-
Bug
-
Resolution: Done
-
Blocker
-
None
-
None
-
Quality & Stability
-
False
-
-
False
-
-
-
OCMUI Center Team Sprint 267
Description of problem:
User has tried to edit the existing LDAP IDP definition from a cluster. This action brings broken the LDAP definition with type error in UI as mentioned below
console.js:36 TypeError: Cannot read properties of undefined (reading 'trim')
at g (LDAPFormRequired.jsx:17:45)
at bi (chrome-root.0593b29696e6870a.js:2:319290)
at Su (chrome-root.0593b29696e6870a.js:2:378605)
at vc (chrome-root.0593b29696e6870a.js:2:367757)
at yc (chrome-root.0593b29696e6870a.js:2:367685)
at bc (chrome-root.0593b29696e6870a.js:2:367548)
at oc (chrome-root.0593b29696e6870a.js:2:364355)
at uc (chrome-root.0593b29696e6870a.js:2:364744)
at Ha (chrome-root.0593b29696e6870a.js:2:305643)
at chrome-root.0593b29696e6870a.js:2:362292
The LDAP IDP definition has been created via ROSA CLI in above case. Steps as below
% rosa add idp --cluster rosahcptests26febjaya W: The current version (1.2.49) is not up to date with latest rosa cli released version (1.2.50). W: It is recommended that you update to the latest version. I: Interactive mode enabled. Any optional fields can be left empty and a default will be selected. ? Type of identity provider (default = 'github'): ldap ? Identity provider name: ldap-2 ? To use LDAP as an identity provider, you must first register the application: - Open the following URL: https://docs.openshift.com/dedicated/identity_providers/config-identity-providers.html#config-ldap-idp_config-identity-providers - Follow the instructions to register your application ? LDAP URL: ldaps://hello.co.in ? CA file path (optional): ? Mapping method (default = 'claim'): claim ? Bind DN (optional): ? The following options map LDAP attributes to identities. Enter multiple values separated by commas. ? ID: tests ? Preferred username: testing ? Name: jaya ? Email (optional): jaya@redhat.com I: Configuring IDP for cluster 'rosahcptests26febjaya' I: Identity Provider 'ldap-2' has been created. It may take several minutes for this access to become active. To add cluster administrators, see 'rosa grant user --help'. I: To log in to the console, open https://console-openshift-console.apps.rosa.w4v5p2t3d3e6m2o.h3lx.s3.devshift.org and click on 'ldap-2'.
See the attached recording Screen Recording 2025-02-26 at 5.52.56 PM.mov
How reproducible:
Always
Steps to reproduce:
- Launch OCM UI staging.
- Choose a ready ROSA hosted cluster.
- Create LDAP IDP for the same cluster via ROSA CLI (as mentioned in description).
- Open the ROSA hosted cluster.
- Go to "Access control" > "Identity providers".
- Select the newly created LDAP IDP and click the kebab icon.
- Click "Edit" context menu and see the behavior.
Actual results:
At step 7, The LDAP IDP edit form has broken with type error as mentioned above.
Expected results:
At step 7, The LDAP IDP edit form should open without any issue and user should able to view or edit the existing content.
- is caused by
-
OCMUI-3071 LDAP IdP can't be created with error: 'bind_password' can be defined only when 'bind_dn' is defined
-
- Closed
-