summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorTimothy Pearson <kb9vqf@pearsoncomputing.net>2013-07-11 15:40:09 +0000
committerTimothy Pearson <kb9vqf@pearsoncomputing.net>2013-07-11 15:40:09 +0000
commita8d5dff35b4310a17da6a0956f718519da1f68cd (patch)
tree90d342f7afe67b17a308a31a4f8d9986ae9c9c4b /src
parentc1ea876011563af4976360a96d42f90d6ef5bcf2 (diff)
downloadkcmldapcontroller-a8d5dff35b4310a17da6a0956f718519da1f68cd.tar.gz
kcmldapcontroller-a8d5dff35b4310a17da6a0956f718519da1f68cd.zip
Use shared realm certificate file name to allow syncrepl to work
Diffstat (limited to 'src')
-rw-r--r--src/ldapcontroller.cpp44
1 files changed, 22 insertions, 22 deletions
diff --git a/src/ldapcontroller.cpp b/src/ldapcontroller.cpp
index 64831c8..8952e1a 100644
--- a/src/ldapcontroller.cpp
+++ b/src/ldapcontroller.cpp
@@ -493,9 +493,9 @@ void LDAPController::updateCertDisplay() {
TQDateTime soon = now.addDays(7); // Keep in sync with cert-updater/main.cpp
TQString kdc_certfile = KERBEROS_PKI_KDC_FILE;
- kdc_certfile.replace("@@@KDCSERVER@@@", m_realmconfig[m_defaultRealm].kdc);
+ kdc_certfile.replace("@@@KDCSERVER@@@", m_realmconfig[m_defaultRealm].name.lower());
TQString ldap_certfile = LDAP_CERT_FILE;
- ldap_certfile.replace("@@@ADMINSERVER@@@", m_realmconfig[m_defaultRealm].admin_server);
+ ldap_certfile.replace("@@@ADMINSERVER@@@", m_realmconfig[m_defaultRealm].name.lower());
// Certificate Authority
if (TQFile::exists(KERBEROS_PKI_PEM_FILE)) {
@@ -642,7 +642,7 @@ void LDAPController::btnkrbRegenerate() {
void LDAPController::btnkrbExportKey() {
TQString kdc_keyfile = KERBEROS_PKI_KDCKEY_FILE;
- kdc_keyfile.replace("@@@KDCSERVER@@@", m_realmconfig[m_defaultRealm].kdc);
+ kdc_keyfile.replace("@@@KDCSERVER@@@", m_realmconfig[m_defaultRealm].name.lower());
KURL src = kdc_keyfile;
KURL dest = KFileDialog::getSaveURL(TQString::null, "*.key|Private Key (*.key)", this, i18n("Select a location to save a copy of the private key..."));
@@ -654,7 +654,7 @@ void LDAPController::btnkrbExportKey() {
void LDAPController::btnkrbExportCert() {
TQString kdc_certfile = KERBEROS_PKI_KDC_FILE;
- kdc_certfile.replace("@@@KDCSERVER@@@", m_realmconfig[m_defaultRealm].kdc);
+ kdc_certfile.replace("@@@KDCSERVER@@@", m_realmconfig[m_defaultRealm].name.lower());
KURL src = kdc_certfile;
KURL dest = KFileDialog::getSaveURL(TQString::null, "*.pem|PKI Certificate Files (*.pem)", this, i18n("Select a location to save a copy of the certificate..."));
@@ -681,7 +681,7 @@ void LDAPController::btnldapRegenerate() {
void LDAPController::btnldapExportKey() {
TQString ldap_keyfile = LDAP_CERTKEY_FILE;
- ldap_keyfile.replace("@@@ADMINSERVER@@@", m_realmconfig[m_defaultRealm].admin_server);
+ ldap_keyfile.replace("@@@ADMINSERVER@@@", m_realmconfig[m_defaultRealm].name.lower());
KURL src = ldap_keyfile;
KURL dest = KFileDialog::getSaveURL(TQString::null, "*.key|Private Key (*.key)", this, i18n("Select a location to save a copy of the private key..."));
@@ -693,7 +693,7 @@ void LDAPController::btnldapExportKey() {
void LDAPController::btnldapExportCert() {
TQString ldap_certfile = LDAP_CERT_FILE;
- ldap_certfile.replace("@@@ADMINSERVER@@@", m_realmconfig[m_defaultRealm].admin_server);
+ ldap_certfile.replace("@@@ADMINSERVER@@@", m_realmconfig[m_defaultRealm].name.lower());
KURL src = ldap_certfile;
KURL dest = KFileDialog::getSaveURL(TQString::null, "*.pem|PKI Certificate Files (*.pem)", this, i18n("Select a location to save a copy of the certificate..."));
@@ -1009,10 +1009,10 @@ void replacePlaceholdersInFile(TQString infile, TQString outfile, LDAPRealmConfi
TQString kdc_keyfile = KERBEROS_PKI_KDCKEY_FILE;
TQString ldap_certfile = LDAP_CERT_FILE;
TQString ldap_keyfile = LDAP_CERTKEY_FILE;
- kdc_certfile.replace("@@@KDCSERVER@@@", realmconfig.kdc);
