Compare commits
223 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6693bbe166 | ||
|
|
1696135096 | ||
| c764182a6d | |||
|
|
a112ef2eca | ||
|
|
7e28517b82 | ||
|
|
3080ab995a | ||
|
|
7a510b315d | ||
|
|
dc701e5c49 | ||
| 233e9ca92f | |||
|
|
e1a25cdd31 | ||
|
|
5be23c0d52 | ||
|
|
de8cf11d4d | ||
|
|
666a50e163 | ||
| 0bd256cb09 | |||
| 0d46802862 | |||
| b190e25c88 | |||
| 8290f9dd23 | |||
| 22e57dc075 | |||
| aa6406f949 | |||
| 663ad01740 | |||
| 619c5975aa | |||
| 795c707a1f | |||
| 0599ec2512 | |||
| b1cb45ac7e | |||
| 274c86a820 | |||
| 3119dff6fe | |||
| f7f3532b30 | |||
| 1dd83af6aa | |||
| cea64da34d | |||
| cba9cadb41 | |||
| 9428bc05cc | |||
| 94d45c1f17 | |||
| 8be3e2ea78 | |||
| 7e33d9e5de | |||
| 923166b592 | |||
| dbfd3657a0 | |||
|
|
864175284d | ||
| a4eda81436 | |||
| 4db44733ca | |||
| 1fc43a8727 | |||
| 6cd1d829b6 | |||
| 85dc1fa0b5 | |||
| 2aa64f7360 | |||
| f3da2ac630 | |||
| d44b903b3e | |||
| c4501f1d08 | |||
| 560d1adf5f | |||
| acd6a3c11c | |||
| 2787bde8da | |||
| 6b82c26268 | |||
| 770c2f3182 | |||
| 843e6dbba2 | |||
| 3607a9da6d | |||
| 608bea5199 | |||
| 07dd91665c | |||
| 5662a2d1f1 | |||
| 72938e41ba | |||
|
|
cf6ae898c4 | ||
| 05acba8cbe | |||
| 9856272734 | |||
| 504490f593 | |||
|
|
4c109538ee | ||
|
|
1e5c4df163 | ||
| e1ebd528b8 | |||
| 708320e067 | |||
| 51298ba726 | |||
| 96e3eb613d | |||
| a2903da109 | |||
| c9fa627651 | |||
| 969cc4df63 | |||
| 2480efc345 | |||
| 8c4ec00c35 | |||
| 78a8442d07 | |||
| 95803db3a0 | |||
| d71ff014ea | |||
| aca5a79de2 | |||
| 4feb05a02e | |||
| 77a9100b2e | |||
|
|
b947037ea2 | ||
|
|
d88acf4634 | ||
|
|
fbe0e37d28 | ||
| bb03d28b7d | |||
| 2196e89208 | |||
| 4ff51c8f6f | |||
| 434eed2217 | |||
| f88e527fe4 | |||
| 40fe8ecfc6 | |||
| 13502d704e | |||
| d1e1f25162 | |||
| ac5bca2fcd | |||
| 064645d1b3 | |||
| 956c85a9f3 | |||
|
|
bee135ab48 | ||
| 42ecc91c22 | |||
| a37d4b369a | |||
| 039b1234c5 | |||
| 87b3214c84 | |||
| ad937cda8c | |||
| 899071e4d6 | |||
| 55bf8c0355 | |||
| b4a8ccf9cc | |||
| 76d3c57658 | |||
| 2490f8e69f | |||
| 6cd0152636 | |||
| 19433fdc56 | |||
| 012c75db21 | |||
| 71e2d6827e | |||
| 41b14f1ece | |||
| a2e01e74af | |||
| 8a353c357f | |||
| 9bf7033eac | |||
| 0a01490aa7 | |||
| 115452035d | |||
| b8e7ee2b3d | |||
| 3d1908d71a | |||
| ed54b666ec | |||
| a1d8dc2e7e | |||
|
|
956464659e | ||
| 9a5c487b2c | |||
| bcfcbd5c9b | |||
| 96038a4f22 | |||
| 5c4042e5f3 | |||
| c9f1bc4047 | |||
| bf13473954 | |||
| a0e7b2f96c | |||
| 848890d3cd | |||
| f8bf02df2b | |||
| 1489c27121 | |||
| 0c5f4cb430 | |||
| 9597663881 | |||
| 7ed5e7a326 | |||
| 1180ef6fd0 | |||
| 2c3292cadf | |||
| 7803b753cb | |||
|
|
bbeebc641e | ||
| 42c97924ec | |||
| 29fc201294 | |||
| 938423b832 | |||
| 54f2430b3e | |||
| 2e47df00b9 | |||
| 223ae0f2f8 | |||
| cc8bd19f85 | |||
|
|
3f5a22c85d | ||
| 12fe58fc81 | |||
|
|
fafa25a7b5 | ||
|
|
d4cfce317d | ||
| ac045fdc70 | |||
| a85a5be4cd | |||
| 1d7b46b4a4 | |||
|
|
453034100b | ||
| 9c608070ae | |||
| aa81de74a4 | |||
| d9ed893b52 | |||
| dfa774f655 | |||
| 608d8a3661 | |||
| 3c4e6b62fb | |||
| f39de71c02 | |||
| 24dbaf36bc | |||
| 43bf25a5bd | |||
| f4b8417deb | |||
| c8350722a4 | |||
| af09e02801 | |||
| 8e2a98c12b | |||
| 1cdb20eb60 | |||
|
|
c8fa509ace | ||
