From 52620d3edd5d5a700c15027ac81b9c39728910ff Mon Sep 17 00:00:00 2001 From: jbjohnso Date: Thu, 28 Mar 2013 18:53:50 +0000 Subject: [PATCH] Add entry to allow per-node authentication domain configuration git-svn-id: https://svn.code.sf.net/p/xcat/code/xcat-core/trunk@15710 8638fb3e-16cb-4fca-ae20-7b5d299a9bcd --- perl-xCAT/xCAT/Schema.pm | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/perl-xCAT/xCAT/Schema.pm b/perl-xCAT/xCAT/Schema.pm index db9126d65..15cc1bbb0 100644 --- a/perl-xCAT/xCAT/Schema.pm +++ b/perl-xCAT/xCAT/Schema.pm @@ -61,7 +61,7 @@ statelite => { #seriously evaluate wider support of multi-domain environments, will leave them #commented rather than tempt people to try with an expectation that it could work. domain => { - cols => [qw(node ou authdomain adminuser adminpassword comments disable)], + cols => [qw(node ou authdomain adminuser adminpassword type comments disable)], keys => ['node'], table_desc => 'Mapping of nodes to domain attributes', descriptions => { @@ -72,6 +72,7 @@ domain => { authdomain => 'If a node should participate in an AD domain or Kerberos realm distinct from domain indicated in site, this field can be used to specify that', adminuser => 'Allow a node specific indication of Administrative user. Most will want to just use passwd table to indicate this once rather than by node.', adminpassword => 'Allow a node specific indication of Administrative user password for the domain. Most will want to ignore this in favor of passwd table.', + type => 'Type, if any, of authentication domain to manipulate. The only recognized value at the moment is activedirectory.', comments => 'Any user-written notes.', disable => "Set to 'yes' or '1' to comment out this row.", }, @@ -2124,6 +2125,10 @@ my @nodeattrs = ( tabentry => 'domain.authdomain', access_tabentry => 'domain.node=attr:node', }, + {attr_name => 'domaintype', + tabentry => 'domain.type', + access_tabentry => 'domain.node=attr:node', + }, ###################### # storage table # ######################