]> source.dussan.org Git - archiva.git/commitdiff
add ldap bind authenticator enabled as a archiva config
authorOlivier Lamy <olamy@apache.org>
Wed, 13 Feb 2013 10:31:28 +0000 (10:31 +0000)
committerOlivier Lamy <olamy@apache.org>
Wed, 13 Feb 2013 10:31:28 +0000 (10:31 +0000)
git-svn-id: https://svn.apache.org/repos/asf/archiva/trunk@1445544 13f79535-47bb-0310-9956-ffa450edef68

archiva-modules/archiva-base/archiva-repository-admin/archiva-repository-admin-default/src/main/java/org/apache/archiva/admin/repository/runtime/DefaultRedbackRuntimeConfigurationAdmin.java
archiva-modules/archiva-web/archiva-webapp/src/main/webapp/js/archiva/general-admin.js

index 98858c1b39d48c7c555a4a5196c6512585c2b640..538bf98760a677a2e6980477db1d56f7492b2016 100644 (file)
@@ -138,6 +138,9 @@ public class DefaultRedbackRuntimeConfigurationAdmin
                 ldapConfiguration.setUseRoleNameAsGroup(
                     userConfiguration.getBoolean( UserConfigurationKeys.LDAP_GROUPS_USE_ROLENAME, false ) );
 
+                ldapConfiguration.setBindAuthenticatorEnabled(
+                    userConfiguration.getBoolean( UserConfigurationKeys.LDAP_BIND_AUTHENTICATOR_ENABLED, false ) );
+
                 redbackRuntimeConfiguration.setMigratedFromRedbackConfiguration( true );
 
                 updateRedbackRuntimeConfiguration( redbackRuntimeConfiguration );
@@ -460,6 +463,11 @@ public class DefaultRedbackRuntimeConfigurationAdmin
             return conf.getLdapConfiguration().isUseRoleNameAsGroup();
         }
 
+        if ( UserConfigurationKeys.LDAP_BIND_AUTHENTICATOR_ENABLED.equals( key ) )
+        {
+            return conf.getLdapConfiguration().isBindAuthenticatorEnabled();
+        }
+
         if ( conf.getConfigurationProperties().containsKey( key ) )
         {
             return Boolean.valueOf( conf.getConfigurationProperties().get( key ) );
@@ -498,6 +506,11 @@ public class DefaultRedbackRuntimeConfigurationAdmin
             return getRedbackRuntimeConfiguration().getLdapConfiguration().isUseRoleNameAsGroup();
         }
 
+        if ( UserConfigurationKeys.LDAP_BIND_AUTHENTICATOR_ENABLED.equals( key ) )
+        {
+            return getRedbackRuntimeConfiguration().getLdapConfiguration().isBindAuthenticatorEnabled();
+        }
+
         RedbackRuntimeConfiguration conf = getRedbackRuntimeConfiguration();
 
         if ( conf.getConfigurationProperties().containsKey( key ) )
index 3169849956d0479c0110064680391613362c6a6a..efb9531fae5816a492cd2d1c15a6514e2394c5c7 100644 (file)
@@ -1290,7 +1290,7 @@ define("archiva.general-admin",["jquery","i18n","utils","jquery.tmpl","knockout"
   }
 
   LdapConfiguration=function(hostName,port,ssl,baseDn,baseGroupsDn,contextFactory,bindDn,password,authenticationMethod,
-                             extraPropertiesEntries,writable,useRoleNameAsGroup){
+                             extraPropertiesEntries,writable,useRoleNameAsGroup,bindAuthenticatorEnabled){
 
     var self=this;
     this.modified=ko.observable(false);
@@ -1342,6 +1342,8 @@ define("archiva.general-admin",["jquery","i18n","utils","jquery.tmpl","knockout"
     this.useRoleNameAsGroup=ko.observable(useRoleNameAsGroup);
     this.useRoleNameAsGroup.subscribe(function(newValue){self.modified(true)});
 
+    //bindAuthenticatorEnabled
+
   }
 
   mapLdapConfiguration=function(data){
@@ -1355,7 +1357,7 @@ define("archiva.general-admin",["jquery","i18n","utils","jquery.tmpl","knockout"
         }
         $.log("mapLdapConfiguration done");
         return new LdapConfiguration(data.hostName,data.port,data.ssl,data.baseDn,data.baseGroupsDn,data.contextFactory,data.bindDn,data.password,
-                                    data.authenticationMethod,extraPropertiesEntries,data.writable,data.useRoleNameAsGroup);
+                                    data.authenticationMethod,extraPropertiesEntries,data.writable,data.useRoleNameAsGroup,data.bindAuthenticatorEnabled);
       }
       return null;
   }