From 651110dd3fc540ad6c106446cbc4cabcc190d613 Mon Sep 17 00:00:00 2001 From: dcore94 Date: Wed, 24 Mar 2021 09:28:32 +0100 Subject: [PATCH] first remove possible roles with same name --- templates/role_created.json.j2 | 55 ++++++++++++++++++++++++++++++++-- 1 file changed, 53 insertions(+), 2 deletions(-) diff --git a/templates/role_created.json.j2 b/templates/role_created.json.j2 index d5879fa..e8193ff 100644 --- a/templates/role_created.json.j2 +++ b/templates/role_created.json.j2 @@ -47,6 +47,32 @@ } } }, + { + "name": "LAMBDA_TASK", + "taskReferenceName": "build_delete_role_tasks", + "type": "LAMBDA", + "inputParameters": { + "role" : "${workflow.input.role}", + "vres" : "${get_all_vres.output.body}", + "scriptExpression": "inputs={};tasks=[];for(var i=0;i<$.vres.length;i++)vre=$.vres[i],tasks.push({name:'pyrest',type:'SIMPLE',taskReferenceName:'delete_role_'+i}),inputs['delete_role_'+i]={url:'${init.input.keycloak_admin}/clients/' + vre.id + '/roles/' + $.role,method:'DELETE'),headers:{Authorization:'Bearer ${authorize.output.body.access_token}'}};return {tasks:Java.to(tasks,'java.util.Map[]'),inputs:inputs};" + } + }, + { + "name" : "fork_dynamic", + "type" : "FORK_JOIN_DYNAMIC", + "taskReferenceName" : "parallel_delete_role", + "inputParameters" : { + "tasks" : "${build_delete_role_tasks.output.result.tasks}", + "inputs" : "${build_delete_role_tasks.output.result.inputs}" + }, + "dynamicForkTasksParam": "tasks", + "dynamicForkTasksInputParamName": "inputs" + }, + { + "name" : "join", + "type" : "JOIN", + "taskReferenceName" : "join_parallel_role_deletion" + }, { "name": "LAMBDA_TASK", "taskReferenceName": "build_add_role_tasks", @@ -54,7 +80,7 @@ "inputParameters": { "role" : "${workflow.input.role}", "vres" : "${get_all_vres.output.body}", - "scriptExpression": "inputs={};tasks=[];for(var i=0;i<$.vres.length;i++)vre=$.vres[i],tasks.push({name:'pyrest',type:'SIMPLE',taskReferenceName:'create_role_'+i}),inputs['create_role_'+i]={url:'${init.input.keycloak_admin}/clients/' + vre.id + '/roles',body:{clientRole:true,name:$.role,description: $.role + ' role'},method:'POST', expect:Java.to([201,409],'int[]'),headers:{Authorization:'Bearer ${authorize.output.body.access_token}','Content-Type':'application/json'}};return {tasks:Java.to(tasks,'java.util.Map[]'),inputs:inputs};" + "scriptExpression": "inputs={};tasks=[];for(var i=0;i<$.vres.length;i++)vre=$.vres[i],tasks.push({name:'pyrest',type:'SIMPLE',taskReferenceName:'create_role_'+i}),inputs['create_role_'+i]={url:'${init.input.keycloak_admin}/clients/' + vre.id + '/roles',body:{clientRole:true,name:$.role,description: $.role + ' role'},method:'POST',headers:{Authorization:'Bearer ${authorize.output.body.access_token}','Content-Type':'application/json'}};return {tasks:Java.to(tasks,'java.util.Map[]'),inputs:inputs};" } }, { @@ -93,10 +119,35 @@ "dynamicForkTasksParam": "tasks", "dynamicForkTasksInputParamName": "inputs" }, + { + "name" : "join", + "type" : "JOIN", + "taskReferenceName" : "join_parallel_getting_back" + }, + { + "name": "LAMBDA_TASK", + "taskReferenceName": "build_add_policy_tasks", + "type": "LAMBDA", + "inputParameters": { + "roles" : "${join_parallel_getting_back.output[*].body}", + "scriptExpression": "inputs={},tasks=[];for(var i=0;i<$.roles.length;i++)r=$.roles[i],k='add-'+r.name,tasks.push({name:'pyrest',type:'SIMPLE',taskReferenceName:'create_role_policy_'+k}),inputs['create_role_policy_'+k]={url:'${init.input.keycloak_admin}/clients/${extract_client_id.output.result.client_id}/authz/resource-server/policy/role',body:{name:r.name+'_policy',description:'',type:'role',logic:'POSITIVE',decisionStrategy:'UNANIMOUS',roles:Java.to([{id:r.id,required:true}], 'java.util.Map[]')},method:'POST',headers:{Authorization:'Bearer ${authorize.output.body.access_token}', Accept: 'application/json', 'Content-Type':'application/json'}};return {tasks:Java.to(tasks,'java.util.Map[]'),inputs:inputs};" + } + }, + { + "name" : "fork_dynamic", + "type" : "FORK_JOIN_DYNAMIC", + "taskReferenceName" : "parallel_add_policy_role", + "inputParameters" : { + "tasks" : "${build_add_policy_tasks.output.result.tasks}", + "inputs" : "${build_add_policy_tasks.output.result.inputs}" + }, + "dynamicForkTasksParam": "tasks", + "dynamicForkTasksInputParamName": "inputs" + }, { "name" : "join", "type" : "JOIN", - "taskReferenceName" : "join_parallel_role_get_back" + "taskReferenceName" : "join_parallel_policy_addition" } ] }