1505 lines
56 KiB
JavaScript
1505 lines
56 KiB
JavaScript
module.controller('UserRoleMappingCtrl', function($scope, $http, realm, user, clients, client, Notifications, RealmRoleMapping,
|
|
ClientRoleMapping, AvailableRealmRoleMapping, AvailableClientRoleMapping,
|
|
CompositeRealmRoleMapping, CompositeClientRoleMapping) {
|
|
$scope.realm = realm;
|
|
$scope.user = user;
|
|
$scope.selectedRealmRoles = [];
|
|
$scope.selectedRealmMappings = [];
|
|
$scope.realmMappings = [];
|
|
$scope.clients = clients;
|
|
$scope.client = client;
|
|
$scope.clientRoles = [];
|
|
$scope.clientComposite = [];
|
|
$scope.selectedClientRoles = [];
|
|
$scope.selectedClientMappings = [];
|
|
$scope.clientMappings = [];
|
|
$scope.dummymodel = [];
|
|
|
|
$scope.realmMappings = RealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.realmRoles = AvailableRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.realmComposite = CompositeRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
|
|
$scope.addRealmRole = function() {
|
|
var roles = $scope.selectedRealmRoles;
|
|
$scope.selectedRealmRoles = [];
|
|
$http.post(authUrl + '/admin/realms/' + realm.realm + '/users/' + user.id + '/role-mappings/realm',
|
|
roles).then(function() {
|
|
$scope.realmMappings = RealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.realmRoles = AvailableRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.realmComposite = CompositeRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.selectedRealmMappings = [];
|
|
$scope.selectRealmRoles = [];
|
|
if ($scope.targetClient) {
|
|
console.log('load available');
|
|
$scope.clientComposite = CompositeClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientRoles = AvailableClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientMappings = ClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.selectedClientRoles = [];
|
|
$scope.selectedClientMappings = [];
|
|
}
|
|
Notifications.success("Role mappings updated.");
|
|
|
|
});
|
|
};
|
|
|
|
$scope.deleteRealmRole = function() {
|
|
$http.delete(authUrl + '/admin/realms/' + realm.realm + '/users/' + user.id + '/role-mappings/realm',
|
|
{data : $scope.selectedRealmMappings, headers : {"content-type" : "application/json"}}).then(function() {
|
|
$scope.realmMappings = RealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.realmRoles = AvailableRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.realmComposite = CompositeRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.selectedRealmMappings = [];
|
|
$scope.selectRealmRoles = [];
|
|
if ($scope.targetClient) {
|
|
console.log('load available');
|
|
$scope.clientComposite = CompositeClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientRoles = AvailableClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientMappings = ClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.selectedClientRoles = [];
|
|
$scope.selectedClientMappings = [];
|
|
}
|
|
Notifications.success("Role mappings updated.");
|
|
});
|
|
};
|
|
|
|
$scope.addClientRole = function() {
|
|
$http.post(authUrl + '/admin/realms/' + realm.realm + '/users/' + user.id + '/role-mappings/clients/' + $scope.targetClient.id,
|
|
$scope.selectedClientRoles).then(function() {
|
|
$scope.clientMappings = ClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientRoles = AvailableClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientComposite = CompositeClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.selectedClientRoles = [];
|
|
$scope.selectedClientMappings = [];
|
|
$scope.realmComposite = CompositeRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.realmRoles = AvailableRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
Notifications.success("Role mappings updated.");
|
|
});
|
|
};
|
|
|
|
$scope.deleteClientRole = function() {
|
|
$http.delete(authUrl + '/admin/realms/' + realm.realm + '/users/' + user.id + '/role-mappings/clients/' + $scope.targetClient.id,
|
|
{data : $scope.selectedClientMappings, headers : {"content-type" : "application/json"}}).then(function() {
|
|
$scope.clientMappings = ClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientRoles = AvailableClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientComposite = CompositeClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.selectedClientRoles = [];
|
|
$scope.selectedClientMappings = [];
|
|
$scope.realmComposite = CompositeRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
$scope.realmRoles = AvailableRealmRoleMapping.query({realm : realm.realm, userId : user.id});
|
|
Notifications.success("Role mappings updated.");
|
|
});
|
|
};
|
|
|
|
|
|
$scope.changeClient = function() {
|
|
console.log('changeClient');
|
|
if ($scope.targetClient) {
|
|
console.log('load available');
|
|
$scope.clientComposite = CompositeClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientRoles = AvailableClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
$scope.clientMappings = ClientRoleMapping.query({realm : realm.realm, userId : user.id, client : $scope.targetClient.id});
|
|
} else {
|
|
$scope.clientRoles = null;
|
|
$scope.clientMappings = null;
|
|
$scope.clientComposite = null;
|
|
}
|
|
$scope.selectedClientRoles = [];
|
|
$scope.selectedClientMappings = [];
|
|
};
|
|
|
|
|
|
|
|
});
|
|
|
|
module.controller('UserSessionsCtrl', function($scope, realm, user, sessions, UserSessions, UserLogout, UserSessionLogout, Notifications) {
|
|
$scope.realm = realm;
|
|
$scope.user = user;
|
|
$scope.sessions = sessions;
|
|
|
|
$scope.logoutAll = function() {
|
|
UserLogout.save({realm : realm.realm, user: user.id}, function () {
|
|
Notifications.success('Logged out user in all clients');
|
|
UserSessions.query({realm: realm.realm, user: user.id}, function(updated) {
|
|
$scope.sessions = updated;
|
|
})
|
|
});
|
|
};
|
|
|
|
$scope.logoutSession = function(sessionId) {
|
|
console.log('here in logoutSession');
|
|
UserSessionLogout.delete({realm : realm.realm, session: sessionId}, function() {
|
|
UserSessions.query({realm: realm.realm, user: user.id}, function(updated) {
|
|
$scope.sessions = updated;
|
|
Notifications.success('Logged out session');