|
|
5a023a9e32 | ||
|
|
2763d2012a | ||
| 264aaab24c | |||
| c65dc04e8f | |||
| a1ba004efa | |||
| 514bca5257 | |||
| 9cbc35c263 | |||
| 84d7890ae4 | |||
| aa893062f1 | |||
| d4a3459adf | |||
|
|
8acfc1d10c | ||
| e9bbeffd7e | |||
| 7e3e772055 | |||
| 471982d245 | |||
| 3eec9ef8df | |||
| ff5b31929e | |||
| 12bb8b7145 | |||
| 2e005a90f2 | |||
| 843ac60aae | |||
| a42ccb0faa | |||
| c929d42ebd | |||
| 4051d1e11b | |||
| 71af64dc28 | |||
| 74f044919c | |||
| 9dc6ec461c | |||
| 1f31fe8cf2 | |||
| d56c9c3c31 | |||
| 55ed01cb40 | |||
|
|
9f299c854c | ||
|
|
35902daff6 | ||
|
|
31f657a15f | ||
|
|
7946e046e2 | ||
|
|
7ca12d064d | ||
|
|
5e85eae825 | ||
|
|
3e9e90ed86 | ||
|
|
a67697d159 | ||
|
|
ce8aa849f8 | ||
| 5c4f742745 | |||
| 7b7b82cba3 | |||
|
|
cf89722c7f | ||
|
|
44d082f8b9 | ||
|
|
9b9370fed0 | ||
|
|
2351388826 | ||
| aa41004c39 | |||
| 29df39f3b5 | |||
| de005691f1 | |||
| 050516c0bc | |||
| e63c8751eb | |||
| 2a4158303e | |||
| 1797d4eb9b | |||
| 307cda543e | |||
| de19073e11 | |||
| 18af65da10 | |||
| 45048ce62d | |||
| bc4594bea2 | |||
| e4883c62d0 | |||
| 6e5a58aa37 | |||
| d495a31ad8 |
207
.gitlab-ci.yml
207
.gitlab-ci.yml
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022-2023 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor@kleen.consulting>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor@kleen.consulting>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -35,6 +35,7 @@ node dependencies:
|
|||||||
stage: frontend:build
|
stage: frontend:build
|
||||||
script:
|
script:
|
||||||
- nix -L build -o result ".#uniworxNodeDependencies"
|
- nix -L build -o result ".#uniworxNodeDependencies"
|
||||||
|
- nix-store --gc
|
||||||
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > node-dependencies.nar.xz
|
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > node-dependencies.nar.xz
|
||||||
before_script: &nix-before
|
before_script: &nix-before
|
||||||
- git config --global init.defaultBranch master
|
- git config --global init.defaultBranch master
|
||||||
@ -54,8 +55,12 @@ node dependencies:
|
|||||||
well known:
|
well known:
|
||||||
stage: frontend:build
|
stage: frontend:build
|
||||||
script:
|
script:
|
||||||
|
# - xzcat node-dependencies.nar.xz > node-dependencies-debug.nar
|
||||||
|
# - nix-shell -p util-linux --command "hexdump -C node-dependencies-debug.nar | head -n 10"
|
||||||
|
# - nix nar ls node-dependencies-debug.nar /
|
||||||
- xzcat node-dependencies.nar.xz | nix-store --import
|
- xzcat node-dependencies.nar.xz | nix-store --import
|
||||||
- nix -L build -o result ".#uniworxWellKnown"
|
- nix -L build -o result ".#uniworxWellKnown"
|
||||||
|
- nix-store --gc
|
||||||
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > well-known.nar.xz
|
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > well-known.nar.xz
|
||||||
before_script: *nix-before
|
before_script: *nix-before
|
||||||
needs:
|
needs:
|
||||||
@ -75,6 +80,7 @@ frontend:
|
|||||||
- xzcat node-dependencies.nar.xz | nix-store --import
|
- xzcat node-dependencies.nar.xz | nix-store --import
|
||||||
- xzcat well-known.nar.xz | nix-store --import
|
- xzcat well-known.nar.xz | nix-store --import
|
||||||
- nix -L build -o result ".#uniworxFrontend"
|
