mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-27 09:21:59 -06:00
b4ad0d19a2
Aiming to support pylint 2.0 some functions and methods must have their return statements updated in order to fix two new violations: - `useless-return` (R1711): Useless return at end of function or method Emitted when a single "return" or "return None" statement is found at the end of function or method definition. This statement can safely be removed because Python will implicitly return None - `inconsistent-return-statements` (R1710): Either all return statements in a function should return an expression, or none of them should. According to PEP8, if any return statement returns an expression, any return statements where no value is returned should explicitly state this as return None, and an explicit return statement should be present at the end of the function (if reachable) Issue: https://pagure.io/freeipa/issue/7614 Signed-off-by: Armando Neto <abiagion@redhat.com> Reviewed-By: Christian Heimes <cheimes@redhat.com>
617 lines
20 KiB
Python
617 lines
20 KiB
Python
# Authors:
|
|
# Pavel Zuna <pzuna@redhat.com>
|
|
#
|
|
# Copyright (C) 2009 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
from ipalib import api, errors
|
|
from ipalib import AccessTime, Str, StrEnum, Bool
|
|
from ipalib.plugable import Registry
|
|
from .baseldap import (
|
|
pkey_to_value,
|
|
external_host_param,
|
|
LDAPObject,
|
|
LDAPCreate,
|
|
LDAPDelete,
|
|
LDAPRetrieve,
|
|
LDAPUpdate,
|
|
LDAPSearch,
|
|
LDAPQuery,
|
|
LDAPAddMember,
|
|
LDAPRemoveMember)
|
|
from ipalib import _, ngettext
|
|
from ipalib import output
|
|
from ipapython.dn import DN
|
|
|
|
__doc__ = _("""
|
|
Host-based access control
|
|
|
|
Control who can access what services on what hosts. You
|
|
can use HBAC to control which users or groups can
|
|
access a service, or group of services, on a target host.
|
|
|
|
You can also specify a category of users and target hosts.
|
|
This is currently limited to "all", but might be expanded in the
|
|
future.
|
|
|
|
Target hosts in HBAC rules must be hosts managed by IPA.
|
|
|
|
The available services and groups of services are controlled by the
|
|
hbacsvc and hbacsvcgroup plug-ins respectively.
|
|
|
|
EXAMPLES:
|
|
|
|
Create a rule, "test1", that grants all users access to the host "server" from
|
|
anywhere:
|
|
ipa hbacrule-add --usercat=all test1
|
|
ipa hbacrule-add-host --hosts=server.example.com test1
|
|
|
|
Display the properties of a named HBAC rule:
|
|
ipa hbacrule-show test1
|
|
|
|
Create a rule for a specific service. This lets the user john access
|
|
the sshd service on any machine from any machine:
|
|
ipa hbacrule-add --hostcat=all john_sshd
|
|
ipa hbacrule-add-user --users=john john_sshd
|
|
ipa hbacrule-add-service --hbacsvcs=sshd john_sshd
|
|
|
|
Create a rule for a new service group. This lets the user john access
|
|
the FTP service on any machine from any machine:
|
|
ipa hbacsvcgroup-add ftpers
|
|
ipa hbacsvc-add sftp
|
|
ipa hbacsvcgroup-add-member --hbacsvcs=ftp --hbacsvcs=sftp ftpers
|
|
ipa hbacrule-add --hostcat=all john_ftp
|
|
ipa hbacrule-add-user --users=john john_ftp
|
|
ipa hbacrule-add-service --hbacsvcgroups=ftpers john_ftp
|
|
|
|
Disable a named HBAC rule:
|
|
ipa hbacrule-disable test1
|
|
|
|
Remove a named HBAC rule:
|
|
ipa hbacrule-del allow_server
|
|
""")
|
|
|
|
register = Registry()
