%s' % user.get('uid')
|
user['homedirectory'] = '/home/%s' % user.get('uid')
|
||||||
if not user.get('gecos') is None:
|
if not user.get('gecos') is None:
|
||||||
user['gecos'] = user['uid']
|
user['gecos'] = user['uid']
|
||||||
|
|
||||||
# FIXME: This can be removed once the DS plugin is installed
|
# FIXME: This can be removed once the DS plugin is installed
|
||||||
user['uidnumber'] = '501'
|
user['uidnumber'] = '501'
|
||||||
@ -352,8 +362,8 @@ class IPAServer:
|
|||||||
# FIXME: What is the default group for users?
|
# FIXME: What is the default group for users?
|
||||||
user['gidnumber'] = '501'
|
user['gidnumber'] = '501'
|
||||||
|
|
||||||
realm = ipa.config.config.get_realm()
|
if user.get('krbprincipalname') is None:
|
||||||
user['krbprincipalname'] = "%s@%s" % (user.get('uid'), realm)
|
user['krbprincipalname'] = "%s@%s" % (user.get('uid'), self.realm)
|
||||||
|
|
||||||
# FIXME. This is a hack so we can request separate First and Last
|
# FIXME. This is a hack so we can request separate First and Last
|
||||||
# name in the GUI.
|
# name in the GUI.
|
||||||
@ -365,17 +375,7 @@ class IPAServer:
|
|||||||
del user['gn']
|
del user['gn']
|
||||||
|
|
||||||
# some required objectclasses
|
# some required objectclasses
|
||||||
entry.setValues('objectClass', 'top', 'posixAccount', 'shadowAccount', 'account', 'person', 'inetOrgPerson', 'organizationalPerson', 'krbPrincipalAux', 'krbTicketPolicyAux')
|
entry.setValues('objectClass', 'top', 'person', 'organizationalPerson', 'inetOrgPerson', 'posixAccount', 'krbPrincipalAux')
|
||||||
|
|
||||||
# Fill in shadow fields
|
|
||||||
entry.setValue('shadowMin', '0')
|
|
||||||
entry.setValue('shadowMax', '99999')
|
|
||||||
entry.setValue('shadowWarning', '7')
|
|
||||||
entry.setValue('shadowExpire', '-1')
|
|
||||||
entry.setValue('shadowInactive', '-1')
|
|
||||||
entry.setValue('shadowFlag', '-1')
|
|
||||||
|
|
||||||
# FIXME: calculate shadowLastChange
|
|
||||||
|
|
||||||
# fill in our new entry with everything sent by the user
|
# fill in our new entry with everything sent by the user
|
||||||
for u in user:
|
for u in user:
|
||||||
@ -426,7 +426,7 @@ class IPAServer:
|
|||||||
"label": "E-mail address:",
|
"label": "E-mail address:",
|
||||||
"type": "text",
|
"type": "text",
|
||||||
"validator": "email",
|
"validator": "email",
|
||||||
"required": "true"
|
"required": "false"
|
||||||
}
|
}
|
||||||
fields.append(field1)
|
fields.append(field1)
|
||||||
|
|
||||||
@ -455,6 +455,9 @@ class IPAServer:
|
|||||||
"""Returns a list: counter followed by the results.
|
"""Returns a list: counter followed by the results.
|
||||||
If the results are truncated, counter will be set to -1."""
|
If the results are truncated, counter will be set to -1."""
|
||||||
|
|
||||||
|
# TODO - retrieve from config
|
||||||
|
timelimit = 2
|
||||||
|
|
||||||
# Assume the list of fields to search will come from a central
|
# Assume the list of fields to search will come from a central
|
||||||
# configuration repository. A good format for that would be
|
# configuration repository. A good format for that would be
|
||||||
# a comma-separated list of fields
|
# a comma-separated list of fields
|
||||||
@ -562,31 +565,31 @@ class IPAServer:
|
|||||||
The memberOf plugin handles removing the user from any other
|
The memberOf plugin handles removing the user from any other
|
||||||
groups.
|
groups.
|
||||||
"""
|
"""
|
||||||
user_dn = self.get_user_by_uid(uid, ['dn', 'uid', 'objectclass'], opts)
|
user = self.get_user_by_uid(uid, ['dn', 'uid', 'objectclass'], opts)
|
||||||
if user_dn is None:
|
if user is None:
|
||||||
raise ipaerror.gen_exception(ipaerror.LDAP_NOT_FOUND)
|
raise ipaerror.gen_exception(ipaerror.LDAP_NOT_FOUND)
|
||||||
|
|
||||||
conn = self.getConnection(opts)
|
conn = self.getConnection(opts)
|
||||||
try:
|
try:
|
||||||
res = conn.deleteEntry(user_dn['dn'])
|
res = conn.deleteEntry(user['dn'])
|
||||||
finally:
|
finally:
|
||||||
self.releaseConnection(conn)
|
self.releaseConnection(conn)
|
||||||
return res
|
return res
|
||||||
|
|
||||||
def modifyPassword (self, uid, oldpass, newpass, opts=None):
|
def modifyPassword (self, principal, oldpass, newpass, opts=None):
|
||||||
"""Set/Reset a user's password
|
"""Set/Reset a user's password
|
||||||
|
|
||||||
uid tells us who's password to change
|
uid tells us who's password to change
|
||||||
oldpass is the old password (if available)
|
oldpass is the old password (if available)
|
||||||
newpass is the new password
|
newpass is the new password
|
||||||
"""
|
"""
|
||||||
user_dn = self.get_user_by_uid(uid, ['dn', 'uid', 'objectclass'], opts)
|
user = self.get_user_by_principal(principal, ['krbprincipalname'], opts)
|
||||||
if user_dn is None:
|
if user is None or user['krbprincipalname'] != principal:
|
||||||
raise ipaerror.gen_exception(ipaerror.LDAP_NOT_FOUND)
|
raise ipaerror.gen_exception(ipaerror.LDAP_NOT_FOUND)
|
||||||
|
|
||||||
conn = self.getConnection(opts)
|
conn = self.getConnection(opts)
|
||||||
try:
|
try:
|
||||||
res = conn.modifyPassword(user_dn['dn'], oldpass, newpass)
|
res = conn.modifyPassword(user['dn'], oldpass, newpass)
|
||||||
finally:
|
finally:
|
||||||
self.releaseConnection(conn)
|
self.releaseConnection(conn)
|
||||||
return res
|
return res
|
||||||
|
@ -319,6 +319,7 @@ def handler(req, profiling=False):
|
|||||||
h = ModXMLRPCRequestHandler()
|
h = ModXMLRPCRequestHandler()
|
||||||
h.register_function(f.get_user_by_uid)
|
h.register_function(f.get_user_by_uid)
|
||||||
h.register_function(f.get_user_by_dn)
|
h.register_function(f.get_user_by_dn)
|
||||||
|
h.register_function(f.get_user_by_principal)
|
||||||
h.register_function(f.get_users_by_manager)
|
h.register_function(f.get_users_by_manager)
|
||||||
h.register_function(f.add_user)
|
h.register_function(f.add_user)
|
||||||
h.register_function(f.get_add_schema)
|
h.register_function(f.get_add_schema)
|
||||||
|
Loading…
Reference in New Issue
Block a user