Commit Graph

22 Commits

Author SHA1 Message Date
Cody Jackson b6d170cfd1 Ensuring that secrets are added to the new auth model
The newly created auth model ends up missing secrets so we add them back before we attempt to resave the auth model.

https://github.com/rancher/dashboard/issues/3734
2021-08-09 14:31:10 -07:00
Richard Cox 9f023f3408 Reload Auth Config before saving new principal id
- When setting up an auth provider the config is tested and the user validates against said provider
- We then fetch the principals to find the authenticated user and save it in the auth config
- If however the config is updated by the backend as part of the test process we save a stale version overwriting those changes
- So ensure we reload the resource before proceeding
2021-07-28 20:34:16 +01:00
Richard Cox b0c96cd9e5 Ensure we fetch `server-url` in auth-config correctly
- url part of `management/find` was incorrect
- url was never used as we normally have the resource, however there's some kind of log in bug #3160 where settings are missing, including server-url
- so server-url was never fetched... dodgy url threw exception... model was never fetched
- we don't have a pattern for $fetchState.error anywhere, which we could use here when fetch failed instead of continueing
- addresses #3137
2021-06-04 10:59:34 +01:00
Richard Cox 488c7aeada Fix association of 'me' principal to OIDC provider
- When enabling oidc the principal tagged with me should be added to the providers `allowedPrincipalIds` collection
- This wasn't happenening due to a code change (`me` --> `principal`)
2021-06-02 11:27:11 +01:00
Nancy Butler c84e68c7dd reload principal when auth provider enabled/disabled 2021-06-01 07:51:27 -07:00
Richard Cox f5539436d2 Add Keycloak OIDC provider
- Much of the grunt work is generic OIDC

Also fixed
- store's principalId was not updated after user enables any auth provider
- Colour of InfoBox title in dark mode
- Issue where some kind of errors when enabling provider were shown as an empty box (exceptionToErrorsArray is now used, which also uses a better catch all stringify)
- An issue where enabling and disabling a provider in the same visit meant lost defaults
- An issue where Auth / Groups would not display (async part had been removed)
- Resource instance validation would show all fields as invalid once one field had failed
2021-05-25 11:15:32 +01:00
Nancy Butler 9f106198c4 ignore validation for oauth, service acct cred googleoauth 2021-04-26 11:49:42 -07:00
Neil MacDougall 8646dfc9e9
Fix typo in comment 2021-04-13 20:42:55 +01:00
Neil MacDougall 0f0d59ecc2 Fix a few auth presentation issues 2021-04-13 20:36:22 +01:00
Nancy Butler 584ea88550 saml placeholders, shibb after disable 2021-04-08 12:30:44 -07:00
Nancy Butler d58d8acd3c ldap defaults for shibboleth 2021-03-17 10:44:10 -07:00
Nancy Butler 85609db2b9 ldap component issues
show github info on edit

google oauth inputs
2021-03-02 05:36:03 -07:00
Nancy Butler e572ac137c auth component issues
fix google save action
2021-02-19 11:43:01 -07:00
Nancy Butler c5f25cfae4 azuread testandenable format 2021-02-12 13:03:45 -07:00
Nancy Butler 034a3754d2 fix edit oauth config 2021-02-12 10:08:01 -07:00
Nancy Butler e1d5bea8d1 reconcile azuread bad merge 2021-02-11 14:48:19 -07:00
Nancy Butler 05823653f0 auth config cancel button
fix edit auth config action

reset changes when cancelling edit auth config
2021-02-11 08:06:11 -07:00
Nancy Butler fc4317f6cf add users/groups to saml 2021-02-11 08:05:31 -07:00
Cody Jackson 1bf3efd295 Implementing AzureAD auth
rancher/dashboard#2117
2021-02-09 11:53:48 -07:00
Nancy Butler 7a986578b2 do not logout/redirect on auth failure with 401
auth cleanup, edit config btn

hide entityid for okta
2021-02-09 09:06:15 -07:00
Nancy Butler 4f92b0218f fix ldap/saml add users and groups 2021-02-02 12:01:42 -07:00
Nancy Butler 2cce6462b0 saml ldap login buttons 2021-01-29 12:16:52 -07:00