forked from cloudfoundry/cli
-
Notifications
You must be signed in to change notification settings - Fork 0
/
create_user_command.go
96 lines (78 loc) · 3.09 KB
/
create_user_command.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
package v6
import (
"strings"
"code.cloudfoundry.org/cli/actor/sharedaction"
"code.cloudfoundry.org/cli/actor/v2action"
"code.cloudfoundry.org/cli/api/uaa"
"code.cloudfoundry.org/cli/command"
"code.cloudfoundry.org/cli/command/flag"
"code.cloudfoundry.org/cli/command/translatableerror"
"code.cloudfoundry.org/cli/command/v6/shared"
)
//go:generate counterfeiter . CreateUserActor
type CreateUserActor interface {
CreateUser(username string, password string, origin string) (v2action.User, v2action.Warnings, error)
}
type CreateUserCommand struct {
Args flag.CreateUser `positional-args:"yes"`
Origin string `long:"origin" description:"Origin for mapping a user account to a user in an external identity provider"`
usage interface{} `usage:"CF_NAME create-user USERNAME PASSWORD\n CF_NAME create-user USERNAME --origin ORIGIN\n\nEXAMPLES:\n cf create-user j.smith@example.com S3cr3t # internal user\n cf create-user j.smith@example.com --origin ldap # LDAP user\n cf create-user j.smith@example.com --origin provider-alias # SAML or OpenID Connect federated user"`
relatedCommands interface{} `related_commands:"passwd, set-org-role, set-space-role"`
UI command.UI
Config command.Config
SharedActor command.SharedActor
Actor CreateUserActor
}
func (cmd *CreateUserCommand) Setup(config command.Config, ui command.UI) error {
cmd.UI = ui
cmd.Config = config
cmd.SharedActor = sharedaction.NewActor(config)
ccClient, uaaClient, err := shared.GetNewClientsAndConnectToCF(config, ui)
if err != nil {
return err
}
cmd.Actor = v2action.NewActor(ccClient, uaaClient, config)
return nil
}
func (cmd *CreateUserCommand) Execute(args []string) error {
// cmd.Args.Password is intentionally set to a pointer such that we can check
// if it is passed (otherwise we can't differentiate between the default
// empty string and a passed in empty string.
var password string
if (cmd.Origin == "" || strings.ToLower(cmd.Origin) == "uaa") && cmd.Args.Password == nil {
return translatableerror.RequiredArgumentError{
ArgumentName: "PASSWORD",
}
}
if cmd.Args.Password != nil {
password = *cmd.Args.Password
} else {
password = ""
}
err := cmd.SharedActor.CheckTarget(false, false)
if err != nil {
return err
}
cmd.UI.DisplayTextWithFlavor("Creating user {{.TargetUser}}...", map[string]interface{}{
"TargetUser": cmd.Args.Username,
})
_, warnings, err := cmd.Actor.CreateUser(cmd.Args.Username, password, cmd.Origin)
cmd.UI.DisplayWarnings(warnings)
if err != nil {
if _, ok := err.(uaa.ConflictError); ok {
cmd.UI.DisplayWarning("user {{.User}} already exists", map[string]interface{}{
"User": cmd.Args.Username,
})
} else {
cmd.UI.DisplayTextWithFlavor("Error creating user {{.User}}.", map[string]interface{}{
"User": cmd.Args.Username,
})
return err
}
}
cmd.UI.DisplayOK()
cmd.UI.DisplayText("TIP: Assign roles with '{{.BinaryName}} set-org-role' and '{{.BinaryName}} set-space-role'.", map[string]interface{}{
"BinaryName": cmd.Config.BinaryName(),
})
return nil
}