- nix -L build -o result ".#uniworxFrontend"
|
||||||
|
- nix-store --gc
|
||||||
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > frontend.nar.xz
|
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > frontend.nar.xz
|
||||||
before_script: *nix-before
|
before_script: *nix-before
|
||||||
needs:
|
needs:
|
||||||
@ -95,6 +101,7 @@ uniworx:lib:uniworx:
|
|||||||
script:
|
script:
|
||||||
- xzcat frontend.nar.xz | nix-store --import
|
- xzcat frontend.nar.xz | nix-store --import
|
||||||
- nix -L build -o result ".#uniworx:lib:uniworx"
|
- nix -L build -o result ".#uniworx:lib:uniworx"
|
||||||
|
- nix-store --gc
|
||||||
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > uniworx:lib:uniworx.nar.xz
|
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > uniworx:lib:uniworx.nar.xz
|
||||||
before_script: *nix-before
|
before_script: *nix-before
|
||||||
needs:
|
needs:
|
||||||
@ -117,6 +124,7 @@ uniworx:exe:uniworx:
|
|||||||
script:
|
script:
|
||||||
- xzcat uniworx:lib:uniworx.nar.xz | nix-store --import
|
- xzcat uniworx:lib:uniworx.nar.xz | nix-store --import
|
||||||
- nix -L build -o result ".#uniworx:exe:uniworx"
|
- nix -L build -o result ".#uniworx:exe:uniworx"
|
||||||
|
- nix-store --gc
|
||||||
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > uniworx:exe:uniworx.nar.xz
|
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > uniworx:exe:uniworx.nar.xz
|
||||||
before_script: *nix-before
|
before_script: *nix-before
|
||||||
needs:
|
needs:
|
||||||
@ -141,6 +149,7 @@ uniworx:exe:uniworxdb:
|
|||||||
script:
|
script:
|
||||||
- xzcat uniworx:lib:uniworx.nar.xz | nix-store --import
|
- xzcat uniworx:lib:uniworx.nar.xz | nix-store --import
|
||||||
- nix -L build -o result ".#uniworx:exe:uniworxdb"
|
- nix -L build -o result ".#uniworx:exe:uniworxdb"
|
||||||
|
- nix-store --gc
|
||||||
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > uniworx:exe:uniworxdb.nar.xz
|
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > uniworx:exe:uniworxdb.nar.xz
|
||||||
before_script: *nix-before
|
before_script: *nix-before
|
||||||
needs:
|
needs:
|
||||||
@ -165,6 +174,7 @@ uniworx:exe:uniworxload:
|
|||||||
script:
|
script:
|
||||||
- xzcat uniworx:lib:uniworx.nar.xz | nix-store --import
|
- xzcat uniworx:lib:uniworx.nar.xz | nix-store --import
|
||||||
- nix -L build -o result ".#uniworx:exe:uniworxload"
|
- nix -L build -o result ".#uniworx:exe:uniworxload"
|
||||||
|
- nix-store --gc
|
||||||
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > uniworx:exe:uniworxload.nar.xz
|
- nix-store --export $(nix-store -qR result) | xz -T0 -2 > uniworx:exe:uniworxload.nar.xz
|
||||||
before_script: *nix-before
|
before_script: *nix-before
|
||||||
needs:
|
needs:
|
||||||
@ -207,8 +217,13 @@ container:
|
|||||||
stage: container:build
|
stage: container:build
|
||||||
script:
|
script:
|
||||||
- xzcat uniworx:exe:uniworx.nar.xz | nix-store --import
|
- xzcat uniworx:exe:uniworx.nar.xz | nix-store --import
|
||||||
- cp -pr --reflink=auto -L $(nix build --print-out-paths ".#uniworxDocker") uniworx.tar.gz
|
# - &container-remove-nodejs
|
||||||
|
