mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-26 17:01:14 -06:00
2cf7c7b4ac
Bundle remote plugin interface definitions for servers which lack API schema support. These server API versions are included: * 2.49: IPA 3.1.0 on RHEL/CentOS 6.5+, * 2.114: IPA 4.1.4 on Fedora 22, * 2.156: IPA 4.2.0 on RHEL/CentOS 7.2 and IPA 4.2.4 on Fedora 23, * 2.164: IPA 4.3.1 on Fedora 23. For servers with other API versions, the closest lower API version is used. https://fedorahosted.org/freeipa/ticket/4739 Reviewed-By: David Kupka <dkupka@redhat.com>
813 lines
25 KiB
Python
813 lines
25 KiB
Python
#
|
|
# Copyright (C) 2016 FreeIPA Contributors see COPYING for license
|
|
#
|
|
|
|
# pylint: disable=unused-import
|
|
import six
|
|
|
|
from . import Command, Method, Object
|
|
from ipalib import api, parameters, output
|
|
from ipalib.parameters import DefaultFrom
|
|
from ipalib.plugable import Registry
|
|
from ipalib.text import _
|
|
from ipapython.dn import DN
|
|
from ipapython.dnsutil import DNSName
|
|
|
|
if six.PY3:
|
|
unicode = str
|
|
|
|
__doc__ = _("""
|
|
Directory Server Access Control Instructions (ACIs)
|
|
|
|
ACIs are used to allow or deny access to information. This module is
|
|
currently designed to allow, not deny, access.
|
|
|
|
The aci commands are designed to grant permissions that allow updating
|
|
existing entries or adding or deleting new ones. The goal of the ACIs
|
|
that ship with IPA is to provide a set of low-level permissions that
|
|
grant access to special groups called taskgroups. These low-level
|
|
permissions can be combined into roles that grant broader access. These
|
|
roles are another type of group, roles.
|
|
|
|
For example, if you have taskgroups that allow adding and modifying users you
|
|
could create a role, useradmin. You would assign users to the useradmin
|
|
role to allow them to do the operations defined by the taskgroups.
|
|
|
|
You can create ACIs that delegate permission so users in group A can write
|
|
attributes on group B.
|
|
|
|
The type option is a map that applies to all entries in the users, groups or
|
|
host location. It is primarily designed to be used when granting add
|
|
permissions (to write new entries).
|
|
|
|
An ACI consists of three parts:
|
|
1. target
|
|
2. permissions
|
|
3. bind rules
|
|
|
|
The target is a set of rules that define which LDAP objects are being
|
|
targeted. This can include a list of attributes, an area of that LDAP
|
|
tree or an LDAP filter.
|
|
|
|
The targets include:
|
|
- attrs: list of attributes affected
|
|
- type: an object type (user, group, host, service, etc)
|
|
- memberof: members of a group
|
|
- targetgroup: grant access to modify a specific group. This is primarily
|
|
designed to enable users to add or remove members of a specific group.
|
|
- filter: A legal LDAP filter used to narrow the scope of the target.
|
|
- subtree: Used to apply a rule across an entire set of objects. For example,
|
|
to allow adding users you need to grant "add" permission to the subtree
|
|
ldap://uid=*,cn=users,cn=accounts,dc=example,dc=com. The subtree option
|
|
is a fail-safe for objects that may not be covered by the type option.
|
|
|
|
The permissions define what the ACI is allowed to do, and are one or
|
|
more of:
|
|
1. write - write one or more attributes
|
|
2. read - read one or more attributes
|
|
3. add - add a new entry to the tree
|
|
4. delete - delete an existing entry
|
|
5. all - all permissions are granted
|
|
|
|
Note the distinction between attributes and entries. The permissions are
|
|
independent, so being able to add a user does not mean that the user will
|
|
be editable.
|
|
|
|
The bind rule defines who this ACI grants permissions to. The LDAP server
|
|
allows this to be any valid LDAP entry but we encourage the use of
|
|
taskgroups so that the rights can be easily shared through roles.
