mirror of
https://github.com/pocket-id/pocket-id.git
synced 2025-12-19 17:23:33 +03:00
fix!: rename LDAP_ATTRIBUTE_ADMIN_GROUP env variable to LDAP_ADMIN_GROUP_NAME (#1089)
This commit is contained in:
@@ -47,7 +47,7 @@ type AppConfigUpdateDto struct {
|
|||||||
LdapAttributeGroupMember string `json:"ldapAttributeGroupMember"`
|
LdapAttributeGroupMember string `json:"ldapAttributeGroupMember"`
|
||||||
LdapAttributeGroupUniqueIdentifier string `json:"ldapAttributeGroupUniqueIdentifier"`
|
LdapAttributeGroupUniqueIdentifier string `json:"ldapAttributeGroupUniqueIdentifier"`
|
||||||
LdapAttributeGroupName string `json:"ldapAttributeGroupName"`
|
LdapAttributeGroupName string `json:"ldapAttributeGroupName"`
|
||||||
LdapAttributeAdminGroup string `json:"ldapAttributeAdminGroup"`
|
LdapAdminGroupName string `json:"ldapAdminGroupName"`
|
||||||
LdapSoftDeleteUsers string `json:"ldapSoftDeleteUsers"`
|
LdapSoftDeleteUsers string `json:"ldapSoftDeleteUsers"`
|
||||||
EmailOneTimeAccessAsAdminEnabled string `json:"emailOneTimeAccessAsAdminEnabled" binding:"required"`
|
EmailOneTimeAccessAsAdminEnabled string `json:"emailOneTimeAccessAsAdminEnabled" binding:"required"`
|
||||||
EmailOneTimeAccessAsUnauthenticatedEnabled string `json:"emailOneTimeAccessAsUnauthenticatedEnabled" binding:"required"`
|
EmailOneTimeAccessAsUnauthenticatedEnabled string `json:"emailOneTimeAccessAsUnauthenticatedEnabled" binding:"required"`
|
||||||
|
|||||||
@@ -77,7 +77,7 @@ type AppConfig struct {
|
|||||||
LdapAttributeGroupMember AppConfigVariable `key:"ldapAttributeGroupMember"`
|
LdapAttributeGroupMember AppConfigVariable `key:"ldapAttributeGroupMember"`
|
||||||
LdapAttributeGroupUniqueIdentifier AppConfigVariable `key:"ldapAttributeGroupUniqueIdentifier"`
|
LdapAttributeGroupUniqueIdentifier AppConfigVariable `key:"ldapAttributeGroupUniqueIdentifier"`
|
||||||
LdapAttributeGroupName AppConfigVariable `key:"ldapAttributeGroupName"`
|
LdapAttributeGroupName AppConfigVariable `key:"ldapAttributeGroupName"`
|
||||||
LdapAttributeAdminGroup AppConfigVariable `key:"ldapAttributeAdminGroup"`
|
LdapAdminGroupName AppConfigVariable `key:"ldapAdminGroupName"`
|
||||||
LdapSoftDeleteUsers AppConfigVariable `key:"ldapSoftDeleteUsers"`
|
LdapSoftDeleteUsers AppConfigVariable `key:"ldapSoftDeleteUsers"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -102,7 +102,7 @@ func (s *AppConfigService) getDefaultDbConfig() *model.AppConfig {
|
|||||||
LdapAttributeGroupMember: model.AppConfigVariable{Value: "member"},
|
LdapAttributeGroupMember: model.AppConfigVariable{Value: "member"},
|
||||||
LdapAttributeGroupUniqueIdentifier: model.AppConfigVariable{},
|
LdapAttributeGroupUniqueIdentifier: model.AppConfigVariable{},
|
||||||
LdapAttributeGroupName: model.AppConfigVariable{},
|
LdapAttributeGroupName: model.AppConfigVariable{},
|
||||||
LdapAttributeAdminGroup: model.AppConfigVariable{},
|
LdapAdminGroupName: model.AppConfigVariable{},
|
||||||
LdapSoftDeleteUsers: model.AppConfigVariable{Value: "true"},
|