|
|
|
|
# AccessTime support is being removed for now.
|
|
#
|
|
# You can also control the times that the rule is active.
|
|
#
|
|
# The access time(s) of a host are cumulative and are not guaranteed to be
|
|
# applied in the order displayed.
|
|
#
|
|
# Specify that the rule "test1" be active every day between 0800 and 1400:
|
|
# ipa hbacrule-add-accesstime --time='periodic daily 0800-1400' test1
|
|
#
|
|
# Specify that the rule "test1" be active once, from 10:32 until 10:33 on
|
|
# December 16, 2010:
|
|
# ipa hbacrule-add-accesstime --time='absolute 201012161032 ~ 201012161033' test1
|
|
|
|
|
|
topic = 'hbac'
|
|
|
|
def validate_type(ugettext, type):
|
|
if type.lower() == 'deny':
|
|
raise errors.ValidationError(name='type', error=_('The deny type has been deprecated.'))
|
|
|
|
def is_all(options, attribute):
|
|
"""
|
|
See if options[attribute] is lower-case 'all' in a safe way.
|
|
"""
|
|
if attribute in options and options[attribute] is not None:
|
|
if type(options[attribute]) in (list, tuple):
|
|
value = options[attribute][0].lower()
|
|
else:
|
|
value = options[attribute].lower()
|
|
if value == 'all':
|
|
return True
|
|
return False
|
|
|
|
|
|
@register()
|
|
class hbacrule(LDAPObject):
|
|
"""
|
|
HBAC object.
|
|
"""
|
|
container_dn = api.env.container_hbac
|
|
object_name = _('HBAC rule')
|
|
object_name_plural = _('HBAC rules')
|
|
object_class = ['ipaassociation', 'ipahbacrule']
|
|
permission_filter_objectclasses = ['ipahbacrule']
|
|
default_attributes = [
|
|
'cn', 'ipaenabledflag',
|
|
'description', 'usercategory', 'hostcategory',
|
|
'servicecategory', 'ipaenabledflag',
|
|
'memberuser', 'sourcehost', 'memberhost', 'memberservice',
|
|
'externalhost',
|
|
]
|
|
uuid_attribute = 'ipauniqueid'
|
|
rdn_attribute = 'ipauniqueid'
|
|
allow_rename = True
|
|
attribute_members = {
|
|
'memberuser': ['user', 'group'],
|
|
'memberhost': ['host', 'hostgroup'],
|
|
'sourcehost': ['host', 'hostgroup'],
|
|
'memberservice': ['hbacsvc', 'hbacsvcgroup'],
|
|
}
|
|
managed_permissions = {
|
|
'System: Read HBAC Rules': {
|
|
'replaces_global_anonymous_aci': True,
|
|
'ipapermbindruletype': 'all',
|
|
'ipapermright': {'read', 'search', 'compare'},
|
|
'ipapermdefaultattr': {
|
|
'accessruletype', 'accesstime', 'cn', 'description',
|
|
'externalhost', 'hostcategory', 'ipaenabledflag',
|
|
'ipauniqueid', 'memberhost', 'memberservice', 'memberuser',
|
|
'servicecategory', 'sourcehost', 'sourcehostcategory',
|
|
'usercategory', 'objectclass', 'member',
|
|
},
|
|
},
|
|
'System: Add HBAC Rule': {
|
|
'ipapermright': {'add'},
|
|
'replaces': [
|
|
'(target = "ldap:///ipauniqueid=*,cn=hbac,$SUFFIX")(version 3.0;acl "permission:Add HBAC rule";allow (add) groupdn = "ldap:///cn=Add HBAC rule,cn=permissions,cn=pbac,$SUFFIX";)',
|
|
],
|
|
'default_privileges': {'HBAC Administrator'},
|
|
},
|
|
'System: Delete HBAC Rule': {
|
|
'ipapermright': {'delete'},
|
|
'replaces': [
|
|
'(target = "ldap:///ipauniqueid=*,cn=hbac,$SUFFIX")(version 3.0;acl "permission:Delete HBAC rule";allow (delete) groupdn = "ldap:///cn=Delete HBAC rule,cn=permissions,cn=pbac,$SUFFIX";)',
