Coverage for ipalib/plugins/pkinit : 46%
        
        
Hot-keys on this page
r m x p toggle line displays
j k next/prev highlighted chunk
0 (zero) top of page
1 (one) first highlighted chunk
| 
 # Authors: # Simo Sorce <ssorce@redhat.com> # # Copyright (C) 2010 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. 
 
 Kerberos pkinit options 
 Enable or disable anonymous pkinit using the principal WELLKNOWN/ANONYMOUS@REALM. The server must have been installed with pkinit support. 
 EXAMPLES: 
 Enable anonymous pkinit: ipa pkinit-anonymous enable 
 Disable anonymous pkinit: ipa pkinit-anonymous disable 
 For more information on anonymous pkinit see: 
 http://k5wiki.kerberos.org/wiki/Projects/Anonymous_pkinit """) 
 """ PKINIT Options """ 
 
 
 """ Accepts only Enable/Disable. """ a = action.lower() if a != 'enable' and a != 'disable': raise errors.ValidationError( name='action', error='Unknown command %s' % action ) 
 
 princ_name, api.env.realm, api.env.basedn ) 
 Str('action', valid_arg), ) 
 ldap = self.api.Backend.ldap2 set_lock = False lock = None 
 (dn, entry_attrs) = ldap.get_entry(self.default_dn, ['nsaccountlock']) 
 if 'nsaccountlock' in entry_attrs: lock = entry_attrs['nsaccountlock'][0].lower() 
 if action.lower() == 'enable': if lock == 'true': set_lock = True lock = None elif action.lower() == 'disable': if lock != 'true': set_lock = True lock = 'TRUE' 
 if set_lock: ldap.update_entry(dn, {'nsaccountlock':lock}) 
 return dict(result=True) 
  |