|
|
})
|
|
});
|
|
}
|
|
});
|
|
|
|
module.controller('UserFederatedIdentityCtrl', function($scope, $location, realm, user, federatedIdentities, UserFederatedIdentity, Notifications, Dialog) {
|
|
$scope.realm = realm;
|
|
$scope.user = user;
|
|
$scope.federatedIdentities = federatedIdentities;
|
|
|
|
$scope.hasAnyProvidersToCreate = function() {
|
|
return realm.identityProviders.length - $scope.federatedIdentities.length > 0;
|
|
}
|
|
|
|
$scope.removeProviderLink = function(providerLink) {
|
|
|
|
console.log("Removing provider link: " + providerLink.identityProvider);
|
|
|
|
Dialog.confirmDelete(providerLink.identityProvider, 'Identity Provider Link', function() {
|
|
UserFederatedIdentity.remove({ realm: realm.realm, user: user.id, provider: providerLink.identityProvider }, function() {
|
|
Notifications.success("The provider link has been deleted.");
|
|
var indexToRemove = $scope.federatedIdentities.indexOf(providerLink);
|
|
$scope.federatedIdentities.splice(indexToRemove, 1);
|
|
});
|
|
});
|
|
}
|
|
});
|
|
|
|
module.controller('UserFederatedIdentityAddCtrl', function($scope, $location, realm, user, federatedIdentities, UserFederatedIdentity, Notifications) {
|
|
$scope.realm = realm;
|
|
$scope.user = user;
|
|
$scope.federatedIdentity = {};
|
|
|
|
var getAvailableProvidersToCreate = function() {
|
|
var realmProviders = [];
|
|
for (var i=0 ; i<realm.identityProviders.length ; i++) {
|
|
var providerAlias = realm.identityProviders[i].alias;
|
|
realmProviders.push(providerAlias);
|
|
};
|
|
|
|
for (var i=0 ; i<federatedIdentities.length ; i++) {
|
|
var providerAlias = federatedIdentities[i].identityProvider;
|
|
var index = realmProviders.indexOf(providerAlias);
|
|
realmProviders.splice(index, 1);
|
|
}
|
|
|
|
return realmProviders;
|
|
}
|
|
$scope.availableProvidersToCreate = getAvailableProvidersToCreate();
|
|
|
|
$scope.save = function() {
|
|
UserFederatedIdentity.save({
|
|
realm : realm.realm,
|
|
user: user.id,
|
|
provider: $scope.federatedIdentity.identityProvider
|
|
}, $scope.federatedIdentity, function(data, headers) {
|
|
$location.url("/realms/" + realm.realm + '/users/' + $scope.user.id + '/federated-identity');
|
|
Notifications.success("Provider link has been created.");
|
|
});
|
|
};
|
|
|
|
$scope.cancel = function() {
|
|
$location.url("/realms/" + realm.realm + '/users/' + $scope.user.id + '/federated-identity');
|
|
};
|
|
|
|
});
|
|
|
|
module.controller('UserConsentsCtrl', function($scope, realm, user, userConsents, UserConsents, Notifications) {
|
|
$scope.realm = realm;
|
|
$scope.user = user;
|
|
$scope.userConsents = userConsents;
|
|
|
|
$scope.revokeConsent = function(clientId) {
|
|
UserConsents.delete({realm : realm.realm, user: user.id, client: clientId }, function () {
|
|
UserConsents.query({realm: realm.realm, user: user.id}, function(updated) {
|
|
$scope.userConsents = updated;
|
|
})
|
|
Notifications.success('Grant revoked successfully');
|
|
}, function() {
|
|
Notifications.error("Grant couldn't be revoked");
|
|
});
|
|
console.log("Revoke consent " + clientId);
|
|
}
|
|
});
|
|
|
|
module.controller('UserOfflineSessionsCtrl', function($scope, $location, realm, user, client, offlineSessions) {
|
|
$scope.realm = realm;
|
|
$scope.user = user;
|
|
$scope.client = client;
|
|
$scope.offlineSessions = offlineSessions;
|
|
|
|
$scope.cancel = function() {
|
|
$location.url("/realms/" + realm.realm + '/users/' + user.id + '/consents');
|
|
};
|
|
});
|
|
|
|
|
|
module.controller('UserListCtrl', function($scope, realm, User, UserSearchState, UserImpersonation, BruteForce, Notifications, $route, Dialog) {
|
|
|
|
$scope.init = function() {
|
|
$scope.realm = realm;
|
|
|
|
UserSearchState.query.realm = realm.realm;
|
|
$scope.query = UserSearchState.query;
|
|
|
|
if (!UserSearchState.isFirstSearch) $scope.searchQuery();
|
|
};
|
|
|
|
$scope.impersonate = function(userId) {
|
|
UserImpersonation.save({realm : realm.realm, user: userId}, function (data) {
|
|
if (data.sameRealm) {
|
|
window.location = data.redirect;
|
|
} else {
|
|
window.open(data.redirect, "_blank");
|
|
}
|
|
});
|
|
};
|
|
|
|
$scope.unlockUsers = function() {
|
|
BruteForce.delete({realm: realm.realm}, function(data) {
|
|
Notifications.success("Any temporarily locked users are now unlocked.");
|
|
});
|
|
}
|
|
|
|
|
|
$scope.firstPage = function() {
|
|
$scope.query.first = 0;
|
|
$scope.searchQuery();
|
|
}
|
|
|
|
$scope.previousPage = function() {
|
|
$scope.query.first -= parseInt($scope.query.max);
|
|
if ($scope.query.first < 0) {
|
|
$scope.query.first = 0;
|
|
}
|
|
$scope.searchQuery();
|
|
}
|
|
|
|
$scope.nextPage = function() {
|
|
$scope.query.first += parseInt($scope.query.max);
|
|
$scope.searchQuery();
|
|
}
|
|
|
|
$scope.searchQuery = function() {
|
|
console.log("query.search: " + $scope.query.search);
|
|
$scope.searchLoaded = false;
|
|
|
|
$scope.users = User.query($scope.query, function() {
|
|
$scope.searchLoaded = true;
|
|
$scope.lastSearch = $scope.query.search;
|
|
UserSearchState.isFirstSearch = false;
|
|
});
|
|
};
|
|
|
|
$scope.removeUser = function(user) {
|
|
Dialog.confirmDelete(user.id, 'user', function() {
|
|
user.$remove({
|
|
realm : realm.realm,
|
|
userId : user.id
|
|
}, function() {
|
|
$route.reload();
|
|
|
|
if ($scope.users.length === 1 && $scope.query.first > 0) {
|
|
$scope.previousPage();
|
|
}
|
|
|
|
Notifications.success("The user has been deleted.");
|
|
}, function() {
|
|
Notifications.error("User couldn't be deleted");
|
|
});
|
|
});
|
|
};
|
|
});
|
|
|
|
|
|
module.controller('UserTabCtrl', function($scope, $location, Dialog, Notifications, Current) {
|
|
$scope.removeUser = function() {
|
|
Dialog.confirmDelete($scope.user.id, 'user', function() {
|
|
$scope.user.$remove({
|
|
realm : Current.realm.realm,
|
|
userId : $scope.user.id
|
|
}, function() {
|
|
$location.url("/realms/" + Current.realm.realm + "/users");
|
|
Notifications.success("The user has been deleted.");
|
|
}, function() {
|
|
Notifications.error("User couldn't be deleted");
|
|
});
|
|
});
|
|
};
|
|
});
|
|
|
|
