#
af1594c9 |
| 27-Apr-2024 |
Ravi Teja <raviteja28031990@gmail.com> |
Remove systemd meson configuration variables
This commit removes meson configuration variables which are not actually configurable and can be hardcoded.
Change-Id: Id9d198bf6562e108b8a7472e770e6d8b
Remove systemd meson configuration variables
This commit removes meson configuration variables which are not actually configurable and can be hardcoded.
Change-Id: Id9d198bf6562e108b8a7472e770e6d8bb84e2684 Signed-off-by: Ravi Teja <raviteja28031990@gmail.com>
show more ...
|
#
e8d664d1 |
| 05-Jul-2022 |
Jiaqing Zhao <jiaqing.zhao@intel.com> |
ldap-config: Include phosphor-logging in source files
It is recommendded to include the phosphor-logging and related headers in source files instead of header files.
Tested: Build and unit test pas
ldap-config: Include phosphor-logging in source files
It is recommendded to include the phosphor-logging and related headers in source files instead of header files.
Tested: Build and unit test pass.
Change-Id: I880d8a3bf8dd850af300806da0d17357407632fd Signed-off-by: Jiaqing Zhao <jiaqing.zhao@intel.com>
show more ...
|
#
11ec666b |
| 05-Jul-2022 |
Jiaqing Zhao <jiaqing.zhao@intel.com> |
Switch to lg2 for logging
After enabling C++20, lg2 is preferred for logging. This patch replaces all phosphor::logging::log calls to lg2 calls.
Tested: Build pass.
Change-Id: Ic37bc36f43c2b3a1c61
Switch to lg2 for logging
After enabling C++20, lg2 is preferred for logging. This patch replaces all phosphor::logging::log calls to lg2 calls.
Tested: Build pass.
Change-Id: Ic37bc36f43c2b3a1c61b1328af95e3a41c8d6d40 Signed-off-by: Jiaqing Zhao <jiaqing.zhao@intel.com>
show more ...
|
#
78d85042 |
| 29-Aug-2022 |
Nan Zhou <nanzhoumails@gmail.com> |
clang-tidy: enable clang-tidy
Enable the first check: readability-identifier-naming
Also fixed all check failures.
Tested: 1. compiles, no clang-tidy failures 2. the two daemons work correctly on
clang-tidy: enable clang-tidy
Enable the first check: readability-identifier-naming
Also fixed all check failures.
Tested: 1. compiles, no clang-tidy failures 2. the two daemons work correctly on hardware regarding DBus APIs
Signed-off-by: Nan Zhou <nanzhoumails@gmail.com> Change-Id: Ic415e857726e8f521c1d61a3e7f0c85121c0d284
show more ...
|
#
b3ef4e1a |
| 22-Jul-2022 |
Patrick Williams <patrick@stwcx.xyz> |
sdbusplus: use shorter type aliases
The sdbusplus headers provide shortened aliases for many types. Switch to using them to provide better code clarity and shorter lines. Possible replacements are
sdbusplus: use shorter type aliases
The sdbusplus headers provide shortened aliases for many types. Switch to using them to provide better code clarity and shorter lines. Possible replacements are for: * bus_t * exception_t * manager_t * match_t * message_t * object_t * slot_t
Signed-off-by: Patrick Williams <patrick@stwcx.xyz> Change-Id: I19e094a2a99893627dbb82b615f630b87ad90fdd
show more ...
|
#
372c5668 |
| 30-Jun-2021 |
Alexander Filippov <a.filippov@yadro.com> |
LDAP: start or stop nslcd on service starting `nslcd` service should be started only if there is a valid endpoint. This commit adds a call that starts or stops `nslcd.service` after
LDAP: start or stop nslcd on service starting `nslcd` service should be started only if there is a valid endpoint. This commit adds a call that starts or stops `nslcd.service` after the Dbus objects has been deserialized, depending by the presence of enabled endpoint. Tested: 1. Made sure `nslcd` is stopped by default. 2. Added a configuration for AD/LDAP endpoint and made sure `nslcd` is started. 3. Rebooted BMC and made sure `nslcd` is started. Change-Id: I06d91cb450e92bdfb12c4f65dce4e250113ab461 Signed-off-by: Alexander Filippov <a.filippov@yadro.com>
show more ...
