cloudstack/ui/scripts/accountsWizard.js
dahn 5ff932eb86
Ldap fixes (#3694)
* pass domainid for list users

* passing arg in wizzard

* adding userfilter to list ldap users and usersource to response

  port of list ldap users tests to java

* assertion of differnt junit ldap methods

* broken test for directory server (and others)

* embedded context loading

* add user and query test

* UI: filter options passing filter and domain and onchange trigger

* disable tests that only work in ide

prereqs for domain-linkage fixed

move trigger to the right location in code

trigger for changing domain

* logging, comments and refactor

implement search users per domain

retrieve appropriate list of users to filter

get domain specific ldap provider

* query cloudstack users with now db filter

* recreate ldap linked account should succeed

* disable auto import users that don't exist

* ui choice and text

* import filter and potential remove from list bug fixed

* fix rights for domain admins

* list only member of linked groups not of principle group

* Do not show ldap user filter if not importing from ldap
  do not delete un-needed items from dialog permanently
  delete from temp object not from global one

* localdomain should not filterout users not imported from ldap

* several types of authentication handling errors fixed and unit tested

* conflict in output name

* add conflict source field to generic import dialog

* replace reflextion by enum member call

* conflict is now called conflict 🎉
2020-01-20 16:02:33 +01:00

342 lines
12 KiB
JavaScript

// Licensed to the Apache Software Foundation (ASF) under one
// or more contributor license agreements. See the NOTICE file
// distributed with this work for additional information
// regarding copyright ownership. The ASF licenses this file
// to you under the Apache License, Version 2.0 (the
// "License"); you may not use this file except in compliance
// with the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
(function(cloudStack, $) {
var rootDomainId;
cloudStack.accountsWizard = {
informationWithinLdap: {
username: {
label: 'label.username',
validation: {
required: true
},
docID: 'helpAccountUsername'
},
password: {
label: 'label.password',
validation: {
required: true
},
isPassword: true,
id: 'password',
docID: 'helpAccountPassword'
},
'password-confirm': {
label: 'label.confirm.password',
validation: {
required: true,
equalTo: '#password'
},
isPassword: true,
docID: 'helpAccountConfirmPassword'
},
email: {
label: 'label.email',
validation: {
required: true,
email: true
},
docID: 'helpAccountEmail'
},
firstname: {
label: 'label.first.name',
validation: {
required: true
},
docID: 'helpAccountFirstName'
},
lastname: {
label: 'label.last.name',
validation: {
required: true
},
docID: 'helpAccountLastName'
},
conflictingusersource: {
label: 'label.user.conflict',
validation: {
required: true
},
docID: 'helpConflictSource'
}
},
informationNotInLdap: {
filter: {
label: 'label.filterBy',
docID: 'helpLdapUserFilter',
select: function(args) {
var items = [];
items.push({
id: "NoFilter",
description: "No filter"
});
items.push({
id: "LocalDomain",
description: "Local domain"
});
items.push({
id: "AnyDomain",
description: "Any domain"
});
items.push({
id: "PotentialImport",
description: "Potential import"
});
args.response.success({
data: items
});
}
},
domainid: {
label: 'label.domain',
docID: 'helpAccountDomain',
validation: {
required: true
},
select: function(args) {
$.ajax({
url: createURL("listDomains"),
success: function(json) {
var items = [];
domainObjs = json.listdomainsresponse.domain;
$(domainObjs).each(function() {
items.push({
id: this.id,
description: this.path
});
if (this.level === 0)
rootDomainId = this.id;
});
items.sort(function(a, b) {
return a.description.localeCompare(b.description);
});
args.response.success({
data: items
});
}
});
}
},
account: {
label: 'label.account',
docID: 'helpAccountAccount',
validation: {
required: false
}
},
roleid: {
label: 'label.role',
