mirror of
https://github.com/goharbor/harbor.git
synced 2024-11-13 22:05:21 +01:00
4bc7444602
1. Verify LDAP group admin in UI; 2. Update LDAP group admin need to verify the AdminRoleInAuth, get current user will return this field as true. Signed-off-by: danfengliu <danfengl@vmware.com>
79 lines
3.7 KiB
Python
79 lines
3.7 KiB
Python
# -*- coding: utf-8 -*-
|
|
|
|
import base
|
|
import swagger_client
|
|
from swagger_client.rest import ApiException
|
|
|
|
def set_configurations(client, expect_status_code = 200, expect_response_body = None, **config):
|
|
conf = swagger_client.Configurations()
|
|
|
|
if "project_creation_restriction" in config:
|
|
conf.project_creation_restriction = config.get("project_creation_restriction")
|
|
if "token_expiration" in config:
|
|
conf.token_expiration = config.get("token_expiration")
|
|
if "ldap_filter" in config:
|
|
conf.ldap_filter = config.get("ldap_filter")
|
|
if "ldap_group_attribute_name" in config:
|
|
conf.ldap_group_attribute_name = config.get("ldap_group_attribute_name")
|
|
if "ldap_group_base_dn" in config:
|
|
conf.ldap_group_base_dn = config.get("ldap_group_base_dn")
|
|
if "ldap_group_search_filter" in config:
|
|
conf.ldap_group_search_filter = config.get("ldap_group_search_filter")
|
|
if "ldap_group_search_scope" in config:
|
|
conf.ldap_group_search_scope = config.get("ldap_group_search_scope")
|
|
if "ldap_group_admin_dn" in config:
|
|
conf.ldap_group_admin_dn = config.get("ldap_group_admin_dn")
|
|
|
|
try:
|
|
_, status_code, _ = client.configurations_put_with_http_info(conf)
|
|
except ApiException as e:
|
|
base._assert_status_code(expect_status_code, e.status)
|
|
if expect_response_body is not None:
|
|
base._assert_status_body(expect_response_body, e.body)
|
|
return
|
|
|
|
base._assert_status_code(expect_status_code, status_code)
|
|
|
|
class Configurations(base.Base):
|
|
def get_configurations(self, item_name = None, expect_status_code = 200, expect_response_body = None, **kwargs):
|
|
client = self._get_client(**kwargs)
|
|
|
|
try:
|
|
data, status_code, _ = client.configurations_get_with_http_info()
|
|
except ApiException as e:
|
|
base._assert_status_code(expect_status_code, e.status)
|
|
if expect_response_body is not None:
|
|
base._assert_status_body(expect_response_body, e.body)
|
|
return
|
|
|
|
base._assert_status_code(expect_status_code, status_code)
|
|
base._assert_status_code(200, status_code)
|
|
|
|
if item_name is not None:
|
|
return {
|
|
'project_creation_restriction': data.project_creation_restriction.value,
|
|
'token_expiration': data.token_expiration.value,
|
|
}.get(item_name,'Get Configutation Error: Item name {} is not exist'.format(item_name))
|
|
|
|
return data
|
|
|
|
def set_configurations_of_project_creation_restriction(self, project_creation_restriction, expect_status_code = 200, **kwargs):
|
|
client = self._get_client(**kwargs)
|
|
|
|
config=dict(project_creation_restriction=project_creation_restriction)
|
|
set_configurations(client, expect_status_code = expect_status_code, **config)
|
|
|
|
def set_configurations_of_token_expiration(self, token_expiration, expect_status_code = 200, **kwargs):
|
|
client = self._get_client(**kwargs)
|
|
|
|
config=dict(token_expiration=token_expiration)
|
|
set_configurations(client, expect_status_code = expect_status_code, **config)
|
|
|
|
def set_configurations_of_ldap(self, ldap_filter=None, ldap_group_attribute_name=None,
|
|
ldap_group_base_dn=None, ldap_group_search_filter=None, ldap_group_search_scope=None, ldap_group_admin_dn=None, expect_status_code = 200, **kwargs):
|
|
client = self._get_client(**kwargs)
|
|
config=dict(ldap_filter=ldap_filter, ldap_group_attribute_name=ldap_group_attribute_name,
|
|
ldap_group_base_dn=ldap_group_base_dn, ldap_group_search_filter=ldap_group_search_filter, ldap_group_admin_dn=ldap_group_admin_dn, ldap_group_search_scope=ldap_group_search_scope)
|
|
set_configurations(client, expect_status_code = expect_status_code, **config)
|
|
|