# "for i in `ls /nix/store/ | grep -E -i '^[a-z0-9]+-nodejs-'` ; do ( nix store delete --ignore-liveness \"/nix/store/$i\" || ( echo \"Could not remove NodeJS from /nix/store/ due to: \" && ( nix-store --query --roots \"/nix/store/$i\" | cat ) && echo \"Removing NodeJS by brute force...\" && rm -rf \"/nix/store/$i\" ) ) ; done"
|
||||||
|
- cp -p --reflink=auto -L $(nix build --print-out-paths ".#uniworxDocker") uniworx.tar.gz
|
||||||
before_script: *nix-before
|
before_script: *nix-before
|
||||||
|
# TODO: reintroduce working version of after_script
|
||||||
|
# after_script: &container-fail-on-nodejs
|
||||||
|
# - (ls /nix/store/ | grep -E -i '^[a-z0-9]+-nodejs-') && (echo "NodeJS remainder in container /nix/store!" 1>&2; exit 1)
|
||||||
needs:
|
needs:
|
||||||
- job: node dependencies # transitive
|
- job: node dependencies # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
@ -235,8 +250,10 @@ test container:
|
|||||||
stage: container:build
|
stage: container:build
|
||||||
script:
|
script:
|
||||||
- xzcat uniworx:exe:uniworx.nar.xz | nix-store --import
|
- xzcat uniworx:exe:uniworx.nar.xz | nix-store --import
|
||||||
- cp -pr --reflink=auto -L $(nix build --print-out-paths ".#uniworxTestDocker") uniworx.tar.gz
|
# - *container-remove-nodejs
|
||||||
|
- cp -p --reflink=auto -L $(nix build --print-out-paths ".#uniworxTestDocker") uniworx.tar.gz
|
||||||
before_script: *nix-before
|
before_script: *nix-before
|
||||||
|
# after_script: *container-fail-on-nodejs
|
||||||
needs:
|
needs:
|
||||||
- job: node dependencies # transitive
|
- job: node dependencies # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
@ -259,6 +276,128 @@ test container:
|
|||||||
interruptible: true
|
interruptible: true
|
||||||
rules: &test-release-rules
|
rules: &test-release-rules
|
||||||
- if: $CI_COMMIT_TAG =~ /^t/
|
- if: $CI_COMMIT_TAG =~ /^t/
|
||||||
|
dev container:
|
||||||
|
stage: container:build
|
||||||
|
script:
|
||||||
|
- xzcat uniworx:exe:uniworx.nar.xz | nix-store --import
|
||||||
|
- cp -p --reflink=auto -L $(nix build --print-out-paths ".#uniworxDevDocker") uniworx.tar.gz
|
||||||
|
before_script: *nix-before
|
||||||
|
needs:
|
||||||
|
- job: node dependencies # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: well known # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: frontend # tranitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:lib:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:exe:uniworx
|
||||||
|
artifacts: true
|
||||||
|
- job: check # sanity
|
||||||
|
artifacts: false
|
||||||
|
artifacts:
|
||||||
|
paths:
|
||||||
|
- uniworx.tar.gz
|
||||||
|
name: "${CI_JOB_NAME}-${CI_COMMIT_SHORT_SHA}"
|
||||||
|
expire_in: "1 day"
|
||||||
|
retry: 2
|
||||||
|
interruptible: true
|
||||||
|
rules: &dev-release-rules
|
||||||
|
- if: $CI_COMMIT_TAG =~ /^d/
|
||||||
|
|
||||||
|
sanitize container:
|
||||||
|
stage: container:build
|
||||||
|
needs:
|
||||||
|
- job: node dependencies # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: well known # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: frontend # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:lib:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:exe:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: check # sanity
|
||||||
|
artifacts: false
|