module.controller('UserDetailCtrl', function($scope, realm, user, BruteForceUser, User,
|
|
Components,
|
|
UserImpersonation, RequiredActions,
|
|
UserStorageOperations,
|
|
$location, $http, Dialog, Notifications) {
|
|
$scope.realm = realm;
|
|
$scope.create = !user.id;
|
|
$scope.editUsername = $scope.create || $scope.realm.editUsernameAllowed;
|
|
|
|
if ($scope.create) {
|
|
$scope.user = { enabled: true, attributes: {} }
|
|
} else {
|
|
if (!user.attributes) {
|
|
user.attributes = {}
|
|
}
|
|
convertAttributeValuesToString(user);
|
|
|
|
|
|
$scope.user = angular.copy(user);
|
|
$scope.impersonate = function() {
|
|
UserImpersonation.save({realm : realm.realm, user: $scope.user.id}, function (data) {
|
|
if (data.sameRealm) {
|
|
window.location = data.redirect;
|
|
} else {
|
|
window.open(data.redirect, "_blank");
|
|
}
|
|
});
|
|
};
|
|
if(user.federationLink) {
|
|
console.log("federationLink is not null. It is " + user.federationLink);
|
|
|
|
if ($scope.access.viewRealm) {
|
|
Components.get({realm: realm.realm, componentId: user.federationLink}, function (link) {
|
|
$scope.federationLinkName = link.name;
|
|
$scope.federationLink = "#/realms/" + realm.realm + "/user-storage/providers/" + link.providerId + "/" + link.id;
|
|
});
|
|
} else {
|
|
// KEYCLOAK-4328
|
|
UserStorageOperations.simpleName.get({realm: realm.realm, componentId: user.federationLink}, function (link) {
|
|
$scope.federationLinkName = link.name;
|
|
$scope.federationLink = $location.absUrl();
|
|
})
|
|
}
|
|
|
|
} else {
|
|
console.log("federationLink is null");
|
|
}
|
|
if(user.origin) {
|
|
if ($scope.access.viewRealm) {
|
|
Components.get({realm: realm.realm, componentId: user.origin}, function (link) {
|
|
$scope.originName = link.name;
|
|
$scope.originLink = "#/realms/" + realm.realm + "/user-storage/providers/" + link.providerId + "/" + link.id;
|
|
})
|
|
}
|
|
else {
|
|
// KEYCLOAK-4328
|
|
UserStorageOperations.simpleName.get({realm: realm.realm, componentId: user.origin}, function (link) {
|
|
$scope.originName = link.name;
|
|
$scope.originLink = $location.absUrl();
|
|
})
|
|
}
|
|
} else {
|
|
console.log("origin is null");
|
|
}
|
|
console.log('realm brute force? ' + realm.bruteForceProtected)
|
|
$scope.temporarilyDisabled = false;
|
|
var isDisabled = function () {
|
|
BruteForceUser.get({realm: realm.realm, userId: user.id}, function(data) {
|
|
console.log('here in isDisabled ' + data.disabled);
|
|
$scope.temporarilyDisabled = data.disabled;
|
|
});
|
|
};
|
|
|
|
console.log("check if disabled");
|
|
isDisabled();
|
|
|
|
$scope.unlockUser = function() {
|
|
BruteForceUser.delete({realm: realm.realm, userId: user.id}, function(data) {
|
|
isDisabled();
|
|
});
|
|
}
|
|
}
|
|
|
|
$scope.changed = false; // $scope.create;
|
|
if (user.requiredActions) {
|
|
for (var i = 0; i < user.requiredActions.length; i++) {
|
|
console.log("user require action: " + user.requiredActions[i]);
|
|
}
|
|
}
|
|
// ID - Name map for required actions. IDs are enum names.
|
|
RequiredActions.query({realm: realm.realm}, function(data) {
|
|
$scope.userReqActionList = [];
|
|
for (var i = 0; i < data.length; i++) {
|
|
console.log("listed required action: " + data[i].name);
|
|
if (data[i].enabled) {
|
|
var item = data[i];
|
|
$scope.userReqActionList.push(item);
|
|
}
|
|
}
|
|
console.log("---------------------");
|
|
console.log("ng-model: user.requiredActions=" + JSON.stringify($scope.user.requiredActions));
|
|
console.log("---------------------");
|
|
console.log("ng-repeat: userReqActionList=" + JSON.stringify($scope.userReqActionList));
|
|
console.log("---------------------");
|
|
});
|
|
$scope.$watch('user', function() {
|
|
if (!angular.equals($scope.user, user)) {
|
|
$scope.changed = true;
|
|
}
|
|
}, true);
|
|
|
|
$scope.save = function() {
|
|
convertAttributeValuesToLists();
|
|
|
|
if ($scope.create) {
|
|
User.save({
|
|
realm: realm.realm
|
|
}, $scope.user, function (data, headers) {
|
|
$scope.changed = false;
|
|
convertAttributeValuesToString($scope.user);
|
|
user = angular.copy($scope.user);
|
|
var l = headers().location;
|
|
|
|
console.debug("Location == " + l);
|
|
|
|
var id = l.substring(l.lastIndexOf("/") + 1);
|
|
|
|
|
|
$location.url("/realms/" + realm.realm + "/users/" + id);
|
|
Notifications.success("The user has been created.");
|
|
});
|
|
} else {
|
|
User.update({
|
|
realm: realm.realm,
|
|
userId: $scope.user.id
|
|
}, $scope.user, function () {
|
|
$scope.changed = false;
|
|
convertAttributeValuesToString($scope.user);
|
|
user = angular.copy($scope.user);
|
|
Notifications.success("Your changes have been saved to the user.");
|
|
});
|
|
}
|
|
};
|
|
|
|
function convertAttributeValuesToLists() {
|
|
var attrs = $scope.user.attributes;
|
|
for (var attribute in attrs) {
|
|
if (typeof attrs[attribute] === "string") {
|
|
var attrVals = attrs[attribute].split("##");
|
|
attrs[attribute] = attrVals;
|
|
}
|
|
}
|
|
}
|
|
|
|
function convertAttributeValuesToString(user) {
|
|
var attrs = user.attributes;
|
|
for (var attribute in attrs) {
|
|
if (typeof attrs[attribute] === "object") {
|
|
var attrVals = attrs[attribute].join("##");
|
|
attrs[attribute] = attrVals;
|
|
}
|
|
}
|
|
}
|
|
|
|
$scope.reset = function() {
|
|
$scope.user = angular.copy(user);
|
|
$scope.changed = false;
|
|
};
|
|
|
|
$scope.cancel = function() {
|
|
$location.url("/realms/" + realm.realm + "/users");
|
|
};
|
|
|
|
$scope.addAttribute = function() {
|
|
$scope.user.attributes[$scope.newAttribute.key] = $scope.newAttribute.value;
|
|
delete $scope.newAttribute;
|
|
}
|
|
|
|
$scope.removeAttribute = function(key) {
|
|
delete $scope.user.attributes[key];
|
|
}
|
|
});
|
|
|
|
module.controller('UserCredentialsCtrl', function($scope, realm, user, $route, RequiredActions, User, UserExecuteActionsEmail, UserCredentials, Notifications, Dialog, TimeUnit2) {
|
|
console.log('UserCredentialsCtrl');
|
|
|
|
$scope.realm = realm;
|
|
$scope.user = angular.copy(user);
|
|
$scope.temporaryPassword = true;
|
|
|
|
$scope.isTotp = false;
|
|
if(!!user.totp){
|
|
$scope.isTotp = user.totp;
|
|
}
|
|
// ID - Name map for required actions. IDs are enum names.