|
|
],
|
|
'default_privileges': {'HBAC Administrator'},
|
|
},
|
|
'System: Manage HBAC Rule Membership': {
|
|
'ipapermright': {'write'},
|
|
'ipapermdefaultattr': {
|
|
'externalhost', 'memberhost', 'memberservice', 'memberuser'
|
|
},
|
|
'replaces': [
|
|
'(targetattr = "memberuser || externalhost || memberservice || memberhost")(target = "ldap:///ipauniqueid=*,cn=hbac,$SUFFIX")(version 3.0;acl "permission:Manage HBAC rule membership";allow (write) groupdn = "ldap:///cn=Manage HBAC rule membership,cn=permissions,cn=pbac,$SUFFIX";)',
|
|
],
|
|
'default_privileges': {'HBAC Administrator'},
|
|
},
|
|
'System: Modify HBAC Rule': {
|
|
'ipapermright': {'write'},
|
|
'ipapermdefaultattr': {
|
|
'accessruletype', 'accesstime', 'cn', 'description',
|
|
'hostcategory', 'ipaenabledflag', 'servicecategory',
|
|
'sourcehost', 'sourcehostcategory', 'usercategory'
|
|
},
|
|
'replaces': [
|
|
'(targetattr = "servicecategory || sourcehostcategory || cn || description || ipaenabledflag || accesstime || usercategory || hostcategory || accessruletype || sourcehost")(target = "ldap:///ipauniqueid=*,cn=hbac,$SUFFIX")(version 3.0;acl "permission:Modify HBAC rule";allow (write) groupdn = "ldap:///cn=Modify HBAC rule,cn=permissions,cn=pbac,$SUFFIX";)',
|
|
],
|
|
'default_privileges': {'HBAC Administrator'},
|
|
},
|
|
}
|
|
|
|
label = _('HBAC Rules')
|
|
label_singular = _('HBAC Rule')
|
|
|
|
takes_params = (
|
|
Str('cn',
|
|
cli_name='name',
|
|
label=_('Rule name'),
|
|
primary_key=True,
|
|
),
|
|
StrEnum('accessruletype', validate_type,
|
|
cli_name='type',
|
|
doc=_('Rule type (allow)'),
|
|
label=_('Rule type'),
|
|
values=(u'allow', u'deny'),
|
|
default=u'allow',
|
|
autofill=True,
|
|
exclude='webui',
|
|
flags=['no_option', 'no_output'],
|
|
),
|
|
# FIXME: {user,host,service}categories should expand in the future
|
|
StrEnum('usercategory?',
|
|
cli_name='usercat',
|
|
label=_('User category'),
|
|
doc=_('User category the rule applies to'),
|
|
values=(u'all', ),
|
|
),
|
|
StrEnum('hostcategory?',
|
|
cli_name='hostcat',
|
|
label=_('Host category'),
|
|
doc=_('Host category the rule applies to'),
|
|
values=(u'all', ),
|
|
),
|
|
StrEnum('sourcehostcategory?',
|
|
deprecated=True,
|
|
cli_name='srchostcat',
|
|
label=_('Source host category'),
|
|
doc=_('Source host category the rule applies to'),
|
|
values=(u'all', ),
|
|
flags={'no_option'},
|
|
),
|
|
StrEnum('servicecategory?',
|
|
cli_name='servicecat',
|
|
label=_('Service category'),
|
|
doc=_('Service category the rule applies to'),
|
|
values=(u'all', ),
|
|
),
|
|
# AccessTime('accesstime?',
|
|
# cli_name='time',
|
|
# label=_('Access time'),
|
|
# ),
|
|
Str('description?',
|
|
cli_name='desc',
|
|
label=_('Description'),
|
|
),
|
|
Bool('ipaenabledflag?',
|
|
label=_('Enabled'),
|
|
flags=['no_option'],
|
|
),
|
|
Str('memberuser_user?',
|
|
label=_('Users'),
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
),
|
|
Str('memberuser_group?',
|
|
label=_('User Groups'),
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
),
|
|
Str('memberhost_host?',
