- Oct 05, 2021
-
-
Julian authored
-
- Oct 02, 2021
-
-
Julian authored
* Removal of ldapalchemy and LDAP mocking support * Removal of dependency on ldap3 (except for the migration) * Remaining "LDAP_<name>" config keys are renamed to "<name>" * Web interface to create, edit and delete groups * Consistent foreign key, cascading and nullable configuration on all models * User/Group.dn is replaced with numeric User/Group.id * User.uid is renamed to User.unix_uid (to differentiate with new User.id) * Group.gid is renamed to Group.unix_gid (to differentiate with new Group.id) * All User/Group/Mail related routes now use the database ids instead of uid/gid/dn * PasswordToken/MailToken now reference users directly instead of storing loginnames The database migration (optionally) uses the v1 config keys to connect to an LDAP server and to import all users, groups and mail forwardings.
-
- Sep 13, 2021
-
-
Julian authored
-
- Sep 02, 2021
-
-
Julian authored
flask_oauthlib is no longer available in Debian Bullseye. It is only a wrapper around oauthlib, which is still available. While this change does increase the OAuth2 code size, it achieves compatability with both Debian Buster and Bullseye. Aside from error handling, this change has no noticable effects on OAuth2.0 clients. In terms of error handling, a few cases that were not properly handled before now return appropriate error pages. Fixes #101
-
- Aug 12, 2021
-
- Aug 01, 2021
- Jul 31, 2021
-
-
nd authored
-
-
- Jul 30, 2021
- Jul 25, 2021
-
-
Julian authored
-
- Jun 15, 2021
- Jun 12, 2021
- May 01, 2021
-
-
sistason authored
-
- Apr 05, 2021
-
-
nd authored
-
- Apr 04, 2021
-
-
Julian authored
-
- Nov 26, 2020
- Oct 30, 2020
-
-
nd authored
-
- Oct 24, 2020
-
- Oct 05, 2020
-
-
Julian authored
-
- Oct 02, 2020
-
-
Julian authored
Code is mostly based on python-fido2's example code. Note that webauthn requires the website to be delivered via HTTPS. Flask's development server automatically sets up a self-signed ssl cert with the `ssl_context="adhoc"` option.
-
- Oct 01, 2020
-
-
Julian authored
-
LDAP_SERVICE_MOCK must be set to True to enable ldap mocking. As a security measure, mocking is only allowed in debug mode. Also changed ACL_ADMIN_GROUP and ACL_SELFSERVICE_GROUP in default_config.cfg to more distinguishable values and removed the unused ACL_LDAP_GROUP_USEREDIT entry. The sample entries in ldap_server_entries.json are the bare minimum required for mocking and most likely won't suffice on a real LDAP server. Also ldap3's mocked server is very limited and does not correctly verify hashed password, update group memberships or implement ldap overlays/extentions correctly. Closes #20
-
- Sep 25, 2020
-
-
nd authored
-
- Jul 11, 2020
-
-
nd authored
-