@ -67,10 +67,6 @@
# define SASL_CONTROL_FILE " / etc / ldap / sasl2 / slapd.conf"
# define HEIMDAL_ACL_FILE " / etc / heimdal-kdc / kadmind.acl"
# define TDE_CERTIFICATE_DIR " / etc / trinity / ldap / tde-ca / "
# define KERBEROS_PKI_ANCHORDIR " / etc / trinity / ldap / tde-ca / anchors / "
# define KERBEROS_PKI_PRIVATEDIR " / etc / trinity / ldap / tde-ca / private / "
# define KERBEROS_PKI_PUBLICDIR " / etc / trinity / ldap / tde-ca / public / "
# define KERBEROS_PKI_PEM_FILE KERBEROS_PKI_ANCHORDIR "tdeca.pem"
# define KERBEROS_PKI_PEMKEY_FILE KERBEROS_PKI_ANCHORDIR "tdeca.key.pem"
# define KERBEROS_PKI_KDC_FILE KERBEROS_PKI_PUBLICDIR "@@@KDCSERVER@@@.pki.crt"
@ -266,7 +262,7 @@ void LDAPController::save() {
load ( ) ;
}
void replacePlaceholdersInFile ( TQString infile , TQString outfile , LDAPRealmConfig realmconfig , TQString adminUserName , TQString adminGroupName , TQString machineAdminGroupName , const char * adminPassword , TQString rootUserName , const char * rootPassword , int ldifSchemaNumber = - 1 , uid_t userid = - 1 , gid_t groupid = - 1 , TQString ldapusername = TQString : : null , TQString ldapgroupname = TQString : : null ) {
void replacePlaceholdersInFile ( TQString infile , TQString outfile , LDAPRealmConfig realmconfig , TQString adminUserName , TQString adminGroupName , TQString machineAdminGroupName , TQString standardUserGroupName , const char * adminPassword , TQString rootUserName , const char * rootPassword , int ldifSchemaNumber = - 1 , uid_t userid = - 1 , gid_t groupid = - 1 , TQString ldapusername = TQString : : null , TQString ldapgroupname = TQString : : null ) {
SHA1 sha ;
sha . process ( rootPassword , strlen ( rootPassword ) ) ;
TQString rootpw_hash = sha . base64Hash ( ) ;
@ -315,6 +311,7 @@ void replacePlaceholdersInFile(TQString infile, TQString outfile, LDAPRealmConfi
line . replace ( " @@@ADMINUSER@@@ " , adminUserName ) ;
line . replace ( " @@@ADMINGROUP@@@ " , adminGroupName ) ;
line . replace ( " @@@LOCALADMINGROUP@@@ " , machineAdminGroupName ) ;
line . replace ( " @@@STANDARDUSERGROUP@@@ " , standardUserGroupName ) ;
line . replace ( " @@@ADMINPW_SHA@@@ " , adminpw_hash ) ;
line . replace ( " @@@PKINIT_REQUIRE_EKU@@@ " , ( realmconfig . pkinit_require_eku ) ? " yes " : " no " ) ;
line . replace ( " @@@PKINIT_REQUIRE_KRBTGT_OTHERNAME@@@ " , ( realmconfig . pkinit_require_krbtgt_otherName ) ? " yes " : " no " ) ;
@ -799,7 +796,7 @@ int LDAPController::createRealmCertificates(LDAPCertConfig certinfo, LDAPRealmCo
return 0 ;
}
int LDAPController : : createNewLDAPRealm ( TQWidget * dialogparent , LDAPRealmConfig realmconfig , TQString adminUserName , TQString adminGroupName , TQString machineAdminGroupName , const char * adminPassword , TQString rootUserName , const char * rootPassword , TQString adminRealm , LDAPCertConfig certinfo , TQString * errstr ) {
int LDAPController : : createNewLDAPRealm ( TQWidget * dialogparent , LDAPRealmConfig realmconfig , TQString adminUserName , TQString adminGroupName , TQString machineAdminGroupName , TQString standardUserGroupName , const char * adminPassword , TQString rootUserName , const char * rootPassword , TQString adminRealm , LDAPCertConfig certinfo , TQString * errstr ) {
int ldifSchemaNumber ;
ProcessingDialog pdialog ( dialogparent ) ;
@ -869,22 +866,22 @@ configTempDir.setAutoDelete(false); // RAJA DEBUG ONLY FIXME
mkdir ( KERBEROS_PKI_PUBLICDIR , S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH ) ;
// Heimdal
replacePlaceholdersInFile ( templateDir + " heimdal/heimdal.defaults " , HEIMDAL_DEFAULT_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " heimdal/kadmind.acl " , HEIMDAL_ACL_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " heimdal/kdc.conf " , destDir + " heimdal-kdc/kdc.conf " , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " heimdal/krb5.conf " , destDir + " krb5.conf " , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " heimdal/heimdal.defaults " , HEIMDAL_DEFAULT_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " heimdal/kadmind.acl " , HEIMDAL_ACL_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " heimdal/kdc.conf " , destDir + " heimdal-kdc/kdc.conf " , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " heimdal/krb5.conf " , destDir + " krb5.conf " , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword ) ;
// OpenLDAP
replacePlaceholdersInFile ( templateDir + " openldap/skel.ldif " , configTempDir . name ( ) + " skel.ldif " , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword ) ;