LdapSoftDeleteUsers: model.AppConfigVariable{Value: "true"},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -529,7 +529,7 @@ func (s *TestService) SetLdapTestConfig(ctx context.Context) error {
|
|||||||
"ldapAttributeGroupUniqueIdentifier": "uuid",
|
"ldapAttributeGroupUniqueIdentifier": "uuid",
|
||||||
"ldapAttributeGroupName": "uid",
|
"ldapAttributeGroupName": "uid",
|
||||||
"ldapAttributeGroupMember": "member",
|
"ldapAttributeGroupMember": "member",
|
||||||
"ldapAttributeAdminGroup": "admin_group",
|
"ldapAdminGroupName": "admin_group",
|
||||||
"ldapSoftDeleteUsers": "true",
|
"ldapSoftDeleteUsers": "true",
|
||||||
"ldapEnabled": "true",
|
"ldapEnabled": "true",
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -341,7 +341,7 @@ func (s *LdapService) SyncUsers(ctx context.Context, tx *gorm.DB, client *ldap.C
|
|||||||
// Check if user is admin by checking if they are in the admin group
|
// Check if user is admin by checking if they are in the admin group
|
||||||
isAdmin := false
|
isAdmin := false
|
||||||
for _, group := range value.GetAttributeValues("memberOf") {
|
for _, group := range value.GetAttributeValues("memberOf") {
|
||||||
if getDNProperty(dbConfig.LdapAttributeGroupName.Value, group) == dbConfig.LdapAttributeAdminGroup.Value {
|
if getDNProperty(dbConfig.LdapAttributeGroupName.Value, group) == dbConfig.LdapAdminGroupName.Value {
|
||||||
isAdmin = true
|
isAdmin = true
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -47,7 +47,7 @@ export type AllAppConfig = AppConfig & {
|
|||||||
ldapAttributeGroupMember: string;
|
ldapAttributeGroupMember: string;
|
||||||
ldapAttributeGroupUniqueIdentifier: string;
|
ldapAttributeGroupUniqueIdentifier: string;
|
||||||
ldapAttributeGroupName: string;
|
ldapAttributeGroupName: string;
|
||||||
ldapAttributeAdminGroup: string;
|
ldapAdminGroupName: string;
|
||||||
ldapSoftDeleteUsers: boolean;
|
ldapSoftDeleteUsers: boolean;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -43,7 +43,7 @@
|
|||||||
ldapAttributeGroupMember: z.string().optional(),
|
ldapAttributeGroupMember: z.string().optional(),
|
||||||
ldapAttributeGroupUniqueIdentifier: z.string().min(1),
|
ldapAttributeGroupUniqueIdentifier: z.string().min(1),
|
||||||
ldapAttributeGroupName: z.string().min(1),
|
ldapAttributeGroupName: z.string().min(1),
|
||||||
ldapAttributeAdminGroup: z.string().optional(),
|
ldapAdminGroupName: z.string().optional(),
|
||||||
ldapSoftDeleteUsers: z.boolean()
|
ldapSoftDeleteUsers: z.boolean()
|
||||||
});
|
});
|
||||||
|
|
||||||
@@ -193,7 +193,7 @@
|
|||||||
label={m.admin_group_name()}
|
label={m.admin_group_name()}
|
||||||
description={m.members_of_this_group_will_have_admin_privileges_in_pocketid()}
|
description={m.members_of_this_group_will_have_admin_privileges_in_pocketid()}
|
||||||
placeholder="_admin_group_name"
|
placeholder="_admin_group_name"
|
||||||
bind:input={$inputs.ldapAttributeAdminGroup}
|
bind:input={$inputs.ldapAdminGroupName}
|
||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
</fieldset>
|
</fieldset>
|
||||||
|
|||||||
Reference in New Issue
Block a user