-
Notifications
You must be signed in to change notification settings - Fork 139
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add TPS Auditor role #376
Add TPS Auditor role #376
Conversation
1bdfc53
to
67103d5
Compare
Also, does this change need to go in a different ldif file for upgrades? |
base/tps/shared/conf/CS.cfg
Outdated
@@ -278,7 +278,6 @@ multiroles._001=## multiroles | |||
multiroles._002=## | |||
multiroles.enable=true | |||
multiroles.false.groupEnforceList=Administrators,Auditors,Trusted Managers,Certificate Manager Agents,Registration Manager Agents,Data Recovery Manager Agents,Online Certificate Status Manager Agents,Token Key Service Manager Agents,Enterprise CA Administrators,Enterprise KRA Administrators,Enterprise OCSP Administrators,Enterprise RA Administrators,Enterprise TKS Administrators,Enterprise TPS Administrators,Security Domain Administrators,Subsystem Group,ClonedSubsystems | |||
multiroles.false.groupEnforceList=Administrators,Auditors,Trusted Managers,Certificate Manager Agents,Registration Manager Agents,Data Recovery Manager Agents,Online Certificate Status Manager Agents,Token Key Service Manager Agents,Enterprise CA Administrators,Enterprise KRA Adminstrators,Enterprise OCSP Administrators,Enterprise RA Administrators,Enterprise TKS Administrators,Enterprise TPS Administrators,Security Domain Administrators,Subsystem Group |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FWIW, this line lacks a group the previous line has, and also misspells Enterprise KRA Adminstrators
(note the missing i
after Admin
).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We probably need to check which line is actually used by TPS. We can use the Python upgrade framework to fix configuration files, but not database.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@cipherboy Basically we need to consider 2 scenarios:
- new installations
- upgrading existing instances
If you're adding it to db.ldif, it will take care new installations, but for upgrades you probably need to write something else (e.g. a standalone program). If you do write a standalone program, you might as well use that to handle new installations, but that's up to you.
We don't really have a framework for database upgrade, so you might need to write the code from scratch. Don't use the current Python upgrade framework since it runs during dnf upgrade, and the existing DS may not be running at the time.
For PKI 10.5 I don't think you need to wait for #378 since it's only handling new installations too, but feel free to collaborate with @jmagne for the upgrade case. For PKI 10.9 let's wait for #377 since this probably will become a prototype for a future database upgrade framework.
@ladycfu Other than adding the TPS Auditors LDAP entry, is there anything else that we need to add? I'm not sure how the TPS Auditors will be used.
23d09b7
to
96f56a5
Compare
Blocked on #377 for start of LDAP upgrade framework |
Signed-off-by: Alexander Scheel <[email protected]>
96f56a5
to
0308eda
Compare
No description provided.