// replacePlaceholdersInFile(templateDir + "openldap/ldap/slapd.conf", destDir + "ldap/slapd.conf", realmconfig, adminUserName, adminGroupName, machineAdminGroupName, adminPassword, rootUserName, rootPassword);
replacePlaceholdersInFile ( templateDir + " openldap/ldap/slapd.defaults " , LDAP_DEFAULT_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , - 1 , - 1 , - 1 , m_ldapUserName , m_ldapGroupName ) ;
replacePlaceholdersInFile ( templateDir + " openldap/skel.ldif " , configTempDir . name ( ) + " skel.ldif " , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword ) ;
// replacePlaceholdersInFile(templateDir + "openldap/ldap/slapd.conf", destDir + "ldap/slapd.conf", realmconfig, adminUserName, adminGroupName, machineAdminGroupName, standardUserGroupName, adminPassword, rootUserName, rootPassword);
replacePlaceholdersInFile ( templateDir + " openldap/ldap/slapd.defaults " , LDAP_DEFAULT_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , - 1 , - 1 , - 1 , m_ldapUserName , m_ldapGroupName ) ;
// SASL
replacePlaceholdersInFile ( templateDir + " sasl/saslauthd.defaults " , SASL_DEFAULT_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " sasl/slapd.conf " , SASL_CONTROL_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " sasl/saslauthd.defaults " , SASL_DEFAULT_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " sasl/slapd.conf " , SASL_CONTROL_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword ) ;
// OpenSSL
replacePlaceholdersInFile ( templateDir + " openssl/pki_extensions " , OPENSSL_EXTENSIONS_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword ) ;
replacePlaceholdersInFile ( templateDir + " openssl/pki_extensions " , OPENSSL_EXTENSIONS_FILE , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword ) ;
// FIXME
// This assumes Debian!
@ -914,35 +911,35 @@ configTempDir.setAutoDelete(false); // RAJA DEBUG ONLY FIXME
// Can we do anything about this now?
// Base database configuration
replacePlaceholdersInFile ( templateDir + " openldap/ldif/config.ldif " , destDir + " ldap/slapd.d/ " + TQString ( " cn=config.ldif " ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , - 1 , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/schema.ldif " , destDir + " ldap/slapd.d/cn=config/ " + TQString ( " cn=schema.ldif " ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , - 1 , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/config.ldif " , destDir + " ldap/slapd.d/ " + TQString ( " cn=config.ldif " ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , - 1 , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/schema.ldif " , destDir + " ldap/slapd.d/cn=config/ " + TQString ( " cn=schema.ldif " ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , - 1 , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 0 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/olcConfig.ldif " , destDir + " ldap/slapd.d/cn=config/ " + TQString ( " olcDatabase={%1}config.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/moduleConfig.ldif " , destDir + " ldap/slapd.d/cn=config/ " + TQString ( " cn=module{%1}.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/olcConfig.ldif " , destDir + " ldap/slapd.d/cn=config/ " + TQString ( " olcDatabase={%1}config.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/moduleConfig.ldif " , destDir + " ldap/slapd.d/cn=config/ " + TQString ( " cn=module{%1}.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 1 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/olcDatabase.ldif " , destDir + " ldap/slapd.d/cn=config/ " + TQString ( " olcDatabase={%1}hdb.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/olcDatabase.ldif " , destDir + " ldap/slapd.d/cn=config/ " + TQString ( " olcDatabase={%1}hdb.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
// Schema files
ldifSchemaNumber = 0 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/core.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}core.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/core.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}core.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 1 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/cosine.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}cosine.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/cosine.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}cosine.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 2 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/inetorgperson.