Commit Graph

11 Commits

Author SHA1 Message Date
Willy Kloucek
652a907c24 update ci to check licenses of all languages 2022-04-08 07:41:19 +02:00
Willy Kloucek
29123cdfff hook up licensing in makefile 2022-04-08 07:40:55 +02:00
Willy Kloucek
e224ce03cf use yaml tag instead of ocisConfig 2022-03-29 15:06:58 +02:00
Ralf Haferkamp
1090d3c961 Add service user for settings service
This is a quick workaround to make the settings service work with idm
after b7c934b1b1. We need to to provide a better solution for service
users like that (they shouldn't need to be present in ldap)
2022-03-23 12:34:24 +01:00
Ralf Haferkamp
59770ef968 Fix default config for idm
It seems some defaults got lost when moving default to defaults/defaultconfig.go
2022-03-21 16:15:01 +00:00
Willy Kloucek
9a4737d3ed exclude config items not inteded to be used from un/marshalling 2022-03-11 12:12:44 +01:00
Christian Richter
59eaf7c1b8 Output example yaml 2022-03-10 15:35:02 +01:00
Christian Richter
9734b000b3 Add defaultconfig to extensions 2022-03-10 14:12:26 +01:00
Ralf Haferkamp
436399e8ea idm: Allow to create demo and service users on startup
Uses go:embed to include the demo and service users from LDIF.
Using a template file for the service users to be able to set
custom passwords via config/env.

In order to switch ocis to use idm instead of accounts/glauth it
currently needs to be started with this env:

GRAPH_IDENTITY_BACKEND=ldap
GRAPH_LDAP_URI=ldaps://localhost:9235
GRAPH_LDAP_BIND_DN="uid=libregraph,ou=sysusers,o=libregraph-idm"
GRAPH_LDAP_BIND_PASSWORD=idm
GRAPH_LDAP_USER_EMAIL_ATTRIBUTE=mail
GRAPH_LDAP_USER_NAME_ATTRIBUTE=uid
GRAPH_LDAP_USER_BASE_DN="ou=users,o=libregraph-idm"
GRAPH_LDAP_GROUP_BASE_DN="ou=groups,o=libregraph-idm"
GRAPH_LDAP_SERVER_WRITE_ENABLED="true"
IDP_LDAP_FILTER="(&(objectclass=inetOrgPerson)(objectClass=owncloud))"
IDP_LDAP_URI=ldaps://localhost:9235
IDP_LDAP_BIND_DN="uid=idp,ou=sysusers,o=libregraph-idm"
IDP_LDAP_BIND_PASSWORD="idp"
IDP_LDAP_BASE_DN="ou=users,o=libregraph-idm"
IDP_LDAP_LOGIN_ATTRIBUTE=uid
IDP_LDAP_UUID_ATTRIBUTE="ownclouduuid"
IDP_LDAP_UUID_ATTRIBUTE_TYPE=binary
PROXY_ACCOUNT_BACKEND_TYPE=cs3
OCS_ACCOUNT_BACKEND_TYPE=cs3
STORAGE_LDAP_HOSTNAME=localhost
STORAGE_LDAP_PORT=9235
STORAGE_LDAP_INSECURE="true"
STORAGE_LDAP_BASE_DN="o=libregraph-idm"
STORAGE_LDAP_BIND_DN="uid=reva,ou=sysusers,o=libregraph-idm"
STORAGE_LDAP_BIND_PASSWORD=reva
STORAGE_LDAP_LOGINFILTER='(&(objectclass=inetOrgPerson)(objectclass=owncloud)(|(uid={{login}})(mail={{login}})))'
STORAGE_LDAP_USERFILTER='(&(objectclass=inetOrgPerson)(objectclass=owncloud)(|(ownclouduuid={{.OpaqueId}})(uid={{.OpaqueId}})))'
STORAGE_LDAP_USERATTRIBUTEFILTER='(&(objectclass=owncloud)({{attr}}={{value}}))'
STORAGE_LDAP_USERFINDFILTER='(&(objectclass=owncloud)(|(uid={{query}}*)(cn={{query}}*)(displayname={{query}}*)(mail={{query}}*)(description={{query}}*)))'
STORAGE_LDAP_GROUPFILTER='(&(objectclass=groupOfNames)(objectclass=owncloud)(ownclouduuid={{.OpaqueId}}*))'
OCIS_INSECURE=true
2022-03-09 15:18:15 +01:00
Ralf Haferkamp
ccf6bf1b0d idm: Fix error handling on startup (#3243)
* Fix idm to acutally return error during startup to the runtime
* Add proper conditon to error log statement
2022-02-28 17:52:51 +01:00
Ralf Haferkamp
02775b72c7 Add embeded libregrah/idm server
This add a new service "idm" providing and LDAP service (via ldaps) on
port 9235.  If not existing it will bootstrap an initial LDAP tree and
administrative user as well as a self-signed Certificate and Key
(similar to what is done for glauth).
2022-02-25 11:43:03 +01:00