|
|
RequiredActions.query({realm: realm.realm}, function(data) {
|
|
$scope.userReqActionList = [];
|
|
for (var i = 0; i < data.length; i++) {
|
|
console.log("listed required action: " + data[i].name);
|
|
if (data[i].enabled) {
|
|
var item = data[i];
|
|
$scope.userReqActionList.push(item);
|
|
}
|
|
}
|
|
|
|
});
|
|
|
|
$scope.resetPassword = function() {
|
|
// hit enter without entering both fields - ignore
|
|
if (!$scope.passwordAndConfirmPasswordEntered()) return;
|
|
|
|
if ($scope.pwdChange) {
|
|
if ($scope.password != $scope.confirmPassword) {
|
|
Notifications.error("Password and confirmation does not match.");
|
|
return;
|
|
}
|
|
}
|
|
|
|
var msgTitle = 'Change password';
|
|
var msg = 'Are you sure you want to change the users password?';
|
|
|
|
Dialog.confirm(msgTitle, msg, function() {
|
|
UserCredentials.resetPassword({ realm: realm.realm, userId: user.id }, { type : "password", value : $scope.password, temporary: $scope.temporaryPassword }, function() {
|
|
Notifications.success("The password has been reset");
|
|
$scope.password = null;
|
|
$scope.confirmPassword = null;
|
|
$route.reload();
|
|
});
|
|
}, function() {
|
|
$scope.password = null;
|
|
$scope.confirmPassword = null;
|
|
});
|
|
};
|
|
|
|
$scope.passwordAndConfirmPasswordEntered = function() {
|
|
return $scope.password && $scope.confirmPassword;
|
|
}
|
|
|
|
$scope.disableCredentialTypes = function() {
|
|
Dialog.confirm('Disable credentials', 'Are you sure you want to disable these the users credentials?', function() {
|
|
UserCredentials.disableCredentialTypes({ realm: realm.realm, userId: user.id }, $scope.disableableCredentialTypes, function() {
|
|
$route.reload();
|
|
Notifications.success("Credentials disabled");
|
|
}, function() {
|
|
Notifications.error("Failed to disable credentials");
|
|
});
|
|
});
|
|
};
|
|
|
|
$scope.emailActions = [];
|
|
$scope.emailActionsTimeout = TimeUnit2.asUnit(realm.actionTokenGeneratedByAdminLifespan);
|
|
$scope.disableableCredentialTypes = [];
|
|
|
|
$scope.sendExecuteActionsEmail = function() {
|
|
if ($scope.changed) {
|
|
Dialog.message("Cannot send email", "You must save your current changes before you can send an email");
|
|
return;
|
|
}
|
|
Dialog.confirm('Send Email', 'Are you sure you want to send email to user?', function() {
|
|
UserExecuteActionsEmail.update({ realm: realm.realm, userId: user.id, lifespan: $scope.emailActionsTimeout.toSeconds() }, $scope.emailActions, function() {
|
|
Notifications.success("Email sent to user");
|
|
$scope.emailActions = [];
|
|
}, function() {
|
|
Notifications.error("Failed to send email to user");
|
|
});
|
|
});
|
|
};
|
|
|
|
|
|
|
|
$scope.$watch('user', function() {
|
|
if (!angular.equals($scope.user, user)) {
|
|
$scope.userChange = true;
|
|
} else {
|
|
$scope.userChange = false;
|
|
}
|
|
}, true);
|
|
|
|
$scope.$watch('password', function() {
|
|
if (!!$scope.password){
|
|
$scope.pwdChange = true;
|
|
} else {
|
|
$scope.pwdChange = false;
|
|
}
|
|
}, true);
|
|
|
|
$scope.reset = function() {
|
|
$scope.password = "";
|
|
$scope.confirmPassword = "";
|
|
|
|
$scope.user = angular.copy(user);
|
|
|
|
$scope.isTotp = false;
|
|
if(!!user.totp){
|
|
$scope.isTotp = user.totp;
|
|
}
|
|
|
|
$scope.pwdChange = false;
|
|
$scope.userChange = false;
|
|
};
|
|
});
|
|
|
|
module.controller('UserFederationCtrl', function($scope, $location, $route, realm, serverInfo, Components, Notifications, Dialog) {
|
|
console.log('UserFederationCtrl ++++****');
|
|
$scope.realm = realm;
|
|
$scope.providers = serverInfo.componentTypes['org.keycloak.storage.UserStorageProvider'];
|
|
$scope.instancesLoaded = false;
|
|
|
|
if (!$scope.providers) $scope.providers = [];
|
|
|
|
$scope.addProvider = function(provider) {
|
|
console.log('Add provider: ' + provider.id);
|
|
$location.url("/create/user-storage/" + realm.realm + "/providers/" + provider.id);
|
|
};
|
|
|
|
$scope.getInstanceLink = function(instance) {
|
|
return "/realms/" + realm.realm + "/user-storage/providers/" + instance.providerId + "/" + instance.id;
|
|
}
|
|
|
|
$scope.getInstanceName = function(instance) {
|
|
return instance.name;
|
|
}
|
|
$scope.getInstanceProvider = function(instance) {
|
|
return instance.providerId;
|
|
}
|
|
|
|
$scope.getInstancePriority = function(instance) {
|
|
if (!instance.config['priority']) {
|
|
console.log('getInstancePriority is undefined');
|
|
}
|
|
return instance.config['priority'][0];
|
|
}
|
|
|
|
Components.query({realm: realm.realm,
|
|
parent: realm.id,
|
|
type: 'org.keycloak.storage.UserStorageProvider'
|
|
}, function(data) {
|
|
$scope.instances = data;
|
|
$scope.instancesLoaded = true;
|
|
});
|
|
|
|
$scope.removeInstance = function(instance) {
|
|
Dialog.confirmDelete(instance.name, 'user storage provider', function() {
|
|
Components.remove({
|
|
realm : realm.realm,
|
|
componentId : instance.id
|
|
}, function() {
|
|
$route.reload();
|
|
Notifications.success("The provider has been deleted.");
|
|
});
|
|
});
|
|
};
|
|
});
|
|
|
|
module.controller('GenericUserStorageCtrl', function($scope, $location, Notifications, $route, Dialog, realm,
|
|
serverInfo, instance, providerId, Components, UserStorageOperations) {
|
|
console.log('GenericUserStorageCtrl');
|
|
console.log('providerId: ' + providerId);
|
|
$scope.create = !instance.providerId;
|
|
console.log('create: ' + $scope.create);
|
|
var providers = serverInfo.componentTypes['org.keycloak.storage.UserStorageProvider'];
|
|
console.log('providers length ' + providers.length);
|
|
var providerFactory = null;
|
|
for (var i = 0; i < providers.length; i++) {
|
|
var p = providers[i];
|
|
console.log('provider: ' + p.id);
|
|
if (p.id == providerId) {
|
|
$scope.providerFactory = p;
|
|
providerFactory = p;
|
|
break;
|
|
}
|
|
|
|
}
|
|
$scope.showSync = false;
|
|
$scope.changed = false;
|
|
|
|
console.log("providerFactory: " + providerFactory.id);
|
|
|
|
function initUserStorageSettings() {
|
|
if ($scope.create) {
|
|
$scope.changed = true;
|
|
instance.name = providerFactory.id;
|
|
instance.providerId = providerFactory.id;
|
|
instance.providerType = 'org.keycloak.storage.UserStorageProvider';
|
|
instance.parentId = realm.id;
|
|
instance.config = {
|
|
|
|
};
|
|
instance.config['priority'] = ["0"];
|
|
|
|
$scope.fullSyncEnabled = false;
|
|
$scope.changedSyncEnabled = false;
|
|
if (providerFactory.metadata.synchronizable) {
|
|
instance.config['fullSyncPeriod'] = ['-1'];
|
|
instance.config['changedSyncPeriod'] = ['-1'];
|
|
|
|
}
|
|
instance.config['cachePolicy'] = ['DEFAULT'];
|
|
instance.config['evictionDay'] = [''];
|
|
instance.config['evictionHour'] = [''];
|
|
instance.config['evictionMinute'] = [''];
|
|
instance.config['maxLifespan'] = [''];
|
|
if (providerFactory.properties) {
|
|
|
|
for (var i = 0; i < providerFactory.properties.length; i++) {
|
|
var configProperty = providerFactory.properties[i];
|
|
if (configProperty.defaultValue) {
|
|
instance.config[configProperty.name] = [configProperty.defaultValue];
|
|
} else {
|
|
instance.config[configProperty.name] = [''];
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
} else {
|
|
$scope.changed = false;
|
|
$scope.fullSyncEnabled = (instance.config['fullSyncPeriod'] && instance.config['fullSyncPeriod'][0] > 0);
|
|
$scope.changedSyncEnabled = (instance.config['changedSyncPeriod'] && instance.config['changedSyncPeriod'][0]> 0);
|
|
if (providerFactory.metadata.synchronizable) {
|
|
if (!instance.config['fullSyncPeriod']) {
|
|
console.log('setting to -1');
|
|
instance.config['fullSyncPeriod'] = ['-1'];
|
|
|
|
}
|
|
if (!instance.config['changedSyncPeriod']) {
|
|
console.log('setting to -1');
|
|
instance.config['changedSyncPeriod'] = ['-1'];
|
|
|
|
}
|
|
}
|
|
if (!instance.config['cachePolicy']) {
|
|
instance.config['cachePolicy'] = ['DEFAULT'];
|
|
|
|
}
|
|
if (!instance.config['evictionDay']) {
|
|
instance.config['evictionDay'] = [''];
|
|
|
|
}
|
|
if (!instance.config['evictionHour']) {
|
|
instance.config['evictionHour'] = [''];
|
|
|
|
}
|
|
if (!instance.config['evictionMinute']) {
|
|
instance.config['evictionMinute'] = [''];
|
|
|
|
}
|
|
if (!instance.config['maxLifespan']) {
|
|
instance.config['maxLifespan'] = [''];
|
|
|
|
}
|
|
if (!instance.config['priority']) {
|
|
instance.config['priority'] = ['0'];
|
|
}
|
|
|
|
if (providerFactory.properties) {
|
|
for (var i = 0; i < providerFactory.properties.length; i++) {
|
|
var configProperty = providerFactory.properties[i];
|
|
if (!instance.config[configProperty.name]) {
|
|
instance.config[configProperty.name] = [''];
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
if (providerFactory.metadata.synchronizable) {
|
|
if (instance.config && instance.config['importEnabled']) {
|
|
$scope.showSync = instance.config['importEnabled'][0] == 'true';
|
|
} else {
|
|
$scope.showSync = true;
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
initUserStorageSettings();
|
|
$scope.instance = angular.copy(instance);
|
|
$scope.realm = realm;
|
|
|
|
$scope.$watch('instance', function() {
|
|
if (!angular.equals($scope.instance, instance)) {
|
|
$scope.changed = true;
|
|
}
|
|
|
|
}, true);
|
|
|
|
$scope.$watch('fullSyncEnabled', function(newVal, oldVal) {
|
|
if (oldVal == newVal) {
|
|
return;
|
|
}
|
|
|
|
$scope.instance.config['fullSyncPeriod'][0] = $scope.fullSyncEnabled ? "604800" : "-1";
|
|
$scope.changed = true;
|
|
});
|
|
|
|
$scope.$watch('changedSyncEnabled', function(newVal, oldVal) {
|
|
if (oldVal == newVal) {
|
|
return;
|
|
}
|
|
|
|
$scope.instance.config['changedSyncPeriod'][0] = $scope.changedSyncEnabled ? "86400" : "-1";
|
|
$scope.changed = true;
|
|
});
|
|
|
|
|
|
$scope.save = function() {
|
|
console.log('save provider');
|
|
$scope.changed = false;
|
|
if ($scope.create) {
|
|
console.log('saving new provider');
|
|
Components.save({realm: realm.realm}, $scope.instance, function (data, headers) {
|
|
var l = headers().location;
|
|
var id = l.substring(l.lastIndexOf("/") + 1);
|
|
|
|
$location.url("/realms/" + realm.realm + "/user-storage/providers/" + $scope.instance.providerId + "/" + id);
|
|
Notifications.success("The provider has been created.");
|
|
});
|
|
} else {
|
|
console.log('update existing provider');
|
|
Components.update({realm: realm.realm,
|
|
componentId: instance.id
|
|
},
|
|
$scope.instance, function () {
|
|
$route.reload();
|
|
Notifications.success("The provider has been updated.");
|
|
});
|
|
}
|
|
};
|
|
|
|
$scope.reset = function() {
|
|
//initUserStorageSettings();
|
|
//$scope.instance = angular.copy(instance);
|
|
$route.reload();
|
|
};
|
|
|
|
$scope.cancel = function() {
|
|
console.log('cancel');
|
|
if ($scope.create) {
|
|
$location.url("/realms/" + realm.realm + "/user-federation");
|
|
} else {
|
|
$route.reload();
|
|
}
|
|
};
|
|
|
|
$scope.triggerFullSync = function() {
|
|
console.log('GenericCtrl: triggerFullSync');
|
|
triggerSync('triggerFullSync');
|
|
}
|
|
|
|
$scope.triggerChangedUsersSync = function() {
|
|
console.log('GenericCtrl: triggerChangedUsersSync');
|
|
triggerSync('triggerChangedUsersSync');
|
|
}
|
|
|
|
function triggerSync(action) {
|
|
UserStorageOperations.sync.save({ action: action, realm: $scope.realm.realm, componentId: $scope.instance.id }, {}, function(syncResult) {
|
|
$route.reload();
|
|
Notifications.success("Sync of users finished successfully. " + syncResult.status);
|
|
}, function() {
|
|
$route.reload();
|
|
Notifications.error("Error during sync of users");
|
|
});
|
|
}
|
|
$scope.removeImportedUsers = function() {
|
|
UserStorageOperations.removeImportedUsers.save({ realm: $scope.realm.realm, componentId: $scope.instance.id }, {}, function(syncResult) {
|
|
$route.reload();
|
|
Notifications.success("Remove imported users finished successfully. ");
|
|
}, function() {
|
|
$route.reload();
|
|
Notifications.error("Error during remove");
|
|
});
|
|
};
|
|
$scope.unlinkUsers = function() {
|
|
UserStorageOperations.unlinkUsers.save({ realm: $scope.realm.realm, componentId: $scope.instance.id }, {}, function(syncResult) {
|
|
$route.reload();
|
|
Notifications.success("Unlink of users finished successfully. ");
|
|
}, function() {
|
|
$route.reload();
|
|
Notifications.error("Error during unlink");
|
|
});
|
|
};
|
|
|
|
});
|
|
|
|
|
|
function removeGroupMember(groups, member) {
|
|
