Skip to content
Snippets Groups Projects
  1. Nov 15, 2021
  2. Nov 06, 2021
  3. Oct 26, 2021
    • sistason's avatar
    • Julian's avatar
      Fixes and improvements for changelog auto-generation · 328caf00
      Julian authored
      The script generated a broken changelog if the current commit is tagged as
      a release. That works now.
      
      Additional improvements:
      * Merge commits are ignored
      * "^fixup!" commits are ignored
      * Commit summaries are line-wrapped
      * Authors can be merged by manually supplied name mapping
      * The first release also includes a list of commits. They were originally
        excluded because the first release contains so many commits, including
        many unclean ones. But excluding those commits also means excluding the
        attribution, so it is not really an option.
      * Authors are ordered by the number of their contributions in a release
        to make occasional contributors more visible.
      328caf00
  4. Oct 25, 2021
    • Julian's avatar
      Removed CHANGELOG and simplified Debian release workflow · 5c9ab56e
      Julian authored
      Previously CHANGELOG had to be updated manually. This was done by downloading
      the output of a CI job that used listed commits since the last release. This
      made releasing a bit more complicated and led to uselsess release commits.
      
      Now a script creates the full debian/changelog with all versions based on
      git tags and git commits.
      5c9ab56e
  5. Oct 05, 2021
  6. Oct 04, 2021
  7. Oct 03, 2021
  8. Oct 02, 2021
    • Julian's avatar
      Move User, Group and Mail models from LDAP to DB · 4a9c455f
      Julian authored
      * Removal of ldapalchemy and LDAP mocking support
      * Removal of dependency on ldap3 (except for the migration)
      * Remaining "LDAP_<name>" config keys are renamed to "<name>"
      * Web interface to create, edit and delete groups
      * Consistent foreign key, cascading and nullable configuration on all models
      * User/Group.dn is replaced with numeric User/Group.id
      * User.uid is renamed to User.unix_uid (to differentiate with new User.id)
      * Group.gid is renamed to Group.unix_gid (to differentiate with new Group.id)
      * All User/Group/Mail related routes now use the database ids instead of uid/gid/dn
      * PasswordToken/MailToken now reference users directly instead of storing loginnames
      
      The database migration (optionally) uses the v1 config keys to connect to
      an LDAP server and to import all users, groups and mail forwardings.
      4a9c455f
  9. Sep 29, 2021
  10. Sep 13, 2021
  11. Sep 12, 2021
  12. Sep 11, 2021
  13. Sep 10, 2021
  14. Sep 08, 2021
  15. Sep 07, 2021
  16. Sep 06, 2021
  17. Sep 05, 2021
    • Julian's avatar
      Refactor base template and add narrow base template · 12b0ea3d
      Julian authored
      Fixes #83.
      
      Many authentication-related templates shared the same markup originally
      copied from the login template. The duplicated code now lives in
      base_narrow.html. Alerts now always have the same width as the main content.
      Vertical spacing is now more consistent. The footer is now full-width.
      12b0ea3d
    • Julian's avatar
      Refactor permission checking and differenciate login and selfservice access · e6df5bbe
      Julian authored
      Fixes #104.
      
      Replaced "group" keyword argument for login_required with "permission_check".
      Most views already define a *_acl_check function that returns whether the
      current user has the required permissions for use with register_navbar. The
      same function can now be passed to login_required as the "permission_check"
      argument.
      
      Differenciated login and selfservice access permissions. Previously
      ACL_SELFSERVICE_GROUP was required to login. Now ACL_ACCESS_GROUP is required
      to login and ACL_SELFSERVICE_GROUP is required to access selfservice functions
      (and to use role-granting invite links). A user with just ACL_ACCESS_GROUP can
      now login, access the services overview page and authenticate with OAuth2
      services he has access to, but not change his user attributes, password or
      roles/permissions.
      e6df5bbe
  18. Sep 04, 2021
Loading