From 62a8d5e8c27d160a02b0c1ad5a86a9a6a86d4c61 Mon Sep 17 00:00:00 2001 From: Timothy Pearson Date: Thu, 3 Sep 2015 06:32:03 +0000 Subject: Store CRL expiry in LDAP --- src/ldapcontroller.cpp | 26 ++++++++++++++++---------- 1 file changed, 16 insertions(+), 10 deletions(-) (limited to 'src/ldapcontroller.cpp') diff --git a/src/ldapcontroller.cpp b/src/ldapcontroller.cpp index ceb4c52..9575f0b 100644 --- a/src/ldapcontroller.cpp +++ b/src/ldapcontroller.cpp @@ -147,7 +147,7 @@ LDAPController::LDAPController(TQWidget *parent, const char *name, const TQStrin connect(m_base->multiMasterReplicationMappings, TQT_SIGNAL(executed(TQListViewItem*)), this, TQT_SLOT(modifySelectedMultiMasterReplication())); connect(m_base->advancedCaCertExpiry, TQT_SIGNAL(valueChanged(int)), this, TQT_SLOT(caCertExpiryChanged())); - connect(m_base->advancedCaCrlExpiry, TQT_SIGNAL(valueChanged(int)), this, TQT_SLOT(caCrlCertExpiryChanged())); + connect(m_base->advancedCaCrlExpiry, TQT_SIGNAL(valueChanged(int)), this, TQT_SLOT(caCrlExpiryChanged())); connect(m_base->advancedKerberosCertExpiry, TQT_SIGNAL(valueChanged(int)), this, TQT_SLOT(kerberosCertExpiryChanged())); connect(m_base->advancedLdapCertExpiry, TQT_SIGNAL(valueChanged(int)), this, TQT_SLOT(ldapCertExpiryChanged())); @@ -767,7 +767,7 @@ void LDAPController::btncrlRegenerate() { credentials->realm = realmname; LDAPManager* ldap_mgr = new LDAPManager(realmname, "ldapi://", credentials); - if (ldap_mgr->generatePKICRL(m_certconfig.caCrlExpiryDays, m_realmconfig[m_defaultRealm], KERBEROS_PKI_PEMKEY_FILE, KERBEROS_PKI_CRLDB_FILE, &errstr) != 0) { + if (ldap_mgr->generatePKICRL(m_certconfig.caCrlExpiryDays, m_realmconfig[m_defaultRealm], KERBEROS_PKI_CRL_FILE, KERBEROS_PKI_PEMKEY_FILE, KERBEROS_PKI_CRLDB_FILE, &errstr) != 0) { KMessageBox::error(this, i18n("Unable to regenerate CRL

Details: %1").arg(errstr), i18n("Unable to Regenerate CRL")); } @@ -1039,17 +1039,21 @@ void LDAPController::save() { m_systemconfig->sync(); + TQString errorstring; + TQString realmname = m_defaultRealm.upper(); + LDAPCredentials* credentials = new LDAPCredentials; + credentials->username = ""; + credentials->password = ""; + credentials->realm = realmname; + LDAPManager* ldap_mgr = new LDAPManager(realmname, "ldapi://", credentials); + + if (ldap_mgr->setLdapCertificateStoreAttribute("publicRootCRLIntervalDays", TQString("%1").arg(m_certconfig.caCrlExpiryDays), &errorstring) != 0) { + KMessageBox::error(this, i18n("Unable to update CRL interval entry in LDAP database

Details: %1").arg(errorstring), i18n("LDAP Update Failure")); + } + // If role was not changed, update any role-specific advanced settings if (prevRole == m_systemconfig->readEntry("LDAPRole", "Workstation")) { if (m_base->systemRole->currentItem() == ROLE_PRIMARY_REALM_CONTROLLER) { - TQString realmname = m_defaultRealm.upper(); - LDAPCredentials* credentials = new LDAPCredentials; - credentials->username = ""; - credentials->password = ""; - credentials->realm = realmname; - LDAPManager* ldap_mgr = new LDAPManager(realmname, "ldapi://", credentials); - TQString errorstring; - // Write multi-master replication settings LDAPMasterReplicationInfo replicationSettings; replicationSettings.enabled = m_base->advancedEnableMultiMasterReplication->isChecked(); @@ -1079,6 +1083,8 @@ void LDAPController::save() { } } + delete ldap_mgr; + load(); } -- cgit v1.2.3