for (var j = 0; j < groups.length; j++) {
|
|
//console.log('checking: ' + groups[j].path);
|
|
if (member.path == groups[j].path) {
|
|
groups.splice(j, 1);
|
|
break;
|
|
}
|
|
if (groups[j].subGroups && groups[j].subGroups.length > 0) {
|
|
//console.log('going into subgroups');
|
|
removeGroupMember(groups[j].subGroups, member);
|
|
}
|
|
}
|
|
}
|
|
module.controller('UserGroupMembershipCtrl', function($scope, $route, realm, groups, user, UserGroupMembership, UserGroupMapping, Notifications, $location, Dialog) {
|
|
$scope.realm = realm;
|
|
$scope.user = user;
|
|
$scope.groupList = groups;
|
|
$scope.selectedGroup = null;
|
|
$scope.tree = [];
|
|
|
|
UserGroupMembership.query({realm: realm.realm, userId: user.id}, function(data) {
|
|
$scope.groupMemberships = data;
|
|
for (var i = 0; i < data.length; i++) {
|
|
var member = data[i];
|
|
removeGroupMember(groups, member);
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
$scope.joinGroup = function() {
|
|
if (!$scope.tree.currentNode) {
|
|
Notifications.error('Please select a group to add');
|
|
return;
|
|
};
|
|
UserGroupMapping.update({realm: realm.realm, userId: user.id, groupId: $scope.tree.currentNode.id}, function() {
|
|
Notifications.success('Added group membership');
|
|
$route.reload();
|
|
});
|
|
|
|
};
|
|
|
|
$scope.leaveGroup = function() {
|
|
if (!$scope.selectedGroup) {
|
|
return;
|
|
|
|
}
|
|
UserGroupMapping.remove({realm: realm.realm, userId: user.id, groupId: $scope.selectedGroup.id}, function() {
|
|
Notifications.success('Removed group membership');
|
|
$route.reload();
|
|
});
|
|
|
|
};
|
|
|
|
var isLeaf = function(node) {
|
|
return node.id != "realm" && (!node.subGroups || node.subGroups.length == 0);
|
|
};
|
|
|
|
$scope.getGroupClass = function(node) {
|
|
if (node.id == "realm") {
|
|
return 'pficon pficon-users';
|
|
}
|
|
if (isLeaf(node)) {
|
|
return 'normal';
|
|
}
|
|
if (node.subGroups.length && node.collapsed) return 'collapsed';
|
|
if (node.subGroups.length && !node.collapsed) return 'expanded';
|
|
return 'collapsed';
|
|
|
|
}
|
|
|
|
$scope.getSelectedClass = function(node) {
|
|
if (node.selected) {
|
|
return 'selected';
|
|
} else if ($scope.cutNode && $scope.cutNode.id == node.id) {
|
|
return 'cut';
|
|
}
|
|
return undefined;
|
|
}
|
|
|
|
});
|
|
|
|
module.controller('LDAPUserStorageCtrl', function($scope, $location, Notifications, $route, Dialog, realm,
|
|
serverInfo, instance, Components, UserStorageOperations, RealmLDAPConnectionTester) {
|
|
console.log('LDAPUserStorageCtrl');
|
|
var providerId = 'ldap';
|
|
console.log('providerId: ' + providerId);
|
|
$scope.create = !instance.providerId;
|
|
console.log('create: ' + $scope.create);
|
|
var providers = serverInfo.componentTypes['org.keycloak.storage.UserStorageProvider'];
|
|
console.log('providers length ' + providers.length);
|
|
var providerFactory = null;
|
|
for (var i = 0; i < providers.length; i++) {
|
|
var p = providers[i];
|
|
console.log('provider: ' + p.id);
|
|
if (p.id == providerId) {
|
|
$scope.providerFactory = p;
|
|
providerFactory = p;
|
|
break;
|
|
}
|
|
|
|
}
|
|
|
|
$scope.provider = instance;
|
|
$scope.showSync = false;
|
|
|
|
if (serverInfo.profileInfo.name == 'community') {
|
|
$scope.ldapVendors = [
|
|
{"id": "ad", "name": "Active Directory"},
|
|
{"id": "rhds", "name": "Red Hat Directory Server"},
|
|
{"id": "tivoli", "name": "Tivoli"},
|
|
{"id": "edirectory", "name": "Novell eDirectory"},
|
|
{"id": "other", "name": "Other"}
|
|
];
|
|
} else {
|
|
$scope.ldapVendors = [
|
|
{"id": "ad", "name": "Active Directory"},
|
|
{"id": "rhds", "name": "Red Hat Directory Server"}
|
|
];
|
|
}
|
|
|
|
$scope.authTypes = [
|
|
{ "id": "none", "name": "none" },
|
|
{ "id": "simple", "name": "simple" }
|
|
];
|
|
|
|
$scope.searchScopes = [
|
|
{ "id": "1", "name": "One Level" },
|
|
{ "id": "2", "name": "Subtree" }
|
|
];
|
|
|
|
$scope.useTruststoreOptions = [
|
|
{ "id": "always", "name": "Always" },
|
|
{ "id": "ldapsOnly", "name": "Only for ldaps" },
|
|
{ "id": "never", "name": "Never" }
|
|
];
|
|
|
|
var DEFAULT_BATCH_SIZE = "1000";
|
|
|
|
|
|
console.log("providerFactory: " + providerFactory.id);
|
|
|
|
$scope.changed = false;
|
|
function initUserStorageSettings() {
|
|
if ($scope.create) {
|
|
$scope.changed = true;
|
|
instance.name = 'ldap';
|
|
instance.providerId = 'ldap';
|
|
instance.providerType = 'org.keycloak.storage.UserStorageProvider';
|
|
instance.parentId = realm.id;
|
|
instance.config = {
|
|
|
|
};
|
|
instance.config['priority'] = ["0"];
|
|
|
|
$scope.fullSyncEnabled = false;
|
|
$scope.changedSyncEnabled = false;
|
|
instance.config['fullSyncPeriod'] = ['-1'];
|
|
instance.config['changedSyncPeriod'] = ['-1'];
|
|
instance.config['cachePolicy'] = ['DEFAULT'];
|
|
instance.config['evictionDay'] = [''];
|
|
instance.config['evictionHour'] = [''];
|
|
instance.config['evictionMinute'] = [''];
|
|
instance.config['maxLifespan'] = [''];
|
|
instance.config['batchSizeForSync'] = [DEFAULT_BATCH_SIZE];
|
|
//instance.config['importEnabled'] = ['true'];
|
|
|
|
if (providerFactory.properties) {
|
|
|
|
for (var i = 0; i < providerFactory.properties.length; i++) {
|
|
var configProperty = providerFactory.properties[i];
|
|
if (configProperty.defaultValue) {
|
|
instance.config[configProperty.name] = [configProperty.defaultValue];
|
|
} else {
|
|
instance.config[configProperty.name] = [''];
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
|
|
} else {
|
|
$scope.changed = false;
|
|
$scope.fullSyncEnabled = (instance.config['fullSyncPeriod'] && instance.config['fullSyncPeriod'][0] > 0);
|
|
$scope.changedSyncEnabled = (instance.config['changedSyncPeriod'] && instance.config['changedSyncPeriod'][0]> 0);
|
|
if (!instance.config['fullSyncPeriod']) {
|
|
console.log('setting to -1');
|
|
instance.config['fullSyncPeriod'] = ['-1'];
|
|
|
|
}
|
|
if (!instance.config['changedSyncPeriod']) {
|
|
console.log('setting to -1');
|
|
instance.config['changedSyncPeriod'] = ['-1'];
|
|
|
|
}
|
|
if (!instance.config['cachePolicy']) {
|
|
instance.config['cachePolicy'] = ['DEFAULT'];
|
|
|
|
}
|
|
if (!instance.config['evictionDay']) {
|
|