|
|
label=_('Hosts'),
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
),
|
|
Str('memberhost_hostgroup?',
|
|
label=_('Host Groups'),
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
),
|
|
Str('sourcehost_host?',
|
|
deprecated=True,
|
|
label=_('Source Hosts'),
|
|
flags=['no_create', 'no_update', 'no_search', 'no_option'],
|
|
),
|
|
Str('sourcehost_hostgroup?',
|
|
deprecated=True,
|
|
label=_('Source Host Groups'),
|
|
flags=['no_create', 'no_update', 'no_search', 'no_option'],
|
|
),
|
|
Str('memberservice_hbacsvc?',
|
|
label=_('Services'),
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
),
|
|
Str('memberservice_hbacsvcgroup?',
|
|
label=_('Service Groups'),
|
|
flags=['no_create', 'no_update', 'no_search'],
|
|
),
|
|
external_host_param,
|
|
)
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_add(LDAPCreate):
|
|
__doc__ = _('Create a new HBAC rule.')
|
|
|
|
msg_summary = _('Added HBAC rule "%(value)s"')
|
|
|
|
def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys, **options):
|
|
assert isinstance(dn, DN)
|
|
# HBAC rules are enabled by default
|
|
entry_attrs['ipaenabledflag'] = 'TRUE'
|
|
return dn
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_del(LDAPDelete):
|
|
__doc__ = _('Delete an HBAC rule.')
|
|
|
|
msg_summary = _('Deleted HBAC rule "%(value)s"')
|
|
|
|
def pre_callback(self, ldap, dn, *keys, **options):
|
|
assert isinstance(dn, DN)
|
|
kw = dict(seealso=keys[0])
|
|
_entries = api.Command.selinuxusermap_find(None, **kw)
|
|
if _entries['count']:
|
|
raise errors.DependentEntry(key=keys[0], label=self.api.Object['selinuxusermap'].label_singular, dependent=_entries['result'][0]['cn'][0])
|
|
|
|
return dn
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_mod(LDAPUpdate):
|
|
__doc__ = _('Modify an HBAC rule.')
|
|
|
|
msg_summary = _('Modified HBAC rule "%(value)s"')
|
|
|
|
def pre_callback(self, ldap, dn, entry_attrs, attrs_list, *keys, **options):
|
|
assert isinstance(dn, DN)
|
|
try:
|
|
entry_attrs = ldap.get_entry(dn, attrs_list)
|
|
dn = entry_attrs.dn
|
|
except errors.NotFound:
|
|
raise self.obj.handle_not_found(*keys)
|
|
|
|
if is_all(options, 'usercategory') and 'memberuser' in entry_attrs:
|
|
raise errors.MutuallyExclusiveError(
|
|
reason=_("user category cannot be set to 'all' while there "
|
|
"are allowed users")
|
|
)
|
|
if is_all(options, 'hostcategory') and 'memberhost' in entry_attrs:
|
|
raise errors.MutuallyExclusiveError(
|
|
reason=_("host category cannot be set to 'all' while there "
|
|
"are allowed hosts")
|
|
)
|
|
if (is_all(options, 'servicecategory')
|
|
and 'memberservice' in entry_attrs):
|
|
raise errors.MutuallyExclusiveError(
|
|
reason=_("service category cannot be set to 'all' while "
|
|
"there are allowed services")
|
|
)
|
|
return dn
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_find(LDAPSearch):
|
|
__doc__ = _('Search for HBAC rules.')
|
|
|
|
msg_summary = ngettext(
|
|
'%(count)d HBAC rule matched', '%(count)d HBAC rules matched', 0
|
|
)
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_show(LDAPRetrieve):
|
|
__doc__ = _('Display the properties of an HBAC rule.')
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_enable(LDAPQuery):
|
|
__doc__ = _('Enable an HBAC rule.')
|
|
|
|
msg_summary = _('Enabled HBAC rule "%(value)s"')
|
|
has_output = output.standard_value
|
|
|
|
def execute(self, cn, **options):
|
|
ldap = self.obj.backend
|
|
|
|
dn = self.obj.get_dn(cn)
|
|
try:
|
|
entry_attrs = ldap.get_entry(dn, ['ipaenabledflag'])
|
|
except errors.NotFound:
|
|
raise self.obj.handle_not_found(cn)
|
|
|
|
entry_attrs['ipaenabledflag'] = ['TRUE']
|
|
|
|
try:
|
|
ldap.update_entry(entry_attrs)
|
|
except errors.EmptyModlist:
|
|
pass
|
|
|
|
return dict(
|
|
result=True,
|
|
value=pkey_to_value(cn, options),
|
|
)
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_disable(LDAPQuery):
|
|
__doc__ = _('Disable an HBAC rule.')
|
|
|
|
msg_summary = _('Disabled HBAC rule "%(value)s"')
|
|
has_output = output.standard_value
|
|
|
|
def execute(self, cn, **options):
|
|
ldap = self.obj.backend
|
|
|
|
dn = self.obj.get_dn(cn)
|
|
try:
|
|
entry_attrs = ldap.get_entry(dn, ['ipaenabledflag'])
|
|
except errors.NotFound:
|
|
raise self.obj.handle_not_found(cn)
|
|
|
|
entry_attrs['ipaenabledflag'] = ['FALSE']
|
|
|
|
try:
|
|
ldap.update_entry(entry_attrs)
|
|
except errors.EmptyModlist:
|
|
pass
|
|
|
|
return dict(
|
|
result=True,
|
|
value=pkey_to_value(cn, options),
|
|
)
|
|
|
|
|
|
# @register()
|
|
class hbacrule_add_accesstime(LDAPQuery):
|
|
"""
|
|
Add an access time to an HBAC rule.
|
|
"""
|
|
|
|
takes_options = (
|
|
AccessTime('accesstime',
|
|
cli_name='time',
|
|
label=_('Access time'),
|
|
),
|
|
)
|
|
|
|
def execute(self, cn, **options):
|
|
ldap = self.obj.backend
|
|
|
|
dn = self.obj.get_dn(cn)
|
|
|
|
entry_attrs = ldap.get_entry(dn, ['accesstime'])
|
|
entry_attrs.setdefault('accesstime', []).append(
|
|
options['accesstime']
|
|
)
|
|
try:
|
|
ldap.update_entry(entry_attrs)
|
|
except errors.EmptyModlist:
|
|
pass
|
|
except errors.NotFound:
|
|
raise self.obj.handle_not_found(cn)
|
|
|
|
return dict(result=True)
|
|
|
|
|
|
# @register()
|
|
class hbacrule_remove_accesstime(LDAPQuery):
|
|
"""
|
|
Remove access time to HBAC rule.
|
|
"""
|
|
takes_options = (
|
|
AccessTime('accesstime?',
|
|
cli_name='time',
|
|
label=_('Access time'),
|
|
),
|
|
)
|
|
|
|
def execute(self, cn, **options):
|
|
ldap = self.obj.backend
|
|
|
|
dn = self.obj.get_dn(cn)
|
|
|
|
entry_attrs = ldap.get_entry(dn, ['accesstime'])
|
|
try:
|
|
entry_attrs.setdefault('accesstime', []).remove(
|
|
options['accesstime']
|
|
)
|
|
ldap.update_entry(entry_attrs)
|
|
except (ValueError, errors.EmptyModlist):
|
|
pass
|
|
except errors.NotFound:
|
|
raise self.obj.handle_not_found(cn)
|
|
|
|
return dict(result=True)
|
|
|
|
|
|
@register()
|
|
class hbacrule_add_user(LDAPAddMember):
