From 23dd6ad21e09a14a802c7776bf073f22011f7eb6 Mon Sep 17 00:00:00 2001
From: Jan Cholasta <jcholast@redhat.com>
Date: Tue, 18 Aug 2015 21:44:13 +0200
Subject: [PATCH] vault: Add container information to vault command results
https://fedorahosted.org/freeipa/ticket/5150
Reviewed-By: Petr Vobornik <pvoborni@redhat.com>
---
ipalib/plugins/vault.py | 44 ++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 44 insertions(+)
diff --git a/ipalib/plugins/vault.py b/ipalib/plugins/vault.py
index ff021a6a2106b6bcbd690b50bf58e49249e80500..712e2d5ddfa723eb84b80a261289a7cf1c75674f 100644
--- a/ipalib/plugins/vault.py
+++ b/ipalib/plugins/vault.py
@@ -322,6 +322,21 @@ class vault(LDAPObject):
label=_('Failed owners'),
flags=['no_create', 'no_update', 'no_search'],
),
+ Str(
+ 'service?',
+ label=_('Vault service'),
+ flags={'virtual_attribute', 'no_create', 'no_update', 'no_search'},
+ ),
+ Flag(
+ 'shared?',
+ label=_('Shared vault'),
+ flags={'virtual_attribute', 'no_create', 'no_update', 'no_search'},
+ ),
+ Str(
+ 'username?',
+ label=_('Vault user'),
+ flags={'virtual_attribute', 'no_create', 'no_update', 'no_search'},
+ ),
)
def get_dn(self, *keys, **options):
@@ -523,6 +538,17 @@ class vault(LDAPObject):
raise errors.AuthenticationError(
message=_('Invalid credentials'))
+ def get_container_attribute(self, entry, options):
+ if options.get('raw', False):
+ return
+ container_dn = DN(self.container_dn, self.api.env.basedn)
+ if entry.dn.endswith(DN(('cn', 'services'), container_dn)):
+ entry['service'] = entry.dn[1]['cn']
+ elif entry.dn.endswith(DN(('cn', 'shared'), container_dn)):
+ entry['shared'] = True
+ elif entry.dn.endswith(DN(('cn', 'users'), container_dn)):
+ entry['username'] = entry.dn[1]['cn']
+
@register()
class vault_add(PKQuery, Local):
@@ -738,6 +764,10 @@ class vault_add_internal(LDAPCreate):
return dn
+ def post_callback(self, ldap, dn, entry, *keys, **options):
+ self.obj.get_container_attribute(entry, options)
+ return dn
+
@register()
class vault_del(LDAPDelete):
@@ -806,6 +836,11 @@ class vault_find(LDAPSearch):
return (filter, base_dn, scope)
+ def post_callback(self, ldap, entries, truncated, *args, **options):
+ for entry in entries:
+ self.obj.get_container_attribute(entry, options)
+ return truncated
+
def exc_callback(self, args, options, exc, call_func, *call_args,
**call_kwargs):
if call_func.__name__ == 'find_entries':
@@ -836,6 +871,10 @@ class vault_mod(LDAPUpdate):
return dn
+ def post_callback(self, ldap, dn, entry_attrs, *keys, **options):
+ self.obj.get_container_attribute(entry_attrs, options)
+ return dn
+
@register()
class vault_show(LDAPRetrieve):
@@ -854,6 +893,10 @@ class vault_show(LDAPRetrieve):
return dn
+ def post_callback(self, ldap, dn, entry_attrs, *keys, **options):
+ self.obj.get_container_attribute(entry_attrs, options)
+ return dn
+
@register()
class vaultconfig(Object):
@@ -1452,6 +1495,7 @@ class VaultModMember(LDAPModMember):
def post_callback(self, ldap, completed, failed, dn, entry_attrs, *keys, **options):
for fail in failed.itervalues():
fail['services'] = fail.pop('service', [])
+ self.obj.get_container_attribute(entry_attrs, options)
return completed, dn
--
2.4.3