|
|
|
|
For a more thorough description of access controls see
|
|
http://www.redhat.com/docs/manuals/dir-server/ag/8.0/Managing_Access_Control.html
|
|
|
|
EXAMPLES:
|
|
|
|
NOTE: ACIs are now added via the permission plugin. These examples are to
|
|
demonstrate how the various options work but this is done via the permission
|
|
command-line now (see last example).
|
|
|
|
Add an ACI so that the group "secretaries" can update the address on any user:
|
|
ipa group-add --desc="Office secretaries" secretaries
|
|
ipa aci-add --attrs=streetAddress --memberof=ipausers --group=secretaries --permissions=write --prefix=none "Secretaries write addresses"
|
|
|
|
Show the new ACI:
|
|
ipa aci-show --prefix=none "Secretaries write addresses"
|
|
|
|
Add an ACI that allows members of the "addusers" permission to add new users:
|
|
ipa aci-add --type=user --permission=addusers --permissions=add --prefix=none "Add new users"
|
|
|
|
Add an ACI that allows members of the editors manage members of the admins group:
|
|
ipa aci-add --permissions=write --attrs=member --targetgroup=admins --group=editors --prefix=none "Editors manage admins"
|
|
|
|
Add an ACI that allows members of the admins group to manage the street and zip code of those in the editors group:
|
|
ipa aci-add --permissions=write --memberof=editors --group=admins --attrs=street --attrs=postalcode --prefix=none "admins edit the address of editors"
|
|
|
|
Add an ACI that allows the admins group manage the street and zipcode of those who work for the boss:
|
|
ipa aci-add --permissions=write --group=admins --attrs=street --attrs=postalcode --filter="(manager=uid=boss,cn=users,cn=accounts,dc=example,dc=com)" --prefix=none "Edit the address of those who work for the boss"
|
|
|
|
Add an entirely new kind of record to IPA that isn't covered by any of the --type options, creating a permission:
|
|
ipa permission-add --permissions=add --subtree="cn=*,cn=orange,cn=accounts,dc=example,dc=com" --desc="Add Orange Entries" add_orange
|
|
|
|
|
|
The show command shows the raw 389-ds ACI.
|
|
|
|
IMPORTANT: When modifying the target attributes of an existing ACI you
|
|
must include all existing attributes as well. When doing an aci-mod the
|
|
targetattr REPLACES the current attributes, it does not add to them.
|
|
""")
|
|
|
|
register = Registry()
|
|
|
|
|
|
@register()
|
|
class aci(Object):
|
|
takes_params = (
|
|
parameters.Str(
|
|
'aciname',
|
|
primary_key=True,
|
|
label=_(u'ACI name'),
|
|
),
|
|
parameters.Str(
|
|
'permission',
|
|
required=False,
|
|
label=_(u'Permission'),
|
|
doc=_(u'Permission ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'group',
|
|
required=False,
|
|
label=_(u'User group'),
|
|
doc=_(u'User group ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'permissions',
|
|
multivalue=True,
|
|
label=_(u'Permissions'),
|
|
doc=_(u'Permissions to grant(read, write, add, delete, all)'),
|
|
),
|
|
parameters.Str(
|
|
'attrs',
|
|
required=False,
|
|
multivalue=True,
|
|
label=_(u'Attributes to which the permission applies'),
|
|
doc=_(u'Attributes'),
|
|
),
|
|
parameters.Str(
|
|
'type',
|
|
required=False,
|
|
label=_(u'Type'),
|
|
doc=_(u'type of IPA object (user, group, host, hostgroup, service, netgroup)'),
|
|
),
|
|
parameters.Str(
|
|
'memberof',
|
|
required=False,
|
|
label=_(u'Member of'),
|
|
doc=_(u'Member of a group'),
|
|
),
|
|
parameters.Str(
|
|
'filter',
|
|
required=False,
|
|
label=_(u'Filter'),
|
|
doc=_(u'Legal LDAP filter (e.g. ou=Engineering)'),
|
|
),
|
|
parameters.Str(
|
|
'subtree',
|
|
required=False,
|
|
label=_(u'Subtree'),
|
|
doc=_(u'Subtree to apply ACI to'),
|
|
),
|
|
parameters.Str(
|
|
'targetgroup',
|
|
required=False,
|
|
label=_(u'Target group'),
|
|
doc=_(u'Group to apply ACI to'),
|
|
),
|
|
parameters.Flag(
|
|
'selfaci',
|
|
required=False,
|
|
label=_(u'Target your own entry (self)'),
|
|
doc=_(u'Apply ACI to your own entry (self)'),
|
|
),
|
|
)
|
|
|
|
|
|
@register()
|
|
class aci_add(Method):
