* feat(custom-templates): introduce types * feat(custom-templates): introduce data layer service * feat(custom-templates): introduce http handler * feat(custom-templates): create routes and view stubs * feat(custom-templates): add create custom template ui * feat(custom-templates): add json keys * feat(custom-templates): introduce custom templates list page * feat(custom-templates): introduce update page * feat(stack): create template from stack * feat(stacks): create stack from custom template * feat(custom-templates): disable edit/delete of templates * fix(custom-templates): fail update on non admin/owner * fix(custom-templates): add ng-inject decorator * chore(plop): revert template * feat(stacks): remove actions column * feat(stack): add button to create template from stack * feat(stacks): add empty state for templates * feat(custom-templates): show templates in a list * feat(custom-template): replace table with list * feat(custom-templates): move create template button * refactor(custom-templates): introduce more fields * feat(custom-templates): use stack type when creating template * feat(custom-templates): use same type as stack * feat(custom-templates): add edit and delete buttons to template item * feat(custom-templates): customize stack before deploy * feat(stack): show template details * feat(custom-templates): move customize * feat(custom-templates): create description required * fix(template): show platform icon * fix(custom-templates): show spinner when creating stack * feat(custom-templates): prevent user from edit templates * feat(custom-templates): use resource control for custom templates * feat(custom-templates): show created templates * feat(custom-templates): filter templates by stack type * fix(custom-templates): create swarm or standalone stack * feat(stacks): filter templates by type * feat(resource-control): disable resource control on public * feat(custom-template): apply access control on edit * feat(custom-template): add form validation * feat(stack): disable create custom template from external task * refactor(custom-templates): create template from file and type * feat(templates): introduce a file handler that returns template docker file * feat(template): introduce template duplication * feat(custom-template): enforce unique template name * fix(template): rename copy button * fix(custom-template): clear access control selection between templates * fix(custom-templates): show required fields * refactor(filesystem): use a constant for temp path
86 lines
2.7 KiB
JavaScript
86 lines
2.7 KiB
JavaScript
import _ from 'lodash-es';
|
|
import { ResourceControlOwnership as RCO } from 'Portainer/models/resourceControl/resourceControlOwnership';
|
|
|
|
angular.module('portainer.app').controller('porAccessControlFormController', [
|
|
'$q',
|
|
'UserService',
|
|
'TeamService',
|
|
'Notifications',
|
|
'Authentication',
|
|
'ResourceControlService',
|
|
function ($q, UserService, TeamService, Notifications, Authentication, ResourceControlService) {
|
|
var ctrl = this;
|
|
|
|
ctrl.RCO = RCO;
|
|
|
|
ctrl.availableTeams = [];
|
|
ctrl.availableUsers = [];
|
|
|
|
function setOwnership(resourceControl, isAdmin) {
|
|
if (isAdmin && resourceControl.Ownership === RCO.PRIVATE) {
|
|
ctrl.formData.Ownership = RCO.RESTRICTED;
|
|
} else {
|
|
ctrl.formData.Ownership = resourceControl.Ownership;
|
|
}
|
|
|
|
if (ctrl.formData.Ownership === RCO.PUBLIC) {
|
|
ctrl.formData.AccessControlEnabled = false;
|
|
}
|
|
}
|
|
|
|
function setAuthorizedUsersAndTeams(authorizedUsers, authorizedTeams) {
|
|
angular.forEach(ctrl.availableUsers, function (user) {
|
|
var found = _.find(authorizedUsers, { Id: user.Id });
|
|
if (found) {
|
|
user.selected = true;
|
|
}
|
|
});
|
|
|
|
angular.forEach(ctrl.availableTeams, function (team) {
|
|
var found = _.find(authorizedTeams, { Id: team.Id });
|
|
if (found) {
|
|
team.selected = true;
|
|
}
|
|
});
|
|
}
|
|
|
|
function initComponent() {
|
|
var isAdmin = Authentication.isAdmin();
|
|
ctrl.isAdmin = isAdmin;
|
|
|
|
if (isAdmin) {
|
|
ctrl.formData.Ownership = ctrl.RCO.ADMINISTRATORS;
|
|
}
|
|
|
|
$q.all({
|
|
availableTeams: TeamService.teams(),
|
|
availableUsers: isAdmin ? UserService.users(false) : [],
|
|
})
|
|
.then(function success(data) {
|
|
ctrl.availableUsers = _.orderBy(data.availableUsers, 'Username', 'asc');
|
|
|
|
var availableTeams = _.orderBy(data.availableTeams, 'Name', 'asc');
|
|
ctrl.availableTeams = availableTeams;
|
|
if (!isAdmin && availableTeams.length === 1) {
|
|
ctrl.formData.AuthorizedTeams = availableTeams;
|
|
}
|
|
|
|
return $q.when(ctrl.resourceControl && ResourceControlService.retrieveOwnershipDetails(ctrl.resourceControl));
|
|
})
|
|
.then(function success(data) {
|
|
if (data) {
|
|
var authorizedUsers = data.authorizedUsers;
|
|
var authorizedTeams = data.authorizedTeams;
|
|
setOwnership(ctrl.resourceControl, isAdmin);
|
|
setAuthorizedUsersAndTeams(authorizedUsers, authorizedTeams);
|
|
}
|
|
})
|
|
.catch(function error(err) {
|
|
Notifications.error('Failure', err, 'Unable to retrieve access control information');
|
|
});
|
|
}
|
|
|
|
initComponent();
|
|
},
|
|
]);
|