||||||
|
- job: container
|
||||||
|
artifacts: true
|
||||||
|
before_script: *nix-before
|
||||||
|
script:
|
||||||
|
- nix shell nixpkgs#perl --command ./.gitlab-ci/sanitize-docker.pl
|
||||||
|
after_script:
|
||||||
|
- tar xzvf uniworx-sanitized.tar.gz
|
||||||
|
- for i in `tar tf */layer.tar | grep 'nix/store/[0-9a-z]*-nodejs'`; do echo "NodeJS remainer found in /nix/store!"; echo "$i"; exit 1; done
|
||||||
|
artifacts:
|
||||||
|
paths:
|
||||||
|
- uniworx-sanitized.tar.gz
|
||||||
|
name: "${CI_JOB_NAME}-${CI_COMMIT_SHORT_SHA}"
|
||||||
|
expire_in: "1 day"
|
||||||
|
retry: 2
|
||||||
|
interruptible: true
|
||||||
|
rules: *release-rules
|
||||||
|
sanitize test container:
|
||||||
|
stage: container:build
|
||||||
|
needs:
|
||||||
|
- job: node dependencies # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: well known # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: frontend # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:lib:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:exe:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: check # sanity
|
||||||
|
artifacts: false
|
||||||
|
- job: test container
|
||||||
|
artifacts: true
|
||||||
|
before_script: *nix-before
|
||||||
|
script:
|
||||||
|
- nix shell nixpkgs#perl --command ./.gitlab-ci/sanitize-docker.pl
|
||||||
|
after_script:
|
||||||
|
- tar xzvf uniworx-sanitized.tar.gz
|
||||||
|
- for i in `tar tf */layer.tar | grep 'nix/store/[0-9a-z]*-nodejs'`; do echo "NodeJS remainer found in /nix/store!"; echo "$i"; exit 1; done
|
||||||
|
artifacts:
|
||||||
|
paths:
|
||||||
|
- uniworx-sanitized.tar.gz
|
||||||
|
name: "${CI_JOB_NAME}-${CI_COMMIT_SHORT_SHA}"
|
||||||
|
expire_in: "1 day"
|
||||||
|
retry: 2
|
||||||
|
interruptible: true
|
||||||
|
rules: *test-release-rules
|
||||||
|
sanitize dev container:
|
||||||
|
stage: container:build
|
||||||
|
needs:
|
||||||
|
- job: node dependencies # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: well known # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: frontend # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:lib:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:exe:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: check # sanity
|
||||||
|
artifacts: false
|
||||||
|
- job: dev container
|
||||||
|
artifacts: true
|
||||||
|
before_script: *nix-before
|
||||||
|
script:
|
||||||
|
- nix shell nixpkgs#perl --command ./.gitlab-ci/sanitize-docker.pl
|
||||||
|
after_script:
|
||||||
|
- tar xzvf uniworx-sanitized.tar.gz
|
||||||
|
- for i in `tar tf */layer.tar | grep 'nix/store/[0-9a-z]*-nodejs'`; do echo "NodeJS remainer found in /nix/store!"; echo "$i"; exit 1; done
|
||||||
|
artifacts:
|
||||||
|
paths:
|
||||||
|
- uniworx-sanitized.tar.gz
|
||||||
|
name: "${CI_JOB_NAME}-${CI_COMMIT_SHORT_SHA}"
|
||||||
|
expire_in: "1 day"
|
||||||
|
retry: 2
|
||||||
|
interruptible: true
|
||||||
|
rules: *dev-release-rules
|
||||||
|
|
||||||
parse changelog:
|
parse changelog:
|
||||||
stage: prepare release
|
stage: prepare release
|
||||||
@ -311,25 +450,27 @@ upload container:
|
|||||||
stage: release
|
stage: release
|
||||||
image: quay.io/skopeo/stable:latest
|
image: quay.io/skopeo/stable:latest
|