|
|
__doc__ = _("Create new ACI.")
|
|
|
|
NO_CLI = True
|
|
|
|
takes_args = (
|
|
parameters.Str(
|
|
'aciname',
|
|
cli_name='name',
|
|
label=_(u'ACI name'),
|
|
),
|
|
)
|
|
takes_options = (
|
|
parameters.Str(
|
|
'permission',
|
|
required=False,
|
|
label=_(u'Permission'),
|
|
doc=_(u'Permission ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'group',
|
|
required=False,
|
|
label=_(u'User group'),
|
|
doc=_(u'User group ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'permissions',
|
|
multivalue=True,
|
|
label=_(u'Permissions'),
|
|
doc=_(u'Permissions to grant(read, write, add, delete, all)'),
|
|
no_convert=True,
|
|
),
|
|
parameters.Str(
|
|
'attrs',
|
|
required=False,
|
|
multivalue=True,
|
|
label=_(u'Attributes to which the permission applies'),
|
|
doc=_(u'Attributes'),
|
|
),
|
|
parameters.Str(
|
|
'type',
|
|
required=False,
|
|
cli_metavar="['user', 'group', 'host', 'service', 'hostgroup', 'netgroup', 'dnsrecord']",
|
|
label=_(u'Type'),
|
|
doc=_(u'type of IPA object (user, group, host, hostgroup, service, netgroup)'),
|
|
),
|
|
parameters.Str(
|
|
'memberof',
|
|
required=False,
|
|
label=_(u'Member of'),
|
|
doc=_(u'Member of a group'),
|
|
),
|
|
parameters.Str(
|
|
'filter',
|
|
required=False,
|
|
label=_(u'Filter'),
|
|
doc=_(u'Legal LDAP filter (e.g. ou=Engineering)'),
|
|
),
|
|
parameters.Str(
|
|
'subtree',
|
|
required=False,
|
|
label=_(u'Subtree'),
|
|
doc=_(u'Subtree to apply ACI to'),
|
|
),
|
|
parameters.Str(
|
|
'targetgroup',
|
|
required=False,
|
|
label=_(u'Target group'),
|
|
doc=_(u'Group to apply ACI to'),
|
|
),
|
|
parameters.Flag(
|
|
'selfaci',
|
|
required=False,
|
|
cli_name='self',
|
|
label=_(u'Target your own entry (self)'),
|
|
doc=_(u'Apply ACI to your own entry (self)'),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Str(
|
|
'aciprefix',
|
|
cli_name='prefix',
|
|
cli_metavar="['permission', 'delegation', 'selfservice', 'none']",
|
|
label=_(u'ACI prefix'),
|
|
doc=_(u'Prefix used to distinguish ACI types (permission, delegation, selfservice, none)'),
|
|
),
|
|
parameters.Flag(
|
|
'test',
|
|
required=False,
|
|
doc=_(u"Test the ACI syntax but don't write anything"),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Flag(
|
|
'all',
|
|
doc=_(u'Retrieve and print all attributes from the server. Affects command output.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Flag(
|
|
'raw',
|
|
doc=_(u'Print entries as stored on the server. Only affects output format.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
)
|
|
has_output = (
|
|
output.Output(
|
|
'summary',
|
|
(unicode, type(None)),
|
|
doc=_(u'User-friendly description of action performed'),
|
|
),
|
|
output.Entry(
|
|
'result',
|
|
),
|
|
output.PrimaryKey(
|
|
'value',
|
|
doc=_(u"The primary_key value of the entry, e.g. 'jdoe' for a user"),
|
|
),
|
|
)
|
|
|
|
|
|
@register()
|
|
class aci_del(Method):