- kdc_keyfile.replace("@@@KDCSERVER@@@", realmconfig.kdc);
- ldap_certfile.replace("@@@ADMINSERVER@@@", realmconfig.admin_server);
- ldap_keyfile.replace("@@@ADMINSERVER@@@", realmconfig.admin_server);
+ kdc_certfile.replace("@@@KDCSERVER@@@", realmconfig.name.lower());
+ kdc_keyfile.replace("@@@KDCSERVER@@@", realmconfig.name.lower());
+ ldap_certfile.replace("@@@ADMINSERVER@@@", realmconfig.name.lower());
+ ldap_keyfile.replace("@@@ADMINSERVER@@@", realmconfig.name.lower());
TQFile ifile(infile);
TQFile ofile(outfile);
@@ -1026,9 +1026,9 @@ void replacePlaceholdersInFile(TQString infile, TQString outfile, LDAPRealmConfi
line.replace("@@@REALM_DCNAME@@@", basedcname);
line.replace("@@@REALM_UCNAME@@@", realmconfig.name.upper());
line.replace("@@@REALM_LCNAME@@@", realmconfig.name.lower());
- line.replace("@@@ADMINSERVER@@@", realmconfig.admin_server);
+ line.replace("@@@ADMINSERVER@@@", realmconfig.name.lower());
line.replace("@@@ADMINPORT@@@", TQString("%1").arg(realmconfig.admin_server_port));
- line.replace("@@@KDCSERVER@@@", realmconfig.kdc);
+ line.replace("@@@KDCSERVER@@@", realmconfig.name.lower());
line.replace("@@@KDCPORT@@@", TQString("%1").arg(realmconfig.kdc_port));
line.replace("@@@ROOTUSER@@@", rootUserName);
line.replace("@@@ROOTPW_SHA@@@", rootpw_hash);
@@ -1564,9 +1564,9 @@ int LDAPController::createRealmCertificates(LDAPCertConfig certinfo, LDAPRealmCo
TQString kdc_certfile = KERBEROS_PKI_KDC_FILE;
TQString kdc_keyfile = KERBEROS_PKI_KDCKEY_FILE;
TQString kdc_reqfile = KERBEROS_PKI_KDCREQ_FILE;
- kdc_certfile.replace("@@@KDCSERVER@@@", realmconfig.kdc);
- kdc_keyfile.replace("@@@KDCSERVER@@@", realmconfig.kdc);
- kdc_reqfile.replace("@@@KDCSERVER@@@", realmconfig.kdc);
+ kdc_certfile.replace("@@@KDCSERVER@@@", realmconfig.name.lower());
+ kdc_keyfile.replace("@@@KDCSERVER@@@", realmconfig.name.lower());
+ kdc_reqfile.replace("@@@KDCSERVER@@@", realmconfig.name.lower());
command = TQString("openssl genrsa -out %1 %2").arg(kdc_keyfile).arg(KEY_STRENGTH);
system_safe(command);
chmod(kdc_keyfile.ascii(), S_IRUSR|S_IWUSR);
@@ -1578,9 +1578,9 @@ int LDAPController::createRealmCertificates(LDAPCertConfig certinfo, LDAPRealmCo
TQString ldap_certfile = LDAP_CERT_FILE;
TQString ldap_keyfile = LDAP_CERTKEY_FILE;
TQString ldap_reqfile = LDAP_CERTREQ_FILE;
- ldap_certfile.replace("@@@ADMINSERVER@@@", realmconfig.admin_server);
- ldap_keyfile.replace("@@@ADMINSERVER@@@", realmconfig.admin_server);
- ldap_reqfile.replace("@@@ADMINSERVER@@@", realmconfig.admin_server);
+ ldap_certfile.replace("@@@ADMINSERVER@@@", realmconfig.name.lower());
+ ldap_keyfile.replace("@@@ADMINSERVER@@@", realmconfig.name.lower());
+ ldap_reqfile.replace("@@@ADMINSERVER@@@", realmconfig.name.lower());
command = TQString("openssl genrsa -out %1 %2").arg(ldap_keyfile).arg(KEY_STRENGTH);
system_safe(command);
chmod(ldap_keyfile.ascii(), S_IRUSR|S_IWUSR);
@@ -1865,12 +1865,12 @@ int LDAPController::createNewLDAPRealm(TQWidget* dialogparent, LDAPRealmConfig r
// Copy certificates
TQString kdc_certfile = KERBEROS_PKI_KDC_FILE;
TQString kdc_keyfile = KERBEROS_PKI_KDCKEY_FILE;
- kdc_certfile.replace("@@@KDCSERVER@@@", realmconfig.kdc);
- kdc_keyfile.replace("@@@KDCSERVER@@@", realmconfig.kdc);
+ kdc_certfile.replace("@@@KDCSERVER@@@", realmconfig.name.lower());
+ kdc_keyfile.replace("@@@KDCSERVER@@@", realmconfig.name.lower());
TQString ldap_certfile = LDAP_CERT_FILE;
TQString ldap_keyfile = LDAP_CERTKEY_FILE;
- ldap_certfile.replace("@@@ADMINSERVER@@@", realmconfig.admin_server);
- ldap_keyfile.replace("@@@ADMINSERVER@@@", realmconfig.admin_server);
+ ldap_certfile.replace("@@@ADMINSERVER@@@", realmconfig.name.lower());
+ ldap_keyfile.replace("@@@ADMINSERVER@@@", realmconfig.name.lower());
// Copy files
// FIXME