mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
A new flag to disable creation of UPG
Automatic creation may of User Private Groups (UPG) may not be wanted at all times. This patch adds a new flag --noprivate to ipa user-add command to disable it. https://fedorahosted.org/freeipa/ticket/1131
This commit is contained in:
3
API.txt
3
API.txt
@@ -2524,7 +2524,7 @@ output: Output('summary', (<type 'unicode'>, <type 'NoneType'>), 'User-friendly
|
||||
output: Entry('result', <type 'dict'>, Gettext('A dictionary representing an LDAP entry', domain='ipa', localedir=None))
|
||||
output: Output('value', <type 'unicode'>, "The primary_key value of the entry, e.g. 'jdoe' for a user")
|
||||
command: user_add
|
||||
args: 1,30,3
|
||||
args: 1,31,3
|
||||
arg: Str('uid', attribute=True, cli_name='login', default_from=DefaultFrom(<lambda>, 'givenname', 'sn'), label=Gettext('User login', domain='ipa', localedir=None), maxlength=255, multivalue=False, normalizer=<lambda>, pattern='^[a-zA-Z0-9_.][a-zA-Z0-9_.-]{0,252}[a-zA-Z0-9_.$-]?$', pattern_errmsg='may only include letters, numbers, _, -, . and $', primary_key=True, required=True)
|
||||
option: Str('givenname', attribute=True, cli_name='first', label=Gettext('First name', domain='ipa', localedir=None), multivalue=False, required=True)
|
||||
option: Str('sn', attribute=True, cli_name='last', label=Gettext('Last name', domain='ipa', localedir=None), multivalue=False, required=True)
|
||||
@@ -2553,6 +2553,7 @@ option: Str('manager', attribute=True, cli_name='manager', label=Gettext('Manage
|
||||
option: Str('carlicense', attribute=True, cli_name='carlicense', label=Gettext('Car License', domain='ipa', localedir=None), multivalue=False, required=False)
|
||||
option: Str('addattr*', validate_add_attribute, cli_name='addattr', exclude='webui')
|
||||
option: Str('setattr*', validate_set_attribute, cli_name='setattr', exclude='webui')
|
||||
option: Flag('noprivate', autofill=True, cli_name='noprivate', default=False)
|
||||
option: Flag('all', autofill=True, cli_name='all', default=False, exclude='webui', flags=['no_output'])
|
||||
option: Flag('raw', autofill=True, cli_name='raw', default=False, exclude='webui', flags=['no_output'])
|
||||
option: Str('version?', exclude='webui', flags=['no_option', 'no_output'])
|
||||
|
||||
2
VERSION
2
VERSION
@@ -79,4 +79,4 @@ IPA_DATA_VERSION=20100614120000
|
||||
# #
|
||||
########################################################
|
||||
IPA_API_VERSION_MAJOR=2
|
||||
IPA_API_VERSION_MINOR=1
|
||||
IPA_API_VERSION_MINOR=2
|
||||
|
||||
@@ -15,7 +15,7 @@ changetype: add
|
||||
objectclass: extensibleObject
|
||||
cn: UPG Definition
|
||||
originScope: cn=users,cn=accounts,$SUFFIX
|
||||
originFilter: objectclass=posixAccount
|
||||
originFilter: (&(objectclass=posixAccount)(!(description=__no_upg__)))
|
||||
managedBase: cn=groups,cn=accounts,$SUFFIX
|
||||
managedTemplate: cn=UPG Template,cn=etc,$SUFFIX
|
||||
|
||||
|
||||
2
install/updates/50-suppress-upg.update
Normal file
2
install/updates/50-suppress-upg.update
Normal file
@@ -0,0 +1,2 @@
|
||||
dn: cn=UPG Definition,cn=Managed Entries,cn=plugins,cn=config
|
||||
replace: originFilter:objectclass=posixAccount:(&(objectclass=posixAccount)(!(description=__no_upg__)))
|
||||
@@ -17,6 +17,7 @@ app_DATA = \
|
||||
45-roles.update \
|
||||
50-lockout-policy.update \
|
||||
50-groupuuid.update \
|
||||
50-suppress-upg.update \
|
||||
$(NULL)
|
||||
|
||||
EXTRA_DIST = \
|
||||
|
||||
@@ -63,6 +63,9 @@ from ipalib import _, ngettext
|
||||
from ipalib.request import context
|
||||
from time import gmtime, strftime
|
||||
|
||||
|
||||
NO_UPG_MAGIC = '__no_upg__'
|
||||
|
||||
def validate_nsaccountlock(entry_attrs):
|
||||
if 'nsaccountlock' in entry_attrs:
|
||||
if not isinstance(entry_attrs['nsaccountlock'], basestring):
|
||||
@@ -70,6 +73,7 @@ def validate_nsaccountlock(entry_attrs):
|
||||
if entry_attrs['nsaccountlock'].lower() not in ('true','false'):
|
||||
raise errors.ValidationError(name='nsaccountlock', error='must be TRUE or FALSE')
|
||||
|
||||
|
||||
class user(LDAPObject):
|
||||
"""
|
||||
User object.
|
||||
@@ -289,22 +293,35 @@ class user_add(LDAPCreate):
|
||||
"""
|
||||
Add a new user.
