mirror of https://github.com/portainer/portainer
52 lines
1.6 KiB
Go
52 lines
1.6 KiB
Go
package settings
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
httperror "github.com/portainer/libhttp/error"
|
|
"github.com/portainer/libhttp/request"
|
|
"github.com/portainer/libhttp/response"
|
|
portainer "github.com/portainer/portainer/api"
|
|
"github.com/portainer/portainer/api/filesystem"
|
|
)
|
|
|
|
type settingsLDAPCheckPayload struct {
|
|
LDAPSettings portainer.LDAPSettings
|
|
}
|
|
|
|
func (payload *settingsLDAPCheckPayload) Validate(r *http.Request) error {
|
|
return nil
|
|
}
|
|
|
|
// @id SettingsLDAPCheck
|
|
// @summary Test LDAP connectivity
|
|
// @description Test LDAP connectivity using LDAP details
|
|
// @description **Access policy**: administrator
|
|
// @tags settings
|
|
// @security jwt
|
|
// @accept json
|
|
// @param body body settingsLDAPCheckPayload true "details"
|
|
// @success 204 "Success"
|
|
// @failure 400 "Invalid request"
|
|
// @failure 500 "Server error"
|
|
// @router /settings/ldap/check [put]
|
|
func (handler *Handler) settingsLDAPCheck(w http.ResponseWriter, r *http.Request) *httperror.HandlerError {
|
|
var payload settingsLDAPCheckPayload
|
|
err := request.DecodeAndValidateJSONPayload(r, &payload)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusBadRequest, "Invalid request payload", err}
|
|
}
|
|
|
|
if (payload.LDAPSettings.TLSConfig.TLS || payload.LDAPSettings.StartTLS) && !payload.LDAPSettings.TLSConfig.TLSSkipVerify {
|
|
caCertPath, _ := handler.FileService.GetPathForTLSFile(filesystem.LDAPStorePath, portainer.TLSFileCA)
|
|
payload.LDAPSettings.TLSConfig.TLSCACertPath = caCertPath
|
|
}
|
|
|
|
err = handler.LDAPService.TestConnectivity(&payload.LDAPSettings)
|
|
if err != nil {
|
|
return &httperror.HandlerError{http.StatusInternalServerError, "Unable to connect to LDAP server", err}
|
|
}
|
|
|
|
return response.Empty(w)
|
|
}
|