|
|
__doc__ = _("Delete ACI.")
|
|
|
|
NO_CLI = True
|
|
|
|
takes_args = (
|
|
parameters.Str(
|
|
'aciname',
|
|
cli_name='name',
|
|
label=_(u'ACI name'),
|
|
),
|
|
)
|
|
takes_options = (
|
|
parameters.Str(
|
|
'aciprefix',
|
|
cli_name='prefix',
|
|
cli_metavar="['permission', 'delegation', 'selfservice', 'none']",
|
|
label=_(u'ACI prefix'),
|
|
doc=_(u'Prefix used to distinguish ACI types (permission, delegation, selfservice, none)'),
|
|
),
|
|
)
|
|
has_output = (
|
|
output.Output(
|
|
'summary',
|
|
(unicode, type(None)),
|
|
doc=_(u'User-friendly description of action performed'),
|
|
),
|
|
output.Output(
|
|
'result',
|
|
bool,
|
|
doc=_(u'True means the operation was successful'),
|
|
),
|
|
output.PrimaryKey(
|
|
'value',
|
|
doc=_(u"The primary_key value of the entry, e.g. 'jdoe' for a user"),
|
|
),
|
|
)
|
|
|
|
|
|
@register()
|
|
class aci_find(Method):
|
|
__doc__ = _("""
|
|
Search for ACIs.
|
|
|
|
Returns a list of ACIs
|
|
|
|
EXAMPLES:
|
|
|
|
To find all ACIs that apply directly to members of the group ipausers:
|
|
ipa aci-find --memberof=ipausers
|
|
|
|
To find all ACIs that grant add access:
|
|
ipa aci-find --permissions=add
|
|
|
|
Note that the find command only looks for the given text in the set of
|
|
ACIs, it does not evaluate the ACIs to see if something would apply.
|
|
For example, searching on memberof=ipausers will find all ACIs that
|
|
have ipausers as a memberof. There may be other ACIs that apply to
|
|
members of that group indirectly.
|
|
""")
|
|
|
|
NO_CLI = True
|
|
|
|
takes_args = (
|
|
parameters.Str(
|
|
'criteria',
|
|
required=False,
|
|
doc=_(u'A string searched in all relevant object attributes'),
|
|
),
|
|
)
|
|
takes_options = (
|
|
parameters.Str(
|
|
'aciname',
|
|
required=False,
|
|
cli_name='name',
|
|
label=_(u'ACI name'),
|
|
),
|
|
parameters.Str(
|
|
'permission',
|
|
required=False,
|
|
label=_(u'Permission'),
|
|
doc=_(u'Permission ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'group',
|
|
required=False,
|
|
label=_(u'User group'),
|
|
doc=_(u'User group ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'permissions',
|
|
required=False,
|
|
multivalue=True,
|
|
label=_(u'Permissions'),
|
|
doc=_(u'Permissions to grant(read, write, add, delete, all)'),
|
|
no_convert=True,
|
|
),
|
|
parameters.Str(
|
|
'attrs',
|
|
required=False,
