-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
idm: Allow to create demo and service users on startup #3260
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Thanks for opening this pull request! The maintainers of this repository would appreciate it if you would create a changelog item based on your changes. |
kobergj
requested changes
Mar 9, 2022
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LG in general. But as always some picky minors...
kobergj
approved these changes
Mar 9, 2022
micbar
reviewed
Mar 9, 2022
Uses go:embed to include the demo and service users from LDIF. Using a template file for the service users to be able to set custom passwords via config/env. In order to switch ocis to use idm instead of accounts/glauth it currently needs to be started with this env: GRAPH_IDENTITY_BACKEND=ldap GRAPH_LDAP_URI=ldaps://localhost:9235 GRAPH_LDAP_BIND_DN="uid=libregraph,ou=sysusers,o=libregraph-idm" GRAPH_LDAP_BIND_PASSWORD=idm GRAPH_LDAP_USER_EMAIL_ATTRIBUTE=mail GRAPH_LDAP_USER_NAME_ATTRIBUTE=uid GRAPH_LDAP_USER_BASE_DN="ou=users,o=libregraph-idm" GRAPH_LDAP_GROUP_BASE_DN="ou=groups,o=libregraph-idm" GRAPH_LDAP_SERVER_WRITE_ENABLED="true" IDP_LDAP_FILTER="(&(objectclass=inetOrgPerson)(objectClass=owncloud))" IDP_LDAP_URI=ldaps://localhost:9235 IDP_LDAP_BIND_DN="uid=idp,ou=sysusers,o=libregraph-idm" IDP_LDAP_BIND_PASSWORD="idp" IDP_LDAP_BASE_DN="ou=users,o=libregraph-idm" IDP_LDAP_LOGIN_ATTRIBUTE=uid IDP_LDAP_UUID_ATTRIBUTE="ownclouduuid" IDP_LDAP_UUID_ATTRIBUTE_TYPE=binary PROXY_ACCOUNT_BACKEND_TYPE=cs3 OCS_ACCOUNT_BACKEND_TYPE=cs3 STORAGE_LDAP_HOSTNAME=localhost STORAGE_LDAP_PORT=9235 STORAGE_LDAP_INSECURE="true" STORAGE_LDAP_BASE_DN="o=libregraph-idm" STORAGE_LDAP_BIND_DN="uid=reva,ou=sysusers,o=libregraph-idm" STORAGE_LDAP_BIND_PASSWORD=reva STORAGE_LDAP_LOGINFILTER='(&(objectclass=inetOrgPerson)(objectclass=owncloud)(|(uid={{login}})(mail={{login}})))' STORAGE_LDAP_USERFILTER='(&(objectclass=inetOrgPerson)(objectclass=owncloud)(|(ownclouduuid={{.OpaqueId}})(uid={{.OpaqueId}})))' STORAGE_LDAP_USERATTRIBUTEFILTER='(&(objectclass=owncloud)({{attr}}={{value}}))' STORAGE_LDAP_USERFINDFILTER='(&(objectclass=owncloud)(|(uid={{query}}*)(cn={{query}}*)(displayname={{query}}*)(mail={{query}}*)(description={{query}}*)))' STORAGE_LDAP_GROUPFILTER='(&(objectclass=groupOfNames)(objectclass=owncloud)(ownclouduuid={{.OpaqueId}}*))' OCIS_INSECURE=true
Kudos, SonarCloud Quality Gate passed! |
micbar
approved these changes
Mar 9, 2022
ownclouders
pushed a commit
that referenced
this pull request
Mar 9, 2022
ownclouders
pushed a commit
that referenced
this pull request
Mar 10, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Uses go:embed to include the demo and service users from LDIF.
Using a template file for the service users to be able to set
custom passwords via config/env.
In order to switch ocis to use idm instead of accounts/glauth it
currently needs to be started with this env (the idea is to clean switch the defaults towards idm in a followup PR):
How Has This Been Tested?
Manually. Test automation will be possible with #3167
Types of changes
Checklist: