mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-01-16 11:21:56 -06:00
e1f6962545
Password policies are sorted by priority. When paging is enabled, table facet uses pwpolicy-find --pkey-only to get all pwpolicies keys. Those keys are sorted on server by priority but table facet sorts them again. This breaks the priority sorting. This patch disables the paging in passord policy serch page so the keys are sorted by priority. TODO: we should inspect sorting in table facet more deeply and disable it if it don't break anything. https://fedorahosted.org/freeipa/ticket/2676
108 lines
3.0 KiB
JavaScript
108 lines
3.0 KiB
JavaScript
/*jsl:import ipa.js */
|
|
/*jsl:import search.js */
|
|
|
|
/* Authors:
|
|
* Adam Young <ayoung@redhat.com>
|
|
*
|
|
* Copyright (C) 2010 Red Hat
|
|
* see file 'COPYING' for use and warranty information
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
/* REQUIRES: ipa.js, details.js, search.js, add.js, facet.js, entity.js */
|
|
|
|
IPA.pwpolicy = {};
|
|
|
|
IPA.pwpolicy.entity = function(spec) {
|
|
|
|
var that = IPA.entity(spec);
|
|
|
|
that.init = function() {
|
|
that.entity_init();
|
|
|
|
that.builder.search_facet({
|
|
pagination: false,
|
|
columns:['cn','cospriority']
|
|
}).
|
|
details_facet({
|
|
sections:[
|
|
{
|
|
name : 'identity',
|
|
fields:[
|
|
{
|
|
type: 'link',
|
|
name: 'cn',
|
|
other_entity: 'group'
|
|
},
|
|
'krbmaxpwdlife',
|
|
'krbminpwdlife',
|
|
'krbpwdhistorylength',
|
|
'krbpwdmindiffchars',
|
|
'krbpwdminlength',
|
|
'krbpwdmaxfailure',
|
|
'krbpwdfailurecountinterval',
|
|
'krbpwdlockoutduration',
|
|
'cospriority'
|
|
]
|
|
}]}).
|
|
standard_association_facets().
|
|
adder_dialog({
|
|
fields: [
|
|
{
|
|
type: 'entity_select',
|
|
name: 'cn',
|
|
other_entity: 'group',
|
|
other_field: 'cn',
|
|
required: true
|
|
},
|
|
'cospriority'
|
|
],
|
|
height: 300
|
|
});
|
|
};
|
|
|
|
return that;
|
|
};
|
|
|
|
IPA.krbtpolicy = {};
|
|
|
|
IPA.krbtpolicy.entity = function(spec) {
|
|
|
|
var that = IPA.entity(spec);
|
|
|
|
that.init = function() {
|
|
that.entity_init();
|
|
|
|
that.builder.details_facet({
|
|
title: IPA.metadata.objects.krbtpolicy.label,
|
|
sections: [
|
|
{
|
|
name: 'identity',
|
|
fields: [
|
|
'krbmaxrenewableage',
|
|
'krbmaxticketlife'
|
|
]
|
|
}
|
|
],
|
|
needs_update: true
|
|
});
|
|
};
|
|
|
|
return that;
|
|
};
|
|
|
|
IPA.register('pwpolicy', IPA.pwpolicy.entity);
|
|
IPA.register('krbtpolicy', IPA.krbtpolicy.entity);
|