|
|
multivalue=True,
|
|
label=_(u'Attributes to which the permission applies'),
|
|
doc=_(u'Attributes'),
|
|
),
|
|
parameters.Str(
|
|
'type',
|
|
required=False,
|
|
cli_metavar="['user', 'group', 'host', 'service', 'hostgroup', 'netgroup', 'dnsrecord']",
|
|
label=_(u'Type'),
|
|
doc=_(u'type of IPA object (user, group, host, hostgroup, service, netgroup)'),
|
|
),
|
|
parameters.Str(
|
|
'memberof',
|
|
required=False,
|
|
label=_(u'Member of'),
|
|
doc=_(u'Member of a group'),
|
|
),
|
|
parameters.Str(
|
|
'filter',
|
|
required=False,
|
|
label=_(u'Filter'),
|
|
doc=_(u'Legal LDAP filter (e.g. ou=Engineering)'),
|
|
),
|
|
parameters.Str(
|
|
'subtree',
|
|
required=False,
|
|
label=_(u'Subtree'),
|
|
doc=_(u'Subtree to apply ACI to'),
|
|
),
|
|
parameters.Str(
|
|
'targetgroup',
|
|
required=False,
|
|
label=_(u'Target group'),
|
|
doc=_(u'Group to apply ACI to'),
|
|
),
|
|
parameters.Bool(
|
|
'selfaci',
|
|
required=False,
|
|
cli_name='self',
|
|
label=_(u'Target your own entry (self)'),
|
|
doc=_(u'Apply ACI to your own entry (self)'),
|
|
default=False,
|
|
),
|
|
parameters.Str(
|
|
'aciprefix',
|
|
required=False,
|
|
cli_name='prefix',
|
|
cli_metavar="['permission', 'delegation', 'selfservice', 'none']",
|
|
label=_(u'ACI prefix'),
|
|
doc=_(u'Prefix used to distinguish ACI types (permission, delegation, selfservice, none)'),
|
|
),
|
|
parameters.Flag(
|
|
'pkey_only',
|
|
required=False,
|
|
label=_(u'Primary key only'),
|
|
doc=_(u'Results should contain primary key attribute only ("name")'),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Flag(
|
|
'all',
|
|
doc=_(u'Retrieve and print all attributes from the server. Affects command output.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Flag(
|
|
'raw',
|
|
doc=_(u'Print entries as stored on the server. Only affects output format.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
)
|
|
has_output = (
|
|
output.Output(
|
|
'summary',
|
|
(unicode, type(None)),
|
|
doc=_(u'User-friendly description of action performed'),
|
|
),
|
|
output.ListOfEntries(
|
|
'result',
|
|
),
|
|
output.Output(
|
|
'count',
|
|
int,
|
|
doc=_(u'Number of entries returned'),
|
|
),
|
|
output.Output(
|
|
'truncated',
|
|
bool,
|
|
doc=_(u'True if not all results were returned'),
|
|
),
|
|
)
|
|
|
|
|
|
@register()
|
|
class aci_mod(Method):