docID: 'helpAccountType',
validation: {
required: true
},
select: function(args) {
$.ajax({
url: createURL("listRoles"),
success: function(json) {
var items = [];
roleObjs = json.listrolesresponse.role;
$(roleObjs).each(function() {
items.push({
id: this.id,
description: this.name + ' (' + this.type + ')'
});
});
args.response.success({
data: items
});
}
});
}
},
timezone: {
label: 'label.timezone',
docID: 'helpAccountTimezone',
select: function(args) {
var items = [];
items.push({
id: "",
description: ""
});
for (var p in timezoneMap)
items.push({
id: p,
description: timezoneMap[p]
});
args.response.success({
data: items
});
}
},
networkdomain: {
label: 'label.network.domain',
docID: 'helpAccountNetworkDomain',
validation: {
required: false
}
},
ldapGroupName: {
label: 'label.ldap.group.name',
docID: 'helpLdapGroupName',
validation: {
required: false
}
},
samlEnable: {
label: 'label.saml.enable',
docID: 'helpSamlEnable',
isBoolean: true,
validation: {
required: false
}
},
samlEntity: {
label: 'label.saml.entity',
docID: 'helpSamlEntity',
validation: {
required: false
},
select: function(args) {
var items = [];
$(g_idpList).each(function() {
items.push({
id: this.id,
description: this.orgName
});
});
args.response.success({
data: items
});
}
}
},
action: function(args) {
var array1 = [];
var ldapStatus = args.isLdap;
if (args.username) {
array1.push("&username=" + args.username);
}
if (!ldapStatus) {
array1.push("&email=" + args.data.email);
array1.push("&firstname=" + args.data.firstname);
array1.push("&lastname=" + args.data.lastname);
cloudStack.addPasswordToCommandUrlParameterArray(array1, args.data.password);
}
array1.push("&domainid=" + args.data.domainid);
var account = args.data.account;
if (account !== null && account.length > 0) {
array1.push("&account=" + account);
}
if (args.data.roleid) {
array1.push("&roleid=" + args.data.roleid);
}
if (args.data.timezone !== null && args.data.timezone.length > 0) {
array1.push("&timezone=" + args.data.timezone);
}
if (args.data.networkdomain !== null && args.data.networkdomain.length > 0) {
array1.push("&networkdomain=" + args.data.networkdomain);
}
if (args.groupname && args.groupname !== null && args.groupname.length > 0) {
array1.push("&group=" + args.groupname);
}
var authorizeUsersForSamlSSO = function (users, entity) {
for (var i = 0; i < users.length; i++) {
$.ajax({
url: createURL('authorizeSamlSso&enable=true&userid=' + users[i].id + "&entityid=" + entity),
error: function(XMLHttpResponse) {
args.response.error(parseXMLHttpResponse(XMLHttpResponse));
}
});
}
return;
};
if (ldapStatus) {
if (args.groupname) {
$.ajax({
url: createURL('importLdapUsers' + array1.join("")),
dataType: "json",
type: "POST",
async: false,
success: function (json) {
if (json.ldapuserresponse && args.data.samlEnable && args.data.samlEnable === 'on') {
cloudStack.dialog.notice({
message: "Unable to find users IDs to enable SAML Single Sign On, kindly enable it manually."
});
}
},
error: function(XMLHttpResponse) {
args.response.error(parseXMLHttpResponse(XMLHttpResponse));
}
});
} else if (args.username) {
$.ajax({
url: createURL('ldapCreateAccount' + array1.join("")),
dataType: "json",
type: "POST",
async: false,
success: function(json) {
if (args.data.samlEnable && args.data.samlEnable === 'on') {
var users = json.createaccountresponse.account.user;
var entity = args.data.samlEntity;
if (users && entity)
authorizeUsersForSamlSSO(users, entity);
}
},
error: function(XMLHttpResponse) {
args.response.error(parseXMLHttpResponse(XMLHttpResponse));
}
});
}
} else {
$.ajax({
url: createURL('createAccount' + array1.join("")),
dataType: "json",
type: "POST",
async: false,
success: function(json) {
if (args.data.samlEnable && args.data.samlEnable === 'on') {
var users = json.createaccountresponse.account.user;
var entity = args.data.samlEntity;
if (users && entity)
authorizeUsersForSamlSSO(users, entity);
}
},
error: function(XMLHttpResponse) {
args.response.error(parseXMLHttpResponse(XMLHttpResponse));
}
});
}
}
};
}(cloudStack, jQuery));