From c4e38abf5c31d77474d5287620d1ddc8089b6dae Mon Sep 17 00:00:00 2001 From: Yoshie Muranaka Date: Thu, 9 Apr 2020 12:41:27 -0700 Subject: Add LDAP page Adds ability to enable LDAP service and modify LDAP and ActiveDirectory properties. Signed-off-by: Yoshie Muranaka Change-Id: I59d65bba7f6fe321af395227ce2f7188d9c006b7 --- src/store/modules/AccessControl/LdapStore.js | 156 +++++++++++++++++++++++++++ 1 file changed, 156 insertions(+) create mode 100644 src/store/modules/AccessControl/LdapStore.js (limited to 'src/store/modules') diff --git a/src/store/modules/AccessControl/LdapStore.js b/src/store/modules/AccessControl/LdapStore.js new file mode 100644 index 00000000..54fbbccd --- /dev/null +++ b/src/store/modules/AccessControl/LdapStore.js @@ -0,0 +1,156 @@ +import api from '@/store/api'; +import i18n from '@/i18n'; + +const LdapStore = { + namespaced: true, + state: { + isServiceEnabled: null, + ldap: { + serviceEnabled: null, + serviceAddress: null, + bindDn: null, + baseDn: null, + userAttribute: null, + groupsAttribute: null + }, + activeDirectory: { + serviceEnabled: null, + serviceAddress: null, + bindDn: null, + baseDn: null, + userAttribute: null, + groupsAttribute: null + } + }, + getters: { + isServiceEnabled: state => state.isServiceEnabled, + ldap: state => state.ldap, + activeDirectory: state => state.activeDirectory + }, + mutations: { + setServiceEnabled: (state, serviceEnabled) => + (state.isServiceEnabled = serviceEnabled), + setLdapProperties: ( + state, + { + ServiceEnabled, + ServiceAddresses, + Authentication = {}, + LDAPService: { SearchSettings = {} } = {} + } + ) => { + state.ldap.serviceAddress = ServiceAddresses[0]; + state.ldap.serviceEnabled = ServiceEnabled; + state.ldap.baseDn = SearchSettings.BaseDistinguishedNames[0]; + state.ldap.bindDn = Authentication.Username; + state.ldap.userAttribute = SearchSettings.UsernameAttribute; + state.ldap.groupsAttribute = SearchSettings.GroupsAttribute; + }, + setActiveDirectoryProperties: ( + state, + { + ServiceEnabled, + ServiceAddresses, + Authentication = {}, + LDAPService: { SearchSettings = {} } = {} + } + ) => { + state.activeDirectory.serviceEnabled = ServiceEnabled; + state.activeDirectory.serviceAddress = ServiceAddresses[0]; + state.activeDirectory.bindDn = Authentication.Username; + state.activeDirectory.baseDn = SearchSettings.BaseDistinguishedNames[0]; + state.activeDirectory.userAttribute = SearchSettings.UsernameAttribute; + state.activeDirectory.groupsAttribute = SearchSettings.GroupsAttribute; + } + }, + actions: { + getAccountSettings({ commit }) { + api + .get('/redfish/v1/AccountService') + .then(({ data: { LDAP = {}, ActiveDirectory = {} } }) => { + const ldapEnabled = LDAP.ServiceEnabled; + const activeDirectoryEnabled = ActiveDirectory.ServiceEnabled; + + commit('setServiceEnabled', ldapEnabled || activeDirectoryEnabled); + commit('setLdapProperties', LDAP); + commit('setActiveDirectoryProperties', ActiveDirectory); + }) + .catch(error => console.log(error)); + }, + async saveLdapSettings({ state, dispatch }, properties) { + const data = { LDAP: properties }; + if (state.activeDirectory.serviceEnabled) { + // Disable Active Directory service if enabled + await api.patch('/redfish/v1/AccountService', { + ActiveDirectory: { ServiceEnabled: false } + }); + } + return await api + .patch('/redfish/v1/AccountService', data) + .then(() => dispatch('getAccountSettings')) + .then(() => i18n.t('pageLdap.toast.successSaveLdapSettings')) + .catch(error => { + console.log(error); + throw new Error(i18n.t('pageLdap.toast.errorSaveLdapSettings')); + }); + }, + async saveActiveDirectorySettings({ state, dispatch }, properties) { + const data = { ActiveDirectory: properties }; + if (state.ldap.serviceEnabled) { + // Disable LDAP service if enabled + await api.patch('/redfish/v1/AccountService', { + LDAP: { ServiceEnabled: false } + }); + } + return await api + .patch('/redfish/v1/AccountService', data) + .then(() => dispatch('getAccountSettings')) + .then(() => i18n.t('pageLdap.toast.successSaveActiveDirectorySettings')) + .catch(error => { + console.log(error); + throw new Error( + i18n.t('pageLdap.toast.errorSaveActiveDirectorySettings') + ); + }); + }, + async saveAccountSettings( + { dispatch }, + { + serviceEnabled, + serviceAddress, + activeDirectoryEnabled, + bindDn, + bindPassword, + baseDn, + userIdAttribute, + groupIdAttribute + } + ) { + const data = { + ServiceEnabled: serviceEnabled, + ServiceAddresses: [serviceAddress], + Authentication: { + Username: bindDn, + Password: bindPassword + }, + LDAPService: { + SearchSettings: { + BaseDistinguishedNames: [baseDn] + } + } + }; + if (groupIdAttribute) + data.LDAPService.SearchSettings.GroupsAttribute = groupIdAttribute; + if (userIdAttribute) + data.LDAPService.SearchSettings.UsernameAttribute = userIdAttribute; + + if (activeDirectoryEnabled) { + return await dispatch('saveActiveDirectorySettings', data); + } else { + return await dispatch('saveLdapSettings', data); + } + } + } +}; + +export default LdapStore; -- cgit v1.2.3