|
|
__doc__ = _("Modify ACI.")
|
|
|
|
NO_CLI = True
|
|
|
|
takes_args = (
|
|
parameters.Str(
|
|
'aciname',
|
|
cli_name='name',
|
|
label=_(u'ACI name'),
|
|
),
|
|
)
|
|
takes_options = (
|
|
parameters.Str(
|
|
'permission',
|
|
required=False,
|
|
label=_(u'Permission'),
|
|
doc=_(u'Permission ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'group',
|
|
required=False,
|
|
label=_(u'User group'),
|
|
doc=_(u'User group ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'permissions',
|
|
required=False,
|
|
multivalue=True,
|
|
label=_(u'Permissions'),
|
|
doc=_(u'Permissions to grant(read, write, add, delete, all)'),
|
|
no_convert=True,
|
|
),
|
|
parameters.Str(
|
|
'attrs',
|
|
required=False,
|
|
multivalue=True,
|
|
label=_(u'Attributes to which the permission applies'),
|
|
doc=_(u'Attributes'),
|
|
),
|
|
parameters.Str(
|
|
'type',
|
|
required=False,
|
|
cli_metavar="['user', 'group', 'host', 'service', 'hostgroup', 'netgroup', 'dnsrecord']",
|
|
label=_(u'Type'),
|
|
doc=_(u'type of IPA object (user, group, host, hostgroup, service, netgroup)'),
|
|
),
|
|
parameters.Str(
|
|
'memberof',
|
|
required=False,
|
|
label=_(u'Member of'),
|
|
doc=_(u'Member of a group'),
|
|
),
|
|
parameters.Str(
|
|
'filter',
|
|
required=False,
|
|
label=_(u'Filter'),
|
|
doc=_(u'Legal LDAP filter (e.g. ou=Engineering)'),
|
|
),
|
|
parameters.Str(
|
|
'subtree',
|
|
required=False,
|
|
label=_(u'Subtree'),
|
|
doc=_(u'Subtree to apply ACI to'),
|
|
),
|
|
parameters.Str(
|
|
'targetgroup',
|
|
required=False,
|
|
label=_(u'Target group'),
|
|
doc=_(u'Group to apply ACI to'),
|
|
),
|
|
parameters.Flag(
|
|
'selfaci',
|
|
required=False,
|
|
cli_name='self',
|
|
label=_(u'Target your own entry (self)'),
|
|
doc=_(u'Apply ACI to your own entry (self)'),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Str(
|
|
'aciprefix',
|
|
cli_name='prefix',
|
|
cli_metavar="['permission', 'delegation', 'selfservice', 'none']",
|
|
label=_(u'ACI prefix'),
|
|
doc=_(u'Prefix used to distinguish ACI types (permission, delegation, selfservice, none)'),
|
|
),
|
|
parameters.Flag(
|
|
'all',
|
|
doc=_(u'Retrieve and print all attributes from the server. Affects command output.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Flag(
|
|
'raw',
|
|
doc=_(u'Print entries as stored on the server. Only affects output format.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
)
|
|
has_output = (
|
|
output.Output(
|
|
'summary',
|
|
(unicode, type(None)),
|
|
doc=_(u'User-friendly description of action performed'),
|
|
),
|
|
output.Entry(
|
|
'result',
|
|
),
|
|
output.PrimaryKey(
|
|
'value',
|
|
doc=_(u"The primary_key value of the entry, e.g. 'jdoe' for a user"),
|
|
),
|
|
)
|
|
|
|
|
|
@register()
|
|
class aci_rename(Method):
|
|
__doc__ = _("Rename an ACI.")
|
|
|
|
NO_CLI = True
|
|
|
|
takes_args = (
|
|
parameters.Str(
|
|
'aciname',
|
|
cli_name='name',
|
|
label=_(u'ACI name'),
|
|
),
|
|
)
|
|
takes_options = (
|
|
parameters.Str(
|
|
'permission',
|
|
required=False,
|
|
label=_(u'Permission'),
|
|
doc=_(u'Permission ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'group',
|
|
required=False,
|
|
label=_(u'User group'),
|
|
doc=_(u'User group ACI grants access to'),
|
|
),
|
|
parameters.Str(
|
|
'permissions',
|
|
required=False,
|
|
multivalue=True,
|
|
label=_(u'Permissions'),
|
|
doc=_(u'Permissions to grant(read, write, add, delete, all)'),
|
|
no_convert=True,