||||||
script:
|
script:
|
||||||
- skopeo --insecure-policy copy --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker-archive://$(pwd)/uniworx.tar.gz docker://${CI_REGISTRY_IMAGE}:${VERSION}
|
- skopeo --insecure-policy copy --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker-archive://$(pwd)/uniworx-sanitized.tar.gz docker://${CI_REGISTRY_IMAGE}:${VERSION}
|
||||||
- skopeo --insecure-policy copy --src-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker://${CI_REGISTRY_IMAGE}:${VERSION} docker://${CI_REGISTRY_IMAGE}:latest
|
- skopeo --insecure-policy copy --src-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker://${CI_REGISTRY_IMAGE}:${VERSION} docker://${CI_REGISTRY_IMAGE}:latest
|
||||||
needs:
|
needs:
|
||||||
- job: node dependencies # transitive
|
- job: node dependencies # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: well known # transitive
|
- job: well known # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: frontend # tranitive
|
- job: frontend # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: uniworx:lib:uniworx # transitive
|
- job: uniworx:lib:uniworx # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: uniworx:exe:uniworx # transitive
|
- job: uniworx:exe:uniworx # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: container
|
- job: container # transitive
|
||||||
artifacts: true
|
artifacts: false
|
||||||
- job: parse changelog
|
- job: parse changelog
|
||||||
artifacts: true
|
artifacts: true
|
||||||
- job: check # sanity
|
- job: check # sanity
|
||||||
artifacts: false
|
artifacts: false
|
||||||
|
- job: sanitize container
|
||||||
|
artifacts: true
|
||||||
rules: *release-rules
|
rules: *release-rules
|
||||||
retry: 2
|
retry: 2
|
||||||
upload test container:
|
upload test container:
|
||||||
@ -338,27 +479,56 @@ upload test container:
|
|||||||
stage: release
|
stage: release
|
||||||
image: quay.io/skopeo/stable:latest
|
image: quay.io/skopeo/stable:latest
|
||||||
script:
|
script:
|
||||||
- skopeo --insecure-policy copy --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker-archive://$(pwd)/uniworx.tar.gz docker://${CI_REGISTRY}/fradrive/fradrive/test:${CI_COMMIT_REF_NAME}
|
- skopeo --insecure-policy copy --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker-archive://$(pwd)/uniworx-sanitized.tar.gz docker://${CI_REGISTRY}/fradrive/fradrive/test:${CI_COMMIT_REF_NAME}
|
||||||
- skopeo --insecure-policy copy --src-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker://${CI_REGISTRY}/fradrive/fradrive/test:${CI_COMMIT_REF_NAME} docker://${CI_REGISTRY}/fradrive/fradrive/test:latest
|
- skopeo --insecure-policy copy --src-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker://${CI_REGISTRY}/fradrive/fradrive/test:${CI_COMMIT_REF_NAME} docker://${CI_REGISTRY}/fradrive/fradrive/test:latest
|
||||||
needs:
|
needs:
|
||||||
- job: node dependencies # transitive
|
- job: node dependencies # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: well known # transitive
|
- job: well known # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: frontend # tranitive
|
- job: frontend # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: uniworx:lib:uniworx # transitive
|