|
|
__doc__ = _('Add users and groups to an HBAC rule.')
|
|
|
|
member_attributes = ['memberuser']
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
def pre_callback(self, ldap, dn, found, not_found, *keys, **options):
|
|
assert isinstance(dn, DN)
|
|
try:
|
|
entry_attrs = ldap.get_entry(dn, self.obj.default_attributes)
|
|
dn = entry_attrs.dn
|
|
except errors.NotFound:
|
|
raise self.obj.handle_not_found(*keys)
|
|
if ('usercategory' in entry_attrs and
|
|
entry_attrs['usercategory'][0].lower() == 'all'):
|
|
raise errors.MutuallyExclusiveError(
|
|
reason=_("users cannot be added when user category='all'"))
|
|
return dn
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_remove_user(LDAPRemoveMember):
|
|
__doc__ = _('Remove users and groups from an HBAC rule.')
|
|
|
|
member_attributes = ['memberuser']
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_add_host(LDAPAddMember):
|
|
__doc__ = _('Add target hosts and hostgroups to an HBAC rule.')
|
|
|
|
member_attributes = ['memberhost']
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
def pre_callback(self, ldap, dn, found, not_found, *keys, **options):
|
|
assert isinstance(dn, DN)
|
|
try:
|
|
entry_attrs = ldap.get_entry(dn, self.obj.default_attributes)
|
|
dn = entry_attrs.dn
|
|
except errors.NotFound:
|
|
raise self.obj.handle_not_found(*keys)
|
|
if ('hostcategory' in entry_attrs and
|
|
entry_attrs['hostcategory'][0].lower() == 'all'):
|
|
raise errors.MutuallyExclusiveError(
|
|
reason=_("hosts cannot be added when host category='all'"))
|
|
return dn
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_remove_host(LDAPRemoveMember):
|
|
__doc__ = _('Remove target hosts and hostgroups from an HBAC rule.')
|
|
|
|
member_attributes = ['memberhost']
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_add_sourcehost(LDAPAddMember):
|
|
__doc__ = _('Add source hosts and hostgroups to an HBAC rule.')
|
|
NO_CLI = True
|
|
|
|
member_attributes = ['sourcehost']
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
def validate(self, **kw):
|
|
raise errors.DeprecationError(name='hbacrule_add_sourcehost')
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_remove_sourcehost(LDAPRemoveMember):
|
|
__doc__ = _('Remove source hosts and hostgroups from an HBAC rule.')
|
|
NO_CLI = True
|
|
|
|
member_attributes = ['sourcehost']
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|
|
|
|
def validate(self, **kw):
|
|
raise errors.DeprecationError(name='hbacrule_remove_sourcehost')
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_add_service(LDAPAddMember):
|
|
__doc__ = _('Add services to an HBAC rule.')
|
|
|
|
member_attributes = ['memberservice']
|
|
member_count_out = ('%i object added.', '%i objects added.')
|
|
|
|
def pre_callback(self, ldap, dn, found, not_found, *keys, **options):
|
|
assert isinstance(dn, DN)
|
|
try:
|
|
entry_attrs = ldap.get_entry(dn, self.obj.default_attributes)
|
|
dn = entry_attrs.dn
|
|
except errors.NotFound:
|
|
raise self.obj.handle_not_found(*keys)
|
|
if ('servicecategory' in entry_attrs and
|
|
entry_attrs['servicecategory'][0].lower() == 'all'):
|
|
raise errors.MutuallyExclusiveError(reason=_(
|
|
"services cannot be added when service category='all'"))
|
|
return dn
|
|
|
|
|
|
|
|
@register()
|
|
class hbacrule_remove_service(LDAPRemoveMember):
|
|
__doc__ = _('Remove service and service groups from an HBAC rule.')
|
|
|
|
member_attributes = ['memberservice']
|
|
member_count_out = ('%i object removed.', '%i objects removed.')
|