Commit Graph

170 Commits

Author SHA1 Message Date
Rob Crittenden
6efb547987 Shift search base for users and groups to "cn=accounts, baseDN"
450552
2008-07-29 11:33:51 -04:00
Rob Crittenden
cdba310f02 Change Title label to Job Title for clarity
453780
2008-07-29 11:24:52 -04:00
Rob Crittenden
23fab304e9 Catch correct exception when trying to find the default IPA users group and return a more detailed error message.
455092
2008-07-23 10:05:32 -04:00
Rob Crittenden
12899d9053 Don't make the search criteria lower-case so one can do case-sensitive searches (such as looking for HTTP principals)
449975
2008-06-04 16:34:47 -04:00
Rob Crittenden
c58b7a3d7c Move version.py to the common ipa directory instead of being server-based so it can be used by the client tool.
Fix the client tool imports to fail more gracefully.
2008-06-03 22:39:11 -04:00
Rob Crittenden
8f6303adf0 Fix typo in log statement
448948
2008-05-29 13:23:43 -04:00
Rob Crittenden
c5d6ad5c6e Set default logging level to INFO (still logs to Apache)
Add function entry log for the core IPA XML-RPC functions.
2008-05-28 14:13:19 -04:00
Rob Crittenden
fcd3260955 Ensure hostnames are lower during installation and when adding service princs
447381
2008-05-20 15:07:24 -04:00
Rob Crittenden
fe2f69718f Remove broken link for IE configuration and replace sample domain/realm. Also fix some HTML errors: missing DOCTYPE, title, head.
The web page actually comes up as a link in a search on Microsoft's site
but the content is gone. It is possible it will come back at some point, who
knows.

447445
2008-05-20 15:05:50 -04:00
Rob Crittenden
99141e3a04 Enforce the maximum username length set by IPA Policy
439891
2008-05-14 09:48:21 -04:00
Rob Crittenden
bd9dea888d Add a version API to the server so it knows what version it is.
435019
2008-05-08 13:01:27 -04:00
Rob Crittenden
24f43bc846 Don't allow the IPA server service principals to be removed.
440282
2008-05-08 12:57:31 -04:00
Rob Crittenden
8e7561cff6 Refine our web space some more so that everything we reference is in /ipa
UI: /ipa/ui
XML-RPC: /ipa/xml
errors: /ipa/errors
config: /ipa/config

I had to hardcode that URI into the CSS pages but TurboGears handles the
rest of the translations with tg.url().

Added a version to ipa.conf and ipa-rewrite.conf so we can update them
in the future if needed with ipa-upgradeconfig

440443
2008-05-07 09:41:32 -04:00
Rob Crittenden
306d8241b3 Fix the client-side search size limit.
I've changed the variable name searchlimit to sizelimit to match the
name in python-ldap (and hopefully therefore be more readable).

The big change was changing the default value from 0 to -1. As 0 we were
never using the value from cn=ipaconfig

python-ldap expects this to be an int type

In the UI sizelimit was hardcoded at 0 for users

439880
2008-04-25 16:46:13 -04:00
Rob Crittenden
dce8008167 Catch all errors when obtaining an LDAP connection.
442582
2008-04-15 21:08:55 -07:00
Rob Crittenden
b1f58e5441 Don't quit trying to lock a user if they aren't in the activated group.
Users are considered activated by default so don't need to be in the
activated group explicitly. Ignore the "not in group" error when trying
to remove them.

442470
2008-04-14 23:13:58 -04:00
Rob Crittenden
ac5a35086e Don't allow the admin user to be removed from the admins group.
439281
2008-04-04 17:41:32 -04:00
Rob Crittenden
cb4648a8af Add missing normalizeDN() when removing members from a group.
438387
2008-04-04 16:30:36 -04:00
Rob Crittenden
05efbe9991 Fix typo in python directive. Fixes marking a group active.
440142
2008-04-01 22:01:23 -04:00
Rob Crittenden
6d136d7fff Fix crash when creating new groups. You can't iterate over a None variable.
440081
2008-04-01 15:46:50 -04:00
Rob Crittenden
58cfc7ab68 Fix account activation.
We do account activation by using a Class of Service based on group
membership. A problem can happen if the entry itself has an nsaccountlock
attribute and you try doing Class of Service work as well because the
local attribute has priority. So try to detect that the entry has a local
nsAccountLock attribute and report an appropriate error.

Don't allow the admins or editors groups to be de-activated.

Return a better error message if account [in]activation fails.

Catch errors when doing group [in]activation.

439230
2008-03-31 11:36:13 -04:00
Rob Crittenden
b7924139d8 Don't allow the admin user to be removed using the XML-RPC Interface.
If a site really wants it gone then can delete it via LDAP.

439281
2008-03-28 15:28:28 -04:00
Rob Crittenden
034d9d6753 Do case-less comparisons when considering objectclass but store the
current value to prevent unnecessary LPAP updates (and failed writes)

Don't check against these lists on updates, only add them on new entries.

Disable the ability to configure in the UI these values for now.

438256
2008-03-28 14:47:53 -04:00
Rob Crittenden
c1ae716afc Normalize member DN's when determining whether they are in a group
as a direct or indirect member.

438387
2008-03-26 23:19:54 -04:00
Rob Crittenden
bde9959091 When getting members let user indicate what type of member they want.
The memberOf attribute includes members that are directly in the group
via the "member" attribute and those that are included as a result of
being in a group that is in the group.

The UI needs to be able to distinguish between the two.

