all lists on lists.proxmox.com
 help / color / mirror / Atom feed
From: Shannon Sterz <s.sterz@proxmox.com>
To: pdm-devel@lists.proxmox.com
Subject: [pdm-devel] [PATCH yew-comp 3/5] auth_view/auth_edit_ldap: add support for active directory realms
Date: Tue, 16 Sep 2025 16:48:20 +0200	[thread overview]
Message-ID: <20250916144827.551806-5-s.sterz@proxmox.com> (raw)
In-Reply-To: <20250916144827.551806-1-s.sterz@proxmox.com>

by adapting the existing AuthEditLdap component to allow editing AD
realms as well. after all, AD realms are just LDAP realms with some
peculiarities.

Signed-off-by: Shannon Sterz <s.sterz@proxmox.com>
---
 src/auth_edit_ldap.rs | 56 ++++++++++++++++++++++++++++++-------------
 src/auth_view.rs      | 54 ++++++++++++++++++++++++++++++++++-------
 src/utils.rs          |  3 ++-
 3 files changed, 87 insertions(+), 26 deletions(-)

diff --git a/src/auth_edit_ldap.rs b/src/auth_edit_ldap.rs
index 4671a1e..162f828 100644
--- a/src/auth_edit_ldap.rs
+++ b/src/auth_edit_ldap.rs
@@ -34,6 +34,11 @@ pub struct AuthEditLDAP {
     #[builder(IntoPropValue, into_prop_value)]
     #[prop_or_default]
     pub realm: Option<AttrValue>,
+
+    /// Whether this panel is for an Active Directory realm
+    #[builder(IntoPropValue, into_prop_value)]
+    #[prop_or_default]
+    pub ad_realm: Option<bool>,
 }
 
 impl Default for AuthEditLDAP {
@@ -162,7 +167,7 @@ fn render_general_form(form_ctx: FormContext, props: AuthEditLDAP) -> Html {
         .map(|v| matches!(v.as_str(), Some("ldap+starttls") | Some("ldaps")))
         .unwrap_or(false);
 
-    InputPanel::new()
+    let mut input_panel = InputPanel::new()
         .class(Flex::Fill)
         .class(Overflow::Auto)
         .padding(4)
@@ -175,22 +180,28 @@ fn render_general_form(form_ctx: FormContext, props: AuthEditLDAP) -> Html {
                 .submit(!is_edit),
         )
         .with_right_field(tr!("Server"), Field::new().name("server1").required(true))
-        .with_field(
-            tr!("Base Domain Name"),
-            Field::new()
-                .name("base-dn")
-                .required(true)
-                .placeholder("cn=Users,dc=company,dc=net"),
-        )
         .with_field(tr!("Default Realm"), Checkbox::new().name("default"));
+
+    if !props.ad_realm.unwrap_or_default() {
+        input_panel = input_panel
+            .with_field(
+                tr!("Base Domain Name"),
+                Field::new()
+                    .name("base-dn")
+                    .required(true)
+                    .placeholder("cn=Users,dc=company,dc=net"),
+            )
+            .with_field(
+                tr!("User Attribute Name"),
+                Field::new()
+                    .name("user-attr")
+                    .required(true)
+                    .placeholder("uid / sAMAccountName"),
+            )
+    }
+
+    input_panel
         .with_right_field(tr!("Fallback Server"), Field::new().name("server2"))
-        .with_field(
-            tr!("User Attribute Name"),
-            Field::new()
-                .name("user-attr")
-                .required(true)
-                .placeholder("uid / sAMAccountName"),
-        )
         .with_right_field(
             tr!("Port"),
             Number::<u16>::new()
@@ -228,7 +239,12 @@ fn render_general_form(form_ctx: FormContext, props: AuthEditLDAP) -> Html {
                 .name("bind-dn")
                 .required(!anonymous_search)
                 .disabled(anonymous_search)
-                .placeholder("cn=user,dc=company,dc=net"),
+                .placeholder(
+                    props
+                        .ad_realm
+                        .map(|_| "user@company.net")
+                        .unwrap_or("cn=user,dc=company,dc=net"),
+                ),
         )
         .with_right_field(
             tr!("Verify Certificate"),
@@ -274,7 +290,13 @@ impl Component for ProxmoxAuthEditLDAP {
             }
         };
 
-        EditWindow::new(action + ": " + &tr!("LDAP Server"))
+        let title = if props.ad_realm.unwrap_or_default() {
+            tr!("Active Directory Server")
+        } else {
+            tr!("LDAP Server")
+        };
+
+        EditWindow::new(action + ": " + &title)
             .loader(
                 props
                     .realm
diff --git a/src/auth_view.rs b/src/auth_view.rs
index 4d6e143..a70e80b 100644
--- a/src/auth_view.rs
+++ b/src/auth_view.rs
@@ -42,6 +42,11 @@ pub struct AuthView {
     #[builder(IntoPropValue, into_prop_value)]
     #[prop_or_default]
     ldap_base_url: Option<AttrValue>,
+
+    /// Allow to add/edit LDAP entries
+    #[builder(IntoPropValue, into_prop_value)]
+    #[prop_or_default]
+    ad_base_url: Option<AttrValue>,
 }
 
