Send Netdot-devel mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
https://osl.uoregon.edu/mailman/listinfo/netdot-devel
or, via email, send a message with subject or body 'help' to
[email protected]
You can reach the person managing the list at
[email protected]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Netdot-devel digest..."
Today's Topics:
1. [Netdot - Bug #1683] (Resolved) Subnets not created on
initial device discovery from web UI ([email protected])
2. Re: keywords search case sensitivity (Karl Putland)
3. [Netdot - Bug #1673] (Resolved) Problem with permissions on
more specific Ipblocks ([email protected])
4. [SCM] UNNAMED PROJECT branch netdot-1.0 updated.
netdot-1.0.1-20-gf8f5d8d ([email protected])
----------------------------------------------------------------------
Message: 1
Date: Thu, 30 Aug 2012 08:07:50 -0700
From: [email protected]
Subject: [Netdot-devel] [Netdot - Bug #1683] (Resolved) Subnets not
created on initial device discovery from web UI
To: [email protected]
Message-ID: <[email protected]>
Content-Type: text/plain; charset=utf-8
Issue #1683 has been updated by Carlos Vicente.
Status changed from New to Resolved
----------------------------------------
Bug #1683: Subnets not created on initial device discovery from web UI
https://osl.uoregon.edu/redmine/issues/1683#change-2955
Author: Carlos Vicente
Status: Resolved
Priority: High
Assignee: Carlos Vicente
Category: DeviceManagement
Target version: 1.0.2
Resolution: fixed
--
You have received this notification because you have either subscribed to it,
or are involved in it.
To change your notification preferences, please click here:
http://osl.uoregon.edu/redmine/my/account
------------------------------
Message: 2
Date: Thu, 30 Aug 2012 09:15:19 -0600
From: Karl Putland <[email protected]>
Subject: Re: [Netdot-devel] keywords search case sensitivity
To: Carlos Vicente <[email protected]>
Cc: [email protected]
Message-ID:
<CA+EXWsyREtK=6y_odktew_mjq4jc3fdz7n0dzfdzvwonqgg...@mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
Thanks!
--Karl
One number: 303.242.8608
Sent from a mobile device
On Aug 30, 2012 9:07 AM, "Carlos Vicente" <[email protected]> wrote:
> Thanks,
>
> I have applied the patch, but only for Pg, as MySQL's default collation
> is case insensitive.
>
> cv
>
> On 8/29/12 3:48 PM, Karl Putland wrote:
> > Make search_like case insensitive.
> > This improves usability for me and my users.
> >
> >
> > diff -u Netdot.orig/Model.pm Netdot/Model.pm
> > --- Netdot.orig/Model.pm2012-08-29 19:31:39.323838352 +0000
> > +++ Netdot/Model.pm2012-08-29 19:45:08.559831642 +0000
> > @@ -531,10 +531,10 @@
> > } else {
> > # Fix lack of typecast introduced in Pg 8.x
> > if (Netdot->config->get('DB_TYPE') eq "Pg") {
> > - push @qual, "CAST($column AS text) LIKE ?";
> > + push @qual, "UPPER(CAST($column AS text)) LIKE
> > UPPER(?)";
> > push @bind, $value;
> > } else {
> > - push @qual, "$column LIKE ?";
> > + push @qual, "UPPER($column) LIKE UPPER(?)";
> > push @bind, $value;
> > }
> > }
> >
> > --Karl
> >
> > Karl Putland
> > Senior VoIP Engineer
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
http://osl.uoregon.edu/pipermail/netdot-devel/attachments/20120830/ef4a1a84/attachment-0001.html
------------------------------
Message: 3
Date: Thu, 30 Aug 2012 08:38:18 -0700
From: [email protected]
Subject: [Netdot-devel] [Netdot - Bug #1673] (Resolved) Problem with
permissions on more specific Ipblocks
To: [email protected]
Message-ID: <[email protected]>
Content-Type: text/plain; charset=utf-8
Issue #1673 has been updated by Carlos Vicente.