instance.config['evictionDay'] = [''];
|
|
|
|
}
|
|
if (!instance.config['evictionHour']) {
|
|
instance.config['evictionHour'] = [''];
|
|
|
|
}
|
|
if (!instance.config['evictionMinute']) {
|
|
instance.config['evictionMinute'] = [''];
|
|
|
|
}
|
|
if (!instance.config['maxLifespan']) {
|
|
instance.config['maxLifespan'] = [''];
|
|
|
|
}
|
|
if (!instance.config['priority']) {
|
|
instance.config['priority'] = ['0'];
|
|
}
|
|
if (!instance.config['importEnabled']) {
|
|
instance.config['importEnabled'] = ['true'];
|
|
}
|
|
|
|
if (providerFactory.properties) {
|
|
|
|
for (var i = 0; i < providerFactory.properties.length; i++) {
|
|
var configProperty = providerFactory.properties[i];
|
|
if (!instance.config[configProperty.name]) {
|
|
if (configProperty.defaultValue) {
|
|
instance.config[configProperty.name] = [configProperty.defaultValue];
|
|
} else {
|
|
instance.config[configProperty.name] = [''];
|
|
}
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
for (var i=0 ; i<$scope.ldapVendors.length ; i++) {
|
|
if ($scope.ldapVendors[i].id === instance.config['vendor'][0]) {
|
|
$scope.vendorName = $scope.ldapVendors[i].name;
|
|
}
|
|
};
|
|
|
|
|
|
|
|
}
|
|
if (instance.config && instance.config['importEnabled']) {
|
|
$scope.showSync = instance.config['importEnabled'][0] == 'true';
|
|
} else {
|
|
$scope.showSync = true;
|
|
}
|
|
|
|
$scope.lastVendor = instance.config['vendor'][0];
|
|
}
|
|
|
|
initUserStorageSettings();
|
|
$scope.instance = angular.copy(instance);
|
|
$scope.realm = realm;
|
|
|
|
$scope.$watch('instance', function() {
|
|
if (!angular.equals($scope.instance, instance)) {
|
|
$scope.changed = true;
|
|
}
|
|
|
|
if (!angular.equals($scope.instance.config['vendor'][0], $scope.lastVendor)) {
|
|
console.log("LDAP vendor changed. Previous=" + $scope.lastVendor + " New=" + $scope.instance.config['vendor'][0]);
|
|
$scope.lastVendor = $scope.instance.config['vendor'][0];
|
|
|
|
if ($scope.lastVendor === "ad") {
|
|
$scope.instance.config['usernameLDAPAttribute'][0] = "cn";
|
|
$scope.instance.config['userObjectClasses'][0] = "person, organizationalPerson, user";
|
|
} else {
|
|
$scope.instance.config['usernameLDAPAttribute'][0] = "uid";
|
|
$scope.instance.config['userObjectClasses'][0] = "inetOrgPerson, organizationalPerson";
|
|
}
|
|
|
|
$scope.instance.config['rdnLDAPAttribute'][0] = $scope.instance.config['usernameLDAPAttribute'][0];
|
|
|
|
var vendorToUUID = {
|
|
rhds: "nsuniqueid",
|
|
tivoli: "uniqueidentifier",
|
|
edirectory: "guid",
|
|
ad: "objectGUID",
|
|
other: "entryUUID"
|
|
};
|
|
$scope.instance.config['uuidLDAPAttribute'][0] = vendorToUUID[$scope.lastVendor];
|
|
}
|
|
|
|
|
|
}, true);
|
|
|
|
$scope.$watch('fullSyncEnabled', function(newVal, oldVal) {
|
|
if (oldVal == newVal) {
|
|
return;
|
|
}
|
|
|
|
$scope.instance.config['fullSyncPeriod'][0] = $scope.fullSyncEnabled ? "604800" : "-1";
|
|
$scope.changed = true;
|
|
});
|
|
|
|
$scope.$watch('changedSyncEnabled', function(newVal, oldVal) {
|
|
if (oldVal == newVal) {
|
|
return;
|
|
}
|
|
|
|
$scope.instance.config['changedSyncPeriod'][0] = $scope.changedSyncEnabled ? "86400" : "-1";
|
|
$scope.changed = true;
|
|
});
|
|
|
|
|
|
$scope.save = function() {
|
|
$scope.changed = false;
|
|
if (!$scope.instance.config['batchSizeForSync'] || !parseInt($scope.instance.config['batchSizeForSync'][0])) {
|
|
$scope.instance.config['batchSizeForSync'] = [ DEFAULT_BATCH_SIZE ];
|
|
} else {
|
|
$scope.instance.config['batchSizeForSync'][0] = parseInt($scope.instance.config.batchSizeForSync).toString();
|
|
}
|
|
|
|
if ($scope.create) {
|
|
Components.save({realm: realm.realm}, $scope.instance, function (data, headers) {
|
|
var l = headers().location;
|
|
var id = l.substring(l.lastIndexOf("/") + 1);
|
|
|
|
$location.url("/realms/" + realm.realm + "/user-storage/providers/" + $scope.instance.providerId + "/" + id);
|
|
Notifications.success("The provider has been created.");
|
|
});
|
|
} else {
|
|
Components.update({realm: realm.realm,
|
|
componentId: instance.id
|
|
},
|
|
$scope.instance, function () {
|
|
$route.reload();
|
|
Notifications.success("The provider has been updated.");
|
|
});
|
|
}
|
|
};
|
|
|
|
$scope.reset = function() {
|
|
$route.reload();
|
|
};
|
|
|
|
$scope.cancel = function() {
|
|
if ($scope.create) {
|
|
$location.url("/realms/" + realm.realm + "/user-federation");
|
|
} else {
|
|
$route.reload();
|
|
}
|
|
};
|
|
|
|
$scope.triggerFullSync = function() {
|
|
console.log('GenericCtrl: triggerFullSync');
|
|
triggerSync('triggerFullSync');
|
|
}
|
|
|
|
$scope.triggerChangedUsersSync = function() {
|
|
console.log('GenericCtrl: triggerChangedUsersSync');
|
|
triggerSync('triggerChangedUsersSync');
|
|
}
|
|
|
|
|
|
function triggerSync(action) {
|
|
UserStorageOperations.sync.save({ action: action, realm: $scope.realm.realm, componentId: $scope.instance.id }, {}, function(syncResult) {
|
|
$route.reload();
|
|
Notifications.success("Sync of users finished successfully. " + syncResult.status);
|
|
}, function() {
|
|
$route.reload();
|
|
Notifications.error("Error during sync of users");
|
|
});
|
|
}
|
|
$scope.removeImportedUsers = function() {
|
|
UserStorageOperations.removeImportedUsers.save({ realm: $scope.realm.realm, componentId: $scope.instance.id }, {}, function(syncResult) {
|
|
$route.reload();
|
|
Notifications.success("Remove imported users finished successfully. ");
|
|
}, function() {
|
|
$route.reload();
|
|
Notifications.error("Error during remove");
|
|
});
|
|
};
|
|
$scope.unlinkUsers = function() {
|
|
UserStorageOperations.unlinkUsers.save({ realm: $scope.realm.realm, componentId: $scope.instance.id }, {}, function(syncResult) {
|
|
$route.reload();
|
|
Notifications.success("Unlink of users finished successfully. ");
|
|
}, function() {
|
|
$route.reload();
|
|
Notifications.error("Error during unlink");
|
|
});
|
|
};
|
|
var initConnectionTest = function(testAction, ldapConfig) {
|
|
return {
|
|
action: testAction,
|
|
realm: $scope.realm.realm,
|
|
connectionUrl: ldapConfig.connectionUrl,
|
|
bindDn: ldapConfig.bindDn,
|
|
bindCredential: ldapConfig.bindCredential,
|
|
useTruststoreSpi: ldapConfig.useTruststoreSpi,
|
|
connectionTimeout: ldapConfig.connectionTimeout,
|
|
componentId: instance.id
|
|
};
|
|
};
|
|
|
|
$scope.testConnection = function() {
|
|
console.log('LDAPCtrl: testConnection');
|
|
RealmLDAPConnectionTester.get(initConnectionTest("testConnection", $scope.instance.config), function() {
|
|
Notifications.success("LDAP connection successful.");
|
|
}, function() {
|
|
Notifications.error("Error when trying to connect to LDAP. See server.log for details.");
|
|
});
|
|
}
|
|
|
|
$scope.testAuthentication = function() {
|
|
console.log('LDAPCtrl: testAuthentication');
|
|
RealmLDAPConnectionTester.get(initConnectionTest("testAuthentication", $scope.instance.config), function() {
|
|
Notifications.success("LDAP authentication successful.");
|
|
}, function() {
|
|
Notifications.error("LDAP authentication failed. See server.log for details");
|
|
});
|
|
}
|
|
|
|
|
|
|
|
});
|
|
|
|
module.controller('LDAPTabCtrl', function(Dialog, $scope, Current, Notifications, $location) {
|
|
$scope.removeUserFederation = function() {
|
|
Dialog.confirmDelete($scope.instance.name, 'ldap provider', function() {
|
|
$scope.instance.$remove({
|
|
realm : Current.realm.realm,
|
|
componentId : $scope.instance.id
|
|
}, function() {
|
|
$location.url("/realms/" + Current.realm.realm + "/user-federation");
|
|
Notifications.success("The provider has been deleted.");
|
|
});
|
|
});
|
|
};
|
|
});
|
|
|
|
|
|
module.controller('LDAPMapperListCtrl', function($scope, $location, Notifications, $route, Dialog, realm, provider, mappers) {
|
|
console.log('LDAPMapperListCtrl');
|
|
|
|
$scope.realm = realm;
|
|
$scope.provider = provider;
|
|
$scope.instance = provider;
|
|
|
|
$scope.mappers = mappers;
|
|
|
|
});
|
|
|
|
module.controller('LDAPMapperCtrl', function($scope, $route, realm, provider, mapperTypes, mapper, clients, Components, LDAPMapperSync, Notifications, Dialog, $location) {
|
|
console.log('LDAPMapperCtrl');
|
|
$scope.realm = realm;
|
|
$scope.provider = provider;
|
|
$scope.clients = clients;
|
|
$scope.create = false;
|
|
$scope.changed = false;
|
|
|
|
for (var i = 0; i < mapperTypes.length; i++) {
|
|
console.log('mapper.providerId: ' + mapper.providerId);
|
|
console.log('mapperTypes[i].id ' + mapperTypes[i].id);
|
|
if (mapperTypes[i].id == mapper.providerId) {
|
|
$scope.mapperType = mapperTypes[i];
|
|
break;
|
|
}
|
|
}
|
|
|
|
if ($scope.mapperType.properties) {
|
|
|
|
for (var i = 0; i < $scope.mapperType.properties.length; i++) {
|
|
var configProperty = $scope.mapperType.properties[i];
|
|
if (!mapper.config[configProperty.name]) {
|
|
if (configProperty.defaultValue) {
|
|
mapper.config[configProperty.name] = [configProperty.defaultValue];
|
|
} else {
|
|
mapper.config[configProperty.name] = [''];
|
|
}
|
|
}
|
|
|
|
}
|
|
}
|
|
$scope.mapper = angular.copy(mapper);
|
|
|
|
|
|
$scope.$watch('mapper', function() {
|
|
if (!angular.equals($scope.mapper, mapper)) {
|
|
$scope.changed = true;
|
|
}
|
|
}, true);
|
|
|
|
$scope.save = function() {
|
|
Components.update({realm: realm.realm,
|
|
componentId: mapper.id
|
|
},
|
|
$scope.mapper, function () {
|
|
$route.reload();
|
|
Notifications.success("The mapper has been updated.");
|
|
});
|
|
};
|
|
|
|
$scope.reset = function() {
|
|
$scope.mapper = angular.copy(mapper);
|
|
$scope.changed = false;
|
|
};
|
|
|
|
$scope.remove = function() {
|
|
Dialog.confirmDelete($scope.mapper.name, 'ldap mapper', function() {
|
|
Components.remove({
|
|
realm : realm.realm,
|
|
componentId : mapper.id
|
|
}, function() {
|
|
$location.url("/realms/" + realm.realm + '/ldap-mappers/' + provider.id);
|
|
Notifications.success("The provider has been deleted.");
|
|
});
|
|
});
|
|
};
|
|
|
|
$scope.triggerFedToKeycloakSync = function() {
|
|
triggerMapperSync("fedToKeycloak")
|
|
}
|
|
|
|
$scope.triggerKeycloakToFedSync = function() {
|
|
triggerMapperSync("keycloakToFed");
|
|
}
|
|
|
|
function triggerMapperSync(direction) {
|
|
LDAPMapperSync.save({ direction: direction, realm: realm.realm, parentId: provider.id, mapperId : $scope.mapper.id }, {}, function(syncResult) {
|
|
Notifications.success("Data synced successfully. " + syncResult.status);
|
|
}, function(error) {
|
|
Notifications.error(error.data.errorMessage);
|
|
});
|
|
}
|
|
|
|
});
|
|
|
|
module.controller('LDAPMapperCreateCtrl', function($scope, realm, provider, mapperTypes, clients, Components, Notifications, Dialog, $location) {
|
|
console.log('LDAPMapperCreateCtrl');
|
|
$scope.realm = realm;
|
|
$scope.provider = provider;
|
|
$scope.clients = clients;
|
|
$scope.create = true;
|
|
$scope.mapper = { config: {}};
|
|
$scope.mapperTypes = mapperTypes;
|
|
$scope.mapperType = null;
|
|
$scope.changed = true;
|
|
|
|
$scope.$watch('mapperType', function() {
|
|
if ($scope.mapperType != null) {
|
|
$scope.mapper.config = {};
|
|
if ($scope.mapperType.properties) {
|
|
|
|
for (var i = 0; i < $scope.mapperType.properties.length; i++) {
|
|
var configProperty = $scope.mapperType.properties[i];
|
|
if (!$scope.mapper.config[configProperty.name]) {
|
|
if (configProperty.defaultValue) {
|
|
$scope.mapper.config[configProperty.name] = [configProperty.defaultValue];
|
|
} else {
|
|
$scope.mapper.config[configProperty.name] = [''];
|
|
}
|
|
}
|
|
|
|
}
|
|
}
|
|
}
|
|
}, true);
|
|
|
|
$scope.save = function() {
|
|
if ($scope.mapperType == null) {
|
|
Notifications.error("You need to select mapper type!");
|
|
return;
|
|
}
|
|
|
|
$scope.mapper.providerId = $scope.mapperType.id;
|
|
$scope.mapper.providerType = 'org.keycloak.storage.ldap.mappers.LDAPStorageMapper';
|
|
$scope.mapper.parentId = provider.id;
|
|
|
|
Components.save({realm: realm.realm}, $scope.mapper, function (data, headers) {
|
|
var l = headers().location;
|
|
var id = l.substring(l.lastIndexOf("/") + 1);
|
|
|
|
$location.url("/realms/" + realm.realm + "/ldap-mappers/" + $scope.mapper.parentId + "/mappers/" + id);
|
|
Notifications.success("The mapper has been created.");
|
|
});
|
|
};
|
|
|
|
$scope.reset = function() {
|
|
$location.url("/realms/" + realm.realm + '/ldap-mappers/' + provider.id);
|
|
};
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|