|
||||
"""
|
||||
|
||||
msg_summary = _('Added user "%(value)s"')
|
||||
|
||||
takes_options = LDAPCreate.takes_options + (
|
||||
Flag('noprivate',
|
||||
cli_name='noprivate',
|
||||
doc=_('Don\'t create user private group'),
|
||||
),
|
||||
)
|
||||
|
||||
def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys, **options):
|
||||
try:
|
||||
# The Managed Entries plugin will allow a user to be created
|
||||
# even if a group has a duplicate name. This would leave a user
|
||||
# without a private group. Check for both the group and the user.
|
||||
self.api.Command['group_show'](keys[-1])
|
||||
if not options.get('noprivate', False):
|
||||
try:
|
||||
self.api.Command['user_show'](keys[-1])
|
||||
self.obj.handle_duplicate_entry(*keys)
|
||||
# The Managed Entries plugin will allow a user to be created
|
||||
# even if a group has a duplicate name. This would leave a user
|
||||
# without a private group. Check for both the group and the user.
|
||||
self.api.Command['group_show'](keys[-1])
|
||||
try:
|
||||
self.api.Command['user_show'](keys[-1])
|
||||
self.obj.handle_duplicate_entry(*keys)
|
||||
except errors.NotFound:
|
||||
raise errors.ManagedGroupExistsError(group=keys[-1])
|
||||
except errors.NotFound:
|
||||
raise errors.ManagedGroupExistsError(group=keys[-1])
|
||||
except errors.NotFound:
|
||||
pass
|
||||
pass
|
||||
else:
|
||||
# we don't want an user private group to be created for this user
|
||||
# add NO_UPG_MAGIC description attribute to let the DS plugin know
|
||||
entry_attrs.setdefault('description', [])
|
||||
entry_attrs['description'].append(NO_UPG_MAGIC)
|
||||
|
||||
validate_nsaccountlock(entry_attrs)
|
||||
config = ldap.get_ipa_config()[1]
|
||||
if 'ipamaxusernamelength' in config:
|
||||
@@ -330,7 +347,7 @@ class user_add(LDAPCreate):
|
||||
|
||||
if 'gidnumber' not in entry_attrs:
|
||||
# gidNumber wasn't specified explicity, find out what it should be
|
||||
if ldap.has_upg():
|
||||
if not options.get('noprivate', False) and ldap.has_upg():
|
||||
# User Private Groups - uidNumber == gidNumber
|
||||
entry_attrs['gidnumber'] = entry_attrs['uidnumber']
|
||||
else:
|
||||
@@ -360,6 +377,18 @@ class user_add(LDAPCreate):
|
||||
group_dn = self.api.Object['group'].get_dn(def_primary_group)
|
||||
ldap.add_entry_to_group(dn, group_dn)
|
||||
self.obj._convert_manager(entry_attrs, **options)
|
||||
# delete description attribute NO_UPG_MAGIC if present
|
||||
if options.get('noprivate', False):
|
||||
if not options.get('all', False):
|
||||
(dn, desc_attr) = ldap.get_entry(dn, ['description'])
|
||||
entry_attrs.update(desc_attr)
|
||||
if 'description' in entry_attrs and NO_UPG_MAGIC in entry_attrs['description']:
|
||||
entry_attrs['description'].remove(NO_UPG_MAGIC)
|
||||
kw = {'setattr': unicode('description=%s' % ','.join(entry_attrs['description']))}
|
||||
try:
|
||||
self.api.Command['user_mod'](keys[-1], **kw)
|
||||
except (errors.EmptyModlist, errors.NotFound):
|
||||
pass
|
||||
return dn
|
||||
|
||||
api.register(user_add)
|
||||
|
||||
@@ -665,4 +665,48 @@ class test_group(Declarative):
|
||||
expected=errors.NotFound(reason='no such entry'),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Delete %r' % user1,
|
||||
command=('user_del', [user1], {}),
|
||||
expected=dict(
|
||||
result=dict(failed=u''),
|
||||
summary=u'Deleted user "tuser1"',
|
||||
value=user1,
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Create %r without User Private Group' % user1,
|
||||
command=(
|
||||
'user_add', [user1], dict(givenname=u'Test', sn=u'User1', noprivate=True)
|
||||
),
|
||||
expected=dict(
|
||||
value=user1,
|
||||
summary=u'Added user "tuser1"',
|
||||
result=dict(
|
||||
gecos=[u'Test User1'],
|
||||
givenname=[u'Test'],
|
||||
description=[],
|
||||
homedirectory=[u'/home/tuser1'],
|
||||
krbprincipalname=[u'tuser1@' + api.env.realm],
|
||||
loginshell=[u'/bin/sh'],
|
||||
objectclass=objectclasses.user,
|
||||
sn=[u'User1'],
|
||||
uid=[user1],
|
||||
uidnumber=[fuzzy_digits],
|
||||
displayname=[u'Test User1'],
|
||||
cn=[u'Test User1'],
|
||||
initials=[u'TU'],
|
||||
ipauniqueid=[fuzzy_uuid],
|
||||
dn=u'uid=tuser1,cn=users,cn=accounts,' + api.env.basedn,
|
||||
),
|
||||
),
|
||||
),
|
||||
|
||||
dict(
|
||||
desc='Verify the managed group %r was not created' % user1,
|
||||
command=('group_show', [user1], {}),
|
||||
expected=errors.NotFound(reason='no such entry'),
|
||||
),
|
||||
|
||||
]
|
||||
|
||||
Reference in New Issue
Block a user