Status changed from New to Resolved
Assignee set to Carlos Vicente
Resolution set to fixed
----------------------------------------
Bug #1673: Problem with permissions on more specific Ipblocks
https://osl.uoregon.edu/redmine/issues/1673#change-2956
Author: Carlos Vicente
Status: Resolved
Priority: High
Assignee: Carlos Vicente
Category: IPManagement
Target version: 1.0.2
Resolution: fixed
A user gets assigned permissions to edit 192.168.0.0/16, but also to
'choose_ip' on 192.168.64.0/24. In this case, Netdot fails to traverse the
hierarchy upward to detect that it can edit the more specific block.
--
You have received this notification because you have either subscribed to it,
or are involved in it.
To change your notification preferences, please click here:
http://osl.uoregon.edu/redmine/my/account
------------------------------
Message: 4
Date: Thu, 30 Aug 2012 08:45:56 -0700
From: [email protected]
Subject: [Netdot-devel] [SCM] UNNAMED PROJECT branch netdot-1.0
updated. netdot-1.0.1-20-gf8f5d8d
To: [email protected]
Message-ID: <[email protected]>
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "UNNAMED PROJECT".
The branch, netdot-1.0 has been updated
via f8f5d8d11c616d63da1dc839f74f444ca658be54 (commit)
via bfeb8535177008a142598d3da064667f0ab0f89f (commit)
via 2df37c82f01c656b2d917d32b517f8d93eea5a33 (commit)
via ee07498c519404257ad874334ec2dece69daf4e4 (commit)
from 599ddac8f21a44b33e8e042a6c513a658f16b26d (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit f8f5d8d11c616d63da1dc839f74f444ca658be54
Author: Carlos Vicente <[email protected]>
Date: Thu Aug 30 11:46:01 2012 -0400
Existing but available addresses not offered to regular user in manual
select option
diff --git a/htdocs/management/subnet.mhtml b/htdocs/management/subnet.mhtml
index 9806ed1..b4782a7 100644
--- a/htdocs/management/subnet.mhtml
+++ b/htdocs/management/subnet.mhtml
@@ -29,7 +29,7 @@ my $make_cell = sub {
my $str = $disp_addr;
if ( $caller eq 'choose_ip.html' ){
# Called as a popup window
- unless ( $used ){
+ if (!$used || ($used && $divclass eq 'ipaddr_available') ){
if ( ($priv_user && $can_edit) || $can_choose ){
$str = sprintf('<a href="#"
onClick="selectAddr(\'%s\')">%s</a>',
$addr, $disp_addr);
commit bfeb8535177008a142598d3da064667f0ab0f89f
Author: Carlos Vicente <[email protected]>
Date: Thu Aug 30 11:38:22 2012 -0400
Fix for #1673 (Problem with permissions on more specific Ipblocks)
diff --git a/lib/Netdot/ObjectAccessRule.pm b/lib/Netdot/ObjectAccessRule.pm
index b180b5e..634f4f9 100644
--- a/lib/Netdot/ObjectAccessRule.pm
+++ b/lib/Netdot/ObjectAccessRule.pm
@@ -60,6 +60,9 @@ sub denies(){
"denied to $username ($user_type)");
return 1;
}
+ if ( $otype eq 'Ipblock' ){
+ return &_deny_ip_access($action, $access, $object);
+ }
}
return &_deny_action_access($action, $access->{$otype}->{$oid});
@@ -276,20 +279,26 @@ sub _deny_ip_access {
return 1;
}
}
+
# Deny unless there's an ancestor which is permitted. This includes
# subnets, containers, etc.
my $deny = 1;
+
+ # Start with the given object
+ $deny = &_deny_action_access($action,
$access->{'Ipblock'}->{$ipblock->id});
+ return $deny if $deny == 0;
+
+ # Then check its ancestors recursively
foreach my $ancestor ( $ipblock->get_ancestors ){
if ( exists $access->{'Ipblock'}->{$ancestor->id} ){
$deny = &_deny_action_access($action,
$access->{'Ipblock'}->{$ancestor->id});
- last if $deny == 0;
+ return $deny if $deny == 0;
}
}
- return $deny;
$logger->debug("ObjectAccessRule::_deny_ip_access: ".$ipblock->get_label
." not within allowed block. Denying access.");
- return 1;
+ return $deny;
}
commit 2df37c82f01c656b2d917d32b517f8d93eea5a33
Author: Carlos Vicente <[email protected]>
Date: Thu Aug 30 09:35:07 2012 -0400
Support case insensitive searches when using Pg
diff --git a/lib/Netdot/Model.pm b/lib/Netdot/Model.pm
index 930f7dc..ee74cd5 100644
--- a/lib/Netdot/Model.pm
+++ b/lib/Netdot/Model.pm
@@ -531,7 +531,7 @@ sub search_like {
} else {
# Fix lack of typecast introduced in Pg 8.x
if (Netdot->config->get('DB_TYPE') eq "Pg") {
- push @qual, "CAST($column AS text) LIKE ?";
+ push @qual, "UPPER(CAST($column AS text)) LIKE UPPER(?)";
push @bind, $value;
} else {
push @qual, "$column LIKE ?";
commit ee07498c519404257ad874334ec2dece69daf4e4
Author: Carlos Vicente <[email protected]>
Date: Thu Aug 30 09:34:39 2012 -0400
Updated manual to include PTR in list of supported DNS records
diff --git a/doc/manual/netdot-manual-es.txt b/doc/manual/netdot-manual-es.txt
index d364dd7..3fbe07b 100644
--- a/doc/manual/netdot-manual-es.txt
+++ b/doc/manual/netdot-manual-es.txt
@@ -831,7 +831,7 @@ ejecutar chequeos de sintaxis y cargarlos en los servidores
DNS
apropiados.
Netdot soporta los siguientes registros DNS: A, AAAA, CNAME, DS, HINFO,
-LOC, MX, NAPTR, SRV, y TXT.
+LOC, MX, NAPTR, PTR, SRV, y TXT.
Se pueden importar los ficheros de zona existentes hacia Netdot con la
ayuda de la herramienta `import_bind_zones.pl` que está en la carpeta
diff --git a/doc/manual/netdot-manual.txt b/doc/manual/netdot-manual.txt
index 07536e0..5ea254f 100644
--- a/doc/manual/netdot-manual.txt
+++ b/doc/manual/netdot-manual.txt
@@ -794,7 +794,7 @@ then be used by system configuration engines like Puppet or
CfEngine to
run syntax checks and load them into the appropriate name servers.
Netdot supports the following DNS records: A, AAAA, CNAME, DS, HINFO,
-LOC, MX, NAPTR, SRV, and TXT.
+LOC, MX, NAPTR, PTR, SRV, and TXT.
You can import your existing BIND zones into netdot with the help of the
tool `import_bind_zones.pl` from the import subdirectory
-----------------------------------------------------------------------
Summary of changes:
doc/manual/netdot-manual-es.txt | 2 +-
doc/manual/netdot-manual.txt | 2 +-
htdocs/management/subnet.mhtml | 2 +-
lib/Netdot/Model.pm | 2 +-
lib/Netdot/ObjectAccessRule.pm | 15 ++++++++++++---
5 files changed, 16 insertions(+), 7 deletions(-)
hooks/post-receive
--
UNNAMED PROJECT
------------------------------
_______________________________________________
Netdot-devel mailing list
[email protected]
https://osl.uoregon.edu/mailman/listinfo/netdot-devel
End of Netdot-devel Digest, Vol 65, Issue 24
********************************************