- job: uniworx:lib:uniworx # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: uniworx:exe:uniworx # transitive
|
- job: uniworx:exe:uniworx # transitive
|
||||||
artifacts: false
|
artifacts: false
|
||||||
- job: test container
|
- job: test container # transitive
|
||||||
artifacts: true
|
artifacts: false
|
||||||
- job: parse test changelog
|
- job: parse test changelog
|
||||||
artifacts: true
|
artifacts: true
|
||||||
- job: check # sanity
|
- job: check # sanity
|
||||||
artifacts: false
|
artifacts: false
|
||||||
|
- job: sanitize test container
|
||||||
|
artifacts: true
|
||||||
rules: *test-release-rules
|
rules: *test-release-rules
|
||||||
retry: 2
|
retry: 2
|
||||||
|
upload dev container:
|
||||||
|
variables:
|
||||||
|
GIT_STRATEGY: none
|
||||||
|
stage: release
|
||||||
|
image: quay.io/skopeo/stable:latest
|
||||||
|
script:
|
||||||
|
- skopeo --insecure-policy copy --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker-archive://$(pwd)/uniworx-sanitized.tar.gz docker://${CI_REGISTRY}/fradrive/fradrive/dev:${CI_COMMIT_REF_NAME}
|
||||||
|
- skopeo --insecure-policy copy --src-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" --dest-creds "${CI_REGISTRY_USER}:${CI_JOB_TOKEN}" docker://${CI_REGISTRY}/fradrive/fradrive/dev:${CI_COMMIT_REF_NAME} docker://${CI_REGISTRY}/fradrive/fradrive/dev:latest
|
||||||
|
needs:
|
||||||
|
- job: node dependencies # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: well known # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: frontend # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:lib:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: uniworx:exe:uniworx # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: dev container # transitive
|
||||||
|
artifacts: false
|
||||||
|
- job: check # sanity
|
||||||
|
artifacts: false
|
||||||
|
- job: sanitize dev container
|
||||||
|
artifacts: true
|
||||||
|
rules: *dev-release-rules
|
||||||
|
retry: 2
|
||||||
|
|
||||||
release:
|
release:
|
||||||
variables:
|
variables:
|
||||||
@ -394,3 +564,18 @@ test release:
|
|||||||
artifacts: false
|
artifacts: false
|
||||||
- job: parse test changelog
|
- job: parse test changelog
|
||||||
artifacts: true
|
artifacts: true
|
||||||
|
dev release:
|
||||||
|
variables:
|
||||||
|
GIT_STRATEGY: none
|
||||||
|
stage: release
|
||||||
|
image: registry.gitlab.com/gitlab-org/release-cli:latest
|
||||||
|
rules: *dev-release-rules
|
||||||
|
script:
|
||||||
|
- echo "Will create dev release ${VERSION}-dev..."
|
||||||
|
release:
|
||||||
|
name: "${VERSION}-dev"
|
||||||
|
tag_name: '$CI_COMMIT_TAG'
|
||||||
|
description: .current-changelog.md
|
||||||
|
needs:
|
||||||
|
- job: check # sanity
|
||||||
|
artifacts: false
|
||||||
|
|||||||
272
.gitlab-ci/sanitize-docker.pl
Executable file
272
.gitlab-ci/sanitize-docker.pl
Executable file
@ -0,0 +1,272 @@
|
|||||||
|
#!/usr/bin/env perl
|
||||||
|
|
||||||
|
use strict;
|
||||||
|
use warnings;
|
||||||
|
|
||||||
|
use Data::Dumper;
|
||||||
|
|
||||||
|
print "Sanitize script for node removal from container.\n";
|
||||||
|
|
||||||
|
system("pwd");
|
||||||
|
{
|
||||||
|
my @l = (".","..");
|
||||||
|
for(1..8) {
|
||||||
|
push @l, (("../" x $_)."..")