438706
2008-03-27 09:54:41 -04:00
Rob Crittenden
4c288e653a Re-root the IPA web UI to /ipa and the XML-RPC interface to /ipaxml.
438021
2008-03-24 15:54:55 -04:00
Rob Crittenden
0b7117596d We are really changing the kerberos principal key and not the password when
we do updates, so use the right terminology internally. Also fix the actual
field we update (and grant permission appropriately in delegations).

The DS password handles updating userPassword and any Samba passwords
as necessary.

438256
2008-03-24 10:53:33 -04:00
Rob Crittenden
e54a16ae1c Allow the realm to be included in the name passed to add_service_principal()
This is more kerberos-like and it doesn't hurt anything, we just won't
allow realms other than our own to be used.

437566
2008-03-17 14:09:44 -04:00
Rob Crittenden
a39f38f65b Adding items to the set needs to be lower case to prevent duplicates.
This function was assuming that the target list was all lower-case so the
set could end up with duplicate values which would get kicked out by LDAP.

433680
2008-03-10 11:36:04 -04:00
Rob Crittenden
ea53922951 Filter out K/M and krbtgt principals from the service principals list.
435713
2008-03-03 17:11:38 -05:00
Rob Crittenden
79557e6bf2 Do argument type checking in the XML-RPC interface
Fix error in service principals where the service wasn't being removed before
doing the DNS lookup.
2008-02-29 10:58:07 -05:00
Rob Crittenden
999bd4fb1e In the UI we don't want to display Edit links unless someone can actually
edit things. We use the 'editors' group for this. This group itself grants
no permission other than displaying certain things in the UI.

In order to be in the editors group a user must be a member of a group that
is the source group in a delegation. The memberof plugin will do all the
hard work to be sure that a user's memberof contains cn=editors if they
are in a delegated group.

432874
2008-02-27 15:14:52 -05:00
Rob Crittenden
f49ed705b3 The admins group cannot be renamed.
433880
2008-02-27 10:50:17 -05:00
Rob Crittenden
d6d12e9dc5 Require that service principals resolve to a DNS A record.
There is a --force option for those who know what they are doing.

433483
2008-02-26 13:51:56 -05:00
Rob Crittenden
8f0d4a8ed3 Add failover to the XML-RPC client
433506
2008-02-22 14:47:15 -05:00
Rob Crittenden
02d3c5aff3 Don't allow a group to be a member of itself.
434542
2008-02-22 15:40:21 -05:00
Simo Sorce
fbb2637a48 Syntax error, ')' in the worng place throws nasty 500 errors on ldap errors :) 2008-02-21 17:16:17 -05:00
Rob Crittenden
49148dc34a Redirect users when they don't use the FQDN on both SSL and non-SSL ports
We update the mod_nss configuration (nss.conf) during installation to include
ipa-rewrite.conf to handle the SSL side.

433054
2008-02-21 16:25:09 -05:00
Rob Crittenden
73a674ed49 Fix bug that prevented single-character fields
Fix bug in exception handling where we were sending the wrong thing as detail.
Basically we were catching an LDAP error, generating an IPAError from it,
 catching that, then setting the detail of the 2nd exception to another IPAError
 rather than the root exception. This caused anything looking at e.detail to
 crap out

Resolves 432136
2008-02-11 16:32:54 -05:00
Rob Crittenden
7fe8e88e72 Switch 'below' to 'above' to point to the right location of the CA on the page 2008-02-07 11:32:30 -05:00
Rob Crittenden
97d9c235dd Set the license uniformly to GPLv2 only. 2008-02-04 15:15:52 -05:00
Rob Crittenden
042fb11fa1 Fix issues reported by rpmlint.
- Removing shebangs (#!) from a bunch of python libraries
- Don't use a variable name in init scripts for the lock file
- Keep the init script name consistent with the binary name, so renamed
  ipa-kpasswd.init to ipa_kpasswd.init
- Add status option to the init scripts
- Move most python scripts out of /usr/share/ipa and into the python
  site-packages directories (ipaserver and ipaclient)
- Remove unnecessary sys.path.append("/usr/share/ipa")
- Fix the license string in the spec files
- Rename ipa-webgui to ipa_webgui everywhere
- Fix a couple of issues reported by pychecker in ipa-python
2008-01-18 16:20:36 -05:00
Rob Crittenden
42d5ddc559 Service principal deletion 2008-01-11 11:44:23 -05:00
Rob Crittenden
58071a759a Remove registration of get_keytab 2008-01-03 09:29:58 -05:00
Rob Crittenden
1c4e4b3e14 Add function to retrieve a short list of attributes to make ipa-adddelegation
easier to use.
2008-01-04 16:39:41 -05:00
Rob Crittenden
0576193015 In add_service_principal() don't let the user pass in the realm.
This could result in a principal of the form: service/host@something@REALM
2008-01-07 14:03:13 -05:00
Simo Sorce
a9e4e5a1e2 Finishe removing previous code to fetch keytabs 2007-12-21 12:31:31 -05:00
Karl MacMillan
c9160e0233 Fix minor typo in unauthorized page. 0001-01-01 00:00:00 +00:00
Rob Crittenden
6390db3502 Add automatic browser configuration for kerberos SSO using javascript.
This uses the UniversalPreferencesWrite function to set the browser
preferences to allow negotiation and ticket forwarding in the IPA domain.
A self-signed certificate is generated to sign the javascript.
2007-12-12 09:36:32 -05:00
Rob Crittenden
23ffab533f Make the old entry option in update_*, check for empty parameters and
fix some problems reported by pychecker.
2007-12-11 17:34:15 -05:00