|
#
178c3f6d |
| 02-Sep-2021 |
Patrick Williams <patrick@stwcx.xyz> |
exception: switch to public sdbus exception SdBusError was intended to be a private error type inside sdbusplus. Switch all catch locations to use the general sdbusplus::exception type.
exception: switch to public sdbus exception SdBusError was intended to be a private error type inside sdbusplus. Switch all catch locations to use the general sdbusplus::exception type. Signed-off-by: Patrick Williams <patrick@stwcx.xyz> Change-Id: I8af15372ca11b8400044fc24d4880ea9fd00f3da
show more ...
|
#
e6500a49 |
| 01-May-2021 |
Patrick Williams <patrick@stwcx.xyz> |
use new sdbus++ camelcase Change I17a8d7479556596a3cf252b3f4eae9c8df547189 will change how sdbus++ generates names which start with an acronym. Prepare for this by keying off the SDB
use new sdbus++ camelcase Change I17a8d7479556596a3cf252b3f4eae9c8df547189 will change how sdbus++ generates names which start with an acronym. Prepare for this by keying off the SDBUSPP_NEW_CAMELCASE define to use the new format. Changes: lDAP* -> ldap* Signed-off-by: Patrick Williams <patrick@stwcx.xyz> Change-Id: Idc0c2f33974d684d311b329806cac1a6235edc02
show more ...
|
#
9638afb9 |
| 22-Feb-2021 |
Patrick Williams <patrick@stwcx.xyz> |
clang-format-11: reformat The .clang-format file here is an old version of the common one. Upgrade to the latest and reformat. Signed-off-by: Patrick Williams <patrick@stwcx.xyz
clang-format-11: reformat The .clang-format file here is an old version of the common one. Upgrade to the latest and reformat. Signed-off-by: Patrick Williams <patrick@stwcx.xyz> Change-Id: I0d532aa88d650e9c7664e07abfc8c4fdf0dd3df4
show more ...
|
#
ab4fcb4c |
| 29-Apr-2019 |
Ratan Gupta <ratagupt@linux.vnet.ibm.com> |
phosphor-ldap-conf: handle "PropertiesChanged" signal on the ldap cert object When LDAP client certificate is changed through Replace method on the cert object. Object would emit the s
phosphor-ldap-conf: handle "PropertiesChanged" signal on the ldap cert object When LDAP client certificate is changed through Replace method on the cert object. Object would emit the signal "PropertiesChanged". Upon receiving the signal, config file would be updated with below given info if secure ldap is enabled: tls_cert <path client certificate file> tls_key <path to client certificate file> Tested By: Unit Tested Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I5347b13e0bf76742d39dc7a26c96ec5d4dd5a2c6
show more ...
|
#
22f13f18 |
| 29-Apr-2019 |
Ratan Gupta <ratagupt@linux.vnet.ibm.com> |
phosphor-ldap-conf: handle "InterfaceAdded" signal on the ldap cert object When LDAP client certificate is uploaded through install method on the cert object, Object would emit the signa
phosphor-ldap-conf: handle "InterfaceAdded" signal on the ldap cert object When LDAP client certificate is uploaded through install method on the cert object, Object would emit the signal "InterfaceAdded". Upon receiving the signal, Config file would be updated with below given info if secure ldap is enabled: tls_cert <path client certificate file> tls_key <path to client certificate file> Tested By: Unit Tested Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I54b3e116af1b8a9057d91797d4074d39efc65bb0
show more ...
|
#
7b04c352 |
| 12-Apr-2019 |
Ratan Gupta <ratagupt@linux.vnet.ibm.com> |
Create role mapping under ldap config object Each ldap config object should be have its own mapping object. This is to align with the redfish. https://redfish.dmtf.org/schem
Create role mapping under ldap config object Each ldap config object should be have its own mapping object. This is to align with the redfish. https://redfish.dmtf.org/schemas/AccountService.v1_4_0.json As per redfish, Each config will have it's own "RemoteRoleMapping". Mapping object should be persisted and restores when the phosphor-ldap-conf restarts. TestedBy: Unit Tested. Creation of privilege mapping. Persist the priv-mapping. Restores the priv-mapping. Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I5ab4aeffae61f9cc57c1338f94784d0fe5607cd3
show more ...
|
#
c5481d1c |
| 12-Apr-2019 |
Ratan Gupta <ratagupt@linux.vnet.ibm.com> |
Conditional enable the ldap configuration If any of the existing ldap config(openldap/AD) is already enabled,The other ldap configuration can't be enabled. TestedBy: Unit-Te
Conditional enable the ldap configuration If any of the existing ldap config(openldap/AD) is already enabled,The other ldap configuration can't be enabled. TestedBy: Unit-Tested Tested the above behaviour.It throws the error back if try to enable the configuration when there is already active configuration. If there is no active configuration then it allows to enable the configuration. Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I5b6008036152cd36e5422bb372a05c8a3ec3d24b
show more ...
|
#
21e88cb5 |
| 12-Apr-2019 |
Ratan Gupta <ratagupt@linux.vnet.ibm.com> |
Serialize the config objects This commit serializes the config object into cereal path and restores the config object when the phosphor-ldap-conf restarts. TestedBy: Unit te
Serialize the config objects This commit serializes the config object into cereal path and restores the config object when the phosphor-ldap-conf restarts. TestedBy: Unit tested Serialize the object Restart the phosphor-ldap-conf restores the object. Ldap/Local authentication works fine. Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: Ie6e940ddd6851085dc4213677dfb20e3afa0964f
show more ...
|
#
27d4c011 |
| 12-Apr-2019 |
Ratan Gupta <ratagupt@linux.vnet.ibm.com> |
Create the default object for openldap and AD. This commit introduces the following functionalities => Default AD and openldap config object would always be there. => User should not
Create the default object for openldap and AD. This commit introduces the following functionalities => Default AD and openldap config object would always be there. => User should not be able to change the type of the ldap once it is created. This change is to align with redfish sehema (https://redfish.dmtf.org/schemas/AccountService.v1_4_0.json), In the schema AD and LDAP is a property which user can PATCH, Now with the current code which doesn't have the default config so for the PATCH, We were forcing the user to give all the properties and then create the object which is against the PATCH semantics. TestedBy: Unit tested Default Object gets created when service starts. change of ldap type gets the error back. Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I0ce951a13ee525df022fb0716f0aea10d1909781
show more ...
|
#
37fb3fee |
| 13-Apr-2019 |
Ratan Gupta <ratagupt@linux.vnet.ibm.com> |
Change the name of the files to make it align with other filenames TestedBy: Unit-Tested Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I657962e8cb06b083877
Change the name of the files to make it align with other filenames TestedBy: Unit-Tested Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I657962e8cb06b083877321e27cd0c94644e1ebcb
show more ...
|
#
e1f4db62 |
| 11-Apr-2019 |
Ratan Gupta <ratagupt@linux.vnet.ibm.com> |
Create separate file for ConfigMgr class As the ldap_configuration.cpp was getting long so it is good to create the seprate file for ConfigMgr. TestedBy: Ran th
Create separate file for ConfigMgr class As the ldap_configuration.cpp was getting long so it is good to create the seprate file for ConfigMgr. TestedBy: Ran the unit test. Signed-off-by: Ratan Gupta <ratagupt@linux.vnet.ibm.com> Change-Id: I312a9f423d4ab3ca4ebd5f17193f7b02162ded6b
show more ...
|