|
|
),
|
|
parameters.Str(
|
|
'attrs',
|
|
required=False,
|
|
multivalue=True,
|
|
label=_(u'Attributes to which the permission applies'),
|
|
doc=_(u'Attributes'),
|
|
),
|
|
parameters.Str(
|
|
'type',
|
|
required=False,
|
|
cli_metavar="['user', 'group', 'host', 'service', 'hostgroup', 'netgroup', 'dnsrecord']",
|
|
label=_(u'Type'),
|
|
doc=_(u'type of IPA object (user, group, host, hostgroup, service, netgroup)'),
|
|
),
|
|
parameters.Str(
|
|
'memberof',
|
|
required=False,
|
|
label=_(u'Member of'),
|
|
doc=_(u'Member of a group'),
|
|
),
|
|
parameters.Str(
|
|
'filter',
|
|
required=False,
|
|
label=_(u'Filter'),
|
|
doc=_(u'Legal LDAP filter (e.g. ou=Engineering)'),
|
|
),
|
|
parameters.Str(
|
|
'subtree',
|
|
required=False,
|
|
label=_(u'Subtree'),
|
|
doc=_(u'Subtree to apply ACI to'),
|
|
),
|
|
parameters.Str(
|
|
'targetgroup',
|
|
required=False,
|
|
label=_(u'Target group'),
|
|
doc=_(u'Group to apply ACI to'),
|
|
),
|
|
parameters.Flag(
|
|
'selfaci',
|
|
required=False,
|
|
cli_name='self',
|
|
label=_(u'Target your own entry (self)'),
|
|
doc=_(u'Apply ACI to your own entry (self)'),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Str(
|
|
'aciprefix',
|
|
cli_name='prefix',
|
|
cli_metavar="['permission', 'delegation', 'selfservice', 'none']",
|
|
label=_(u'ACI prefix'),
|
|
doc=_(u'Prefix used to distinguish ACI types (permission, delegation, selfservice, none)'),
|
|
),
|
|
parameters.Str(
|
|
'newname',
|
|
doc=_(u'New ACI name'),
|
|
),
|
|
parameters.Flag(
|
|
'all',
|
|
doc=_(u'Retrieve and print all attributes from the server. Affects command output.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Flag(
|
|
'raw',
|
|
doc=_(u'Print entries as stored on the server. Only affects output format.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
)
|
|
has_output = (
|
|
output.Output(
|
|
'summary',
|
|
(unicode, type(None)),
|
|
doc=_(u'User-friendly description of action performed'),
|
|
),
|
|
output.Entry(
|
|
'result',
|
|
),
|
|
output.PrimaryKey(
|
|
'value',
|
|
doc=_(u"The primary_key value of the entry, e.g. 'jdoe' for a user"),
|
|
),
|
|
)
|
|
|
|
|
|
@register()
|
|
class aci_show(Method):
|
|
__doc__ = _("Display a single ACI given an ACI name.")
|
|
|
|
NO_CLI = True
|
|
|
|
takes_args = (
|
|
parameters.Str(
|
|
'aciname',
|
|
cli_name='name',
|
|
label=_(u'ACI name'),
|
|
),
|
|
)
|
|
takes_options = (
|
|
parameters.Str(
|
|
'aciprefix',
|
|
cli_name='prefix',
|
|
cli_metavar="['permission', 'delegation', 'selfservice', 'none']",
|
|
label=_(u'ACI prefix'),
|
|
doc=_(u'Prefix used to distinguish ACI types (permission, delegation, selfservice, none)'),
|
|
),
|
|
parameters.DNParam(
|
|
'location',
|
|
required=False,
|
|
label=_(u'Location of the ACI'),
|
|
),
|
|
parameters.Flag(
|
|
'all',
|
|
doc=_(u'Retrieve and print all attributes from the server. Affects command output.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
parameters.Flag(
|
|
'raw',
|
|
doc=_(u'Print entries as stored on the server. Only affects output format.'),
|
|
exclude=('webui',),
|
|
default=False,
|
|
autofill=True,
|
|
),
|
|
)
|
|
has_output = (
|
|
output.Output(
|
|
'summary',
|
|
(unicode, type(None)),
|
|
doc=_(u'User-friendly description of action performed'),
|
|
),
|
|
output.Entry(
|
|
'result',
|
|
),
|
|
output.PrimaryKey(
|
|
'value',
|
|
doc=_(u"The primary_key value of the entry, e.g. 'jdoe' for a user"),
|
|
),
|
|
)
|