 impl Default for AuthView {
@@ -58,10 +63,12 @@ impl AuthView {
 
 #[derive(PartialEq)]
 pub enum ViewState {
+    AddAd,
     AddLDAP,
     AddOpenID,
     EditOpenID(AttrValue),
     EditLDAP(AttrValue),
+    EditAd(AttrValue),
 }
 
 pub enum Msg {
@@ -146,14 +153,21 @@ impl LoadableComponent for ProxmoxAuthView {
                     Some(info) => info,
                     None => return true,
                 };
-                if props.openid_base_url.is_some() && info.ty == "openid" {
-                    ctx.link()
-                        .change_view(Some(ViewState::EditOpenID(info.realm.clone().into())));
-                }
-                if props.ldap_base_url.is_some() && info.ty == "ldap" {
-                    ctx.link()
-                        .change_view(Some(ViewState::EditLDAP(info.realm.into())));
-                }
+
+                let view = match info.ty.as_str() {
+                    "openid" if props.openid_base_url.is_some() => {
+                        Some(ViewState::EditOpenID(info.realm.into()))
+                    }
+                    "ldap" if props.ldap_base_url.is_some() => {
+                        Some(ViewState::EditLDAP(info.realm.into()))
+                    }
+                    "ad" if props.ad_base_url.is_some() => {
+                        Some(ViewState::EditAd(info.realm.into()))
+                    }
+                    _ => return true,
+                };
+
+                ctx.link().change_view(view);
                 true
             }
             Msg::Sync => {
@@ -182,6 +196,14 @@ impl LoadableComponent for ProxmoxAuthView {
 
         let mut add_menu = Menu::new();
 
+        if props.ad_base_url.is_some() {
+            add_menu.add_item(
+                MenuItem::new(tr!("Active Directory Server"))
+                    .icon_class("fa fa-fw fa-address-book-o")
+                    .on_select(ctx.link().change_view_callback(|_| Some(ViewState::AddAd))),
+            );
+        }
+
         if props.ldap_base_url.is_some() {
             add_menu.add_item(
                 MenuItem::new(tr!("LDAP Server"))
@@ -248,6 +270,22 @@ impl LoadableComponent for ProxmoxAuthView {
         let props = ctx.props();
 
         match view_state {
+            ViewState::AddAd => Some(
+                AuthEditLDAP::new()
+                    .base_url(props.ad_base_url.clone().unwrap())
+                    .on_close(ctx.link().change_view_callback(|_| None))
+                    .ad_realm(true)
+                    .into(),
+            ),
+            ViewState::EditAd(realm) => Some(
+                AuthEditLDAP::new()
+                    .base_url(props.ad_base_url.clone().unwrap())
+                    .realm(realm.clone())
+                    .on_close(ctx.link().change_view_callback(|_| None))
+                    .ad_realm(true)
+                    .into(),
+            ),
+
             ViewState::AddLDAP => Some(
                 AuthEditLDAP::new()
                     .base_url(props.ldap_base_url.clone().unwrap())
diff --git a/src/utils.rs b/src/utils.rs
index bfdbccd..544ed76 100644
--- a/src/utils.rs
+++ b/src/utils.rs
@@ -293,7 +293,8 @@ pub fn get_auth_domain_info(ty: &str) -> Option<AuthDomainInfo> {
             sync: false,
         });
     }
-    if ty == "ldap" {
+
+    if ty == "ldap" || ty == "ad" {
         return Some(AuthDomainInfo {
             ty: ty.to_string(),
             //description: tr!("LDAP Server"),
-- 
2.47.3



_______________________________________________
pdm-devel mailing list
pdm-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pdm-devel


  parent reply	other threads:[~2025-09-16 14:49 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-16 14:48 [pdm-devel] [PATCH datacenter-manager/proxmox/yew-comp 00/11] Add LDAP and AD realm support to Proxmox Datacenter Manager Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH proxmox 1/1] ldap: add types and sync features Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH yew-comp 1/5] auth_view: add default column and allow setting ldap realms as default Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH yew-comp 2/5] utils: add pdm realm to `get_auth_domain_info` Shannon Sterz
2025-09-16 14:48 ` Shannon Sterz [this message]
2025-09-16 14:48 ` [pdm-devel] [PATCH yew-comp 4/5] auth_edit_ldap: add helpers to properly edit ad & ldap realms Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH yew-comp 5/5] auth_view: implement syncing ldap and ad realms Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH datacenter-manager 1/5] config: add domain config plugins for " Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH datacenter-manager 2/5] server: add ldap and active directory authenticators Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH datacenter-manager 3/5] server: api: add api endpoints for configuring ldap & ad realms Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH datacenter-manager 4/5] api/auth: add endpoint to start ldap sync jobs Shannon Sterz
2025-09-16 14:48 ` [pdm-devel] [PATCH datacenter-manager 5/5] ui: add a panel to allow handling realms Shannon Sterz
2025-09-19 10:02 ` [pdm-devel] [PATCH datacenter-manager/proxmox/yew-comp 00/11] Add LDAP and AD realm support to Proxmox Datacenter Manager Christoph Heiss

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250916144827.551806-5-s.sterz@proxmox.com \
    --to=s.sterz@proxmox.com \
    --cc=pdm-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal