// If password is not specified an empty
// password is used.
- "password": "1234",
- "password-file": "",
- "user-file": ""
+ "password": "1234"
},
// This specifies a hidden client.
// The user id is the content of the
// file /usr/local/share/kea/kea-creds/hiddenu.
"user-file": "hiddenu",
- "user": "",
// The password is the content of the
// file /usr/local/share/kea/kea-creds/hiddenp.
- "password-file": "hiddenp",
- "password": ""
+ "password-file": "hiddenp"
},
// This specifies a hidden client using a
// The secret is the content of the file
// /usr/local/share/kea/kea-creds/hiddens which must be in
// the <user-id>:<password> format.
- "password-file": "hiddens",
- "user-file": "",
- "user": "",
- "password": ""
+ "password-file": "hiddens"
}
]
}
// If password is not specified an empty
// password is used.
- "password": "1234",
- "password-file": "",
- "user-file": ""
+ "password": "1234"
},
// This specifies a hidden client.
// The user id is the content of the
// file /usr/local/share/kea/kea-creds/hiddenu.
"user-file": "hiddenu",
- "user": "",
// The password is the content of the
// file /usr/local/share/kea/kea-creds/hiddenp.
- "password-file": "hiddenp",
- "password": ""
+ "password-file": "hiddenp"
},
// This specifies a hidden client using a
// The secret is the content of the file
// /usr/local/share/kea/kea-creds/hiddens which must be in
// the <user-id>:<password> format.
- "password-file": "hiddens",
- "user-file": "",
- "user": "",
- "password": ""
+ "password-file": "hiddens"
}
]
}
"backends.json",
"classify.json",
"classify2.json",
- //"comments.json",
+ "comments.json",
"config-backend.json",
"dhcpv4-over-dhcpv6.json",
"global-reservations.json",
"ha-load-balancing-server1-mt-with-tls.json",
"ha-load-balancing-server2-mt.json",
"hooks.json",
- //"hooks-radius.json",
+ "hooks-radius.json",
"leases-expiration.json",
"multiple-options.json",
"mysql-reservations.json",
"backends.json",
"classify.json",
"classify2.json",
- //"comments.json",
+ "comments.json",
"config-backend.json",
"dhcpv4-over-dhcpv6.json",
"duid.json",
checkAndGetDivergingLeaf(authentication, node, "type", "auth-type");
checkAndGetLeaf(authentication, node, "realm");
checkAndGetLeaf(authentication, node, "directory");
+ checkAndGetAndJsonifyLeaf(authentication, node, "user-context");
ConstElementPtr clients = getControlSocketAuthenticationClients(node);
if (clients) {
authentication->set("clients", clients);
getMandatoryLeaf(result, data_node, "password");
getMandatoryLeaf(result, data_node, "user-file");
getMandatoryLeaf(result, data_node, "password-file");
+ checkAndGetAndJsonifyLeaf(result, data_node, "user-context");
+
return (result->empty() ? ElementPtr() : result);
}
setMandatoryDivergingLeaf(authentication, xpath +"/authentication" , "type", "auth-type", LeafBaseType::String);
checkAndSetLeaf(authentication, xpath + "/authentication", "realm", LeafBaseType::String);
checkAndSetLeaf(authentication, xpath + "/authentication", "directory", LeafBaseType::String);
+ checkAndSetUserContext(authentication, xpath + "/authentication");
ConstElementPtr clients = authentication->get("clients");
setControlSocketAuthenticationClients(xpath + "/authentication/clients", clients);
}
void
TranslatorControlSocket::setControlSocketAuthenticationClient(string const& xpath,
- ConstElementPtr /* elem */) {
+ ConstElementPtr elem) {
setItem(xpath, ElementPtr(), LeafBaseType::Unknown);
+ checkAndSetUserContext(elem, xpath);
}
void
-160eb58d10c1c29ab40763f69b9d905644ee767badfdceee6bdd730e9a6071f6
+b5f9e40815ea19641d64eefaf4acd429526e5f58c7ac8154fa89cd6c0033722e
type string;
description "HTTP password file.";
}
+ leaf user-context {
+ type user-context;
+ description "Logger user context.";
+ }
key "user password user-file password-file";
}
}
description "HTTP authentication directory.";
}
uses clients;
+ leaf user-context {
+ type user-context;
+ description "Logger user context.";
+ }
}
}