summaryrefslogtreecommitdiffstats
path: root/src/ldapcontroller.h
diff options
context:
space:
mode:
authorTimothy Pearson <kb9vqf@pearsoncomputing.net>2012-06-06 04:16:24 -0500
committerTimothy Pearson <kb9vqf@pearsoncomputing.net>2012-06-06 04:16:24 -0500
commit75044dd48af51f848e49f6705ec6e9423571dd8c (patch)
treea973bc28051a6706dc6e28f807538bc3e8f3488c /src/ldapcontroller.h
parentbf4dbda9682241deffb3ec704e2597a12496d2a8 (diff)
downloadkcmldapcontroller-75044dd48af51f848e49f6705ec6e9423571dd8c.tar.gz
kcmldapcontroller-75044dd48af51f848e49f6705ec6e9423571dd8c.zip
Add ssl generation and storage
Diffstat (limited to 'src/ldapcontroller.h')
-rw-r--r--src/ldapcontroller.h26
1 files changed, 25 insertions, 1 deletions
diff --git a/src/ldapcontroller.h b/src/ldapcontroller.h
index a15c8d2..4c8c5a9 100644
--- a/src/ldapcontroller.h
+++ b/src/ldapcontroller.h
@@ -42,6 +42,27 @@ enum sc_command {
SC_SETDBPERMS
};
+// PRIVATE
+class LDAPCertConfig
+{
+ public:
+ bool generate_certs;
+ TQString provided_kerberos_pem;
+ TQString provided_kerberos_pemkey;
+ TQString provided_kerberos_crt;
+ TQString provided_kerberos_key;
+ TQString provided_ldap_crt;
+ TQString provided_ldap_key;
+
+ TQString countryName;
+ TQString stateOrProvinceName;
+ TQString localityName;
+ TQString organizationName;
+ TQString orgUnitName;
+ TQString commonName;
+ TQString emailAddress;
+};
+
class LDAPController: public KCModule
{
Q_OBJECT
@@ -58,7 +79,7 @@ class LDAPController: public KCModule
virtual const KAboutData *aboutData() const { return myAboutData; };
public:
- int createNewLDAPRealm(TQWidget* dialogparent, LDAPRealmConfig realmconfig, TQString adminUserName, TQString adminGroupName, TQString machineAdminGroupName, const char * adminPassword, TQString rootUserName, const char * rootPassword, TQString adminRealm, TQString *errstr);
+ int createNewLDAPRealm(TQWidget* dialogparent, LDAPRealmConfig realmconfig, TQString adminUserName, TQString adminGroupName, TQString machineAdminGroupName, const char * adminPassword, TQString rootUserName, const char * rootPassword, TQString adminRealm, LDAPCertConfig certinfo, TQString *errstr);
private slots:
void systemRoleChanged();
@@ -73,6 +94,7 @@ class LDAPController: public KCModule
int addLDAPEntryToKerberosRealm(TQString ldapProcessOwnerName, TQString ldapHost, TQString *errstr);
int addHostEntryToKerberosRealm(TQString kerberosHost, TQString *errstr);
int setKerberosPasswordForUser(LDAPCredentials user, TQString *errstr);
+ int createRealmCertificates(LDAPCertConfig certinfo, LDAPRealmConfig realmconfig, uid_t ldap_uid, gid_t ldap_gid);
private:
KAboutData *myAboutData;
@@ -84,6 +106,8 @@ class LDAPController: public KCModule
int m_prevRole;
TQString m_ldapUserName;
TQString m_ldapGroupName;
+
+ LDAPCertConfig m_certconfig;
};
#endif // _LDAPCONTROLLER_H_