Prevent password updates for SAML and LDAP users#9999
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## 4.19 #9999 +/- ##
============================================
- Coverage 15.10% 4.30% -10.81%
============================================
Files 5404 366 -5038
Lines 473502 29541 -443961
Branches 57733 5172 -52561
============================================
- Hits 71543 1272 -70271
+ Misses 393961 28125 -365836
+ Partials 7998 144 -7854
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
|
@blueorangutan package |
|
@bernardodemarco a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
|
Packaging result [SF]: ✔️ el8 ✔️ el9 ✔️ debian ✔️ suse15. SL-JID 11612 |
|
@blueorangutan test |
|
@rohityadavcloud a [SL] Trillian-Jenkins test job (ol8 mgmt + kvm-ol8) has been kicked to run smoke tests |
|
[SF] Trillian test result (tid-11830)
|
|
I am merging forward 4.19 on 4.20 and will merge this as soon as the conflicts are taken care of. |
* 4.20: UI: Fix userdata and load balancer selection (#10016) Prevent password updates for SAML and LDAP users (#9999) cloudstack-migrate-databases: sql AND added (#10033) engine/schema: move SQLs to 4.20.0 to 4.20.1 upgrade (#10018) Remove user from project before deletion (#10008) Simplify validation for creating volume templates via UI (#9828)
* 4.20: UI: Fix userdata and load balancer selection (apache#10016) Prevent password updates for SAML and LDAP users (apache#9999) cloudstack-migrate-databases: sql AND added (apache#10033) engine/schema: move SQLs to 4.20.0 to 4.20.1 upgrade (apache#10018) Remove user from project before deletion (apache#10008) Simplify validation for creating volume templates via UI (apache#9828)

Description
Currently, CloudStack does not support dual authentication methods for SAML users. If their source is equal to
SAMLorSAMLDISABLED, then they're not able to login with a username and password. However, when executing theupdateUserAPI to update their password, the password is changed in the database, even though username/password authentication is unsupported for these users.Regarding LDAP users, password updates directly through CloudStack should also not be allowed. Therefore, this PR addresses these issues by providing a clear error message when SAML or LDAP users attempt to change their password via the
updateUserAPI.Fixes #9933
Types of changes
Feature/Enhancement Scale or Bug Severity
Bug Severity
Screenshots (if appropriate):
How Has This Been Tested?
SAMLDISABLEDuser's password also triggers the error message.