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}inetorgperson.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/inetorgperson.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}inetorgperson.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 3 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/rfc2307bis.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}rfc2307bis.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/rfc2307bis.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}rfc2307bis.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 4 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/rfc2739.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}rfc2739.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/rfc2739.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}rfc2739.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 5 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/ppolicy.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}ppolicy.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/ppolicy.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}ppolicy.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 6 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/ems-core.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}ems-core.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/ems-core.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}ems-core.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 7 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/hdb.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}hdb.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/hdb.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}hdb.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
ldifSchemaNumber = 8 ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/tde-core.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}tde-core.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
replacePlaceholdersInFile ( templateDir + " openldap/ldif/tde-core.ldif " , destDir + " ldap/slapd.d/cn=config/cn=schema/ " + TQString ( " cn={%1}tde-core.ldif " ) . arg ( ldifSchemaNumber ) , realmconfig , adminUserName , adminGroupName , machineAdminGroupName , standardUserGroupName, adminPassword, rootUserName , rootPassword , ldifSchemaNumber , slapd_uid , slapd_gid ) ;
// ldifSchemaNumber = 9;
// replacePlaceholdersInFile(templateDir + "openldap/ldif/samba.ldif", destDir + "ldap/slapd.d/cn=config/cn=schema/" + TQString("cn={%1}samba.ldif").arg(ldifSchemaNumber), realmconfig, adminUserName, adminGroupName, machineAdminGroupName, adminPassword, rootUserName, rootPassword, ldifSchemaNumber, slapd_uid, slapd_gid);
// replacePlaceholdersInFile(templateDir + "openldap/ldif/samba.ldif", destDir + "ldap/slapd.d/cn=config/cn=schema/" + TQString("cn={%1}samba.ldif").arg(ldifSchemaNumber), realmconfig, adminUserName, adminGroupName, machineAdminGroupName, standardUserGroupName, adminPassword, rootUserName, rootPassword, ldifSchemaNumber, slapd_uid, slapd_gid);
// Set permissions
chmod ( TQString ( HEIMDAL_DEFAULT_FILE ) . ascii ( ) , S_IRUSR | S_IWUSR | S_IRGRP ) ;
@ -1106,15 +1103,14 @@ configTempDir.setAutoDelete(false); // RAJA DEBUG ONLY FIXME
}
}
delete ldap_mgr ;
delete credentials ;
// Set @@@ADMINUSER@@@ password in kadmin
LDAPCredentials adminuser ;
adminuser . username = adminUserName ;
adminuser . password = adminPassword ;
adminuser . realm = realmconfig . name . upper ( ) ;
if ( setKerberosPasswordForUser ( adminuser , & errorstring ) ! = 0 ) {
delete ldap_mgr ;
delete credentials ;
if ( errstr ) * errstr = i18n ( " Unable to set user password in Kerberos database " ) . append ( errorstring ) ;
pdialog . closeDialog ( ) ;
return - 1 ;
@ -1132,6 +1128,18 @@ configTempDir.setAutoDelete(false); // RAJA DEBUG ONLY FIXME
LDAPManager : : writeLDAPConfFile ( realmconfig ) ;
// Write the sudoers file
if ( ldap_mgr - > writeSudoersConfFile ( & errorstring ) ! = 0 ) {
delete ldap_mgr ;
delete credentials ;
if ( errstr ) * errstr = i18n ( " Unable to set local sudo rights " ) . append ( errorstring ) ;
pdialog . closeDialog ( ) ;
return - 1 ;
}
delete ldap_mgr ;
delete credentials ;
pdialog . setStatusMessage ( i18n ( " (Re)starting servers... " ) ) ;
tqApp - > processEvents ( ) ;
@ -1161,6 +1169,9 @@ configTempDir.setAutoDelete(false); // RAJA DEBUG ONLY FIXME
return - 1 ;
}
// Write the NSS update crontab file and update NSS database
LDAPManager : : writeCronFiles ( ) ;
// RAJA FIXME
pdialog . closeDialog ( ) ;
}