|
||||||
|
}
|
||||||
|
for(@l) {
|
||||||
|
my $cmd = "ls -ld $_";
|
||||||
|
print "running: $cmd\n";
|
||||||
|
system $cmd;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
my $tmpdir = "tmp-sanitize";
|
||||||
|
|
||||||
|
die "Has already run, abort" if -e $tmpdir;
|
||||||
|
|
||||||
|
mkdir $tmpdir;
|
||||||
|
|
||||||
|
chmodWrap(0755, $tmpdir);
|
||||||
|
chdir($tmpdir);
|
||||||
|
system("ln -s ../uniworx.tar.gz .");
|
||||||
|
system("tar xzvf uniworx.tar.gz");
|
||||||
|
chmodWrap(0755, '.'); # tar can change the rights of '.' if it contains an entry for '.' with other rights
|
||||||
|
|
||||||
|
my %truerights = ();
|
||||||
|
storeRightsMake7(".");
|
||||||
|
|
||||||
|
#print "=== Extended rights:\n";
|
||||||
|
#system("ls -l *");
|
||||||
|
#resetRights(".");
|
||||||
|
#print "=== Reset rights:\n";
|
||||||
|
#system("ls -l *");
|
||||||
|
|
||||||
|
sub chmodWrap {
|
||||||
|
my ($mode, $fn) = @_;
|
||||||
|
my $tries = 0;
|
||||||
|
die "file '$fn' does not exist; cannot change its permissions to $mode" unless -e $fn;
|
||||||
|
RIGHTS: {
|
||||||
|
chmod($mode, $fn);
|
||||||
|
my $ismode = (stat($fn))[2];
|
||||||
|
my $fm = $ismode % 512;
|
||||||
|
if($fm != $mode) {
|
||||||
|
if($tries++ > 20) {
|
||||||
|
die "Problem with file permissions, abort"
|
||||||
|
}
|
||||||
|
warn sprintf "File rights were meant to be set, but were not updated properly for file '%s', is %03o but was set to %03o; try again in 1 second";
|
||||||
|
sleep 1;
|
||||||
|
redo RIGHTS;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#
|
||||||
|
sub storeRightsMake7 {
|
||||||
|
my ($pwd) = @_;
|
||||||
|
my $dh = undef;
|
||||||
|
opendir($dh, $pwd) or die "Could not read dir '$pwd', because: $!";
|
||||||
|
while(my $fn = readdir($dh)) {
|
||||||
|
next if $fn=~m#^\.\.?$#;
|
||||||
|
#perl -le 'my $dh = undef;opendir($dh, ".");while(my $fn = readdir($dh)) { my $mode = (stat($fn))[2];my $fm = $mode % 512;my $fmo=sprintf("%03o",$fm);print "$fn -> $fmo" }'
|
||||||
|
my $fullname = "$pwd/$fn";
|
||||||
|
my $mode = (stat($fullname))[2];
|
||||||
|
my $fm = $mode % 512;
|
||||||
|
#my $fmo = sprintf("%03o",$fm);
|
||||||
|
$truerights{$fullname} = $fm;
|
||||||
|
chmodWrap(($fm | 0700), $fullname);
|
||||||
|
storeRightsMake7($fullname) if -d $fullname;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
sub resetRights {
|
||||||
|
my ($pwd) = @_;
|
||||||
|
print "Resetting rights to:\n" if '.' eq $pwd;
|
||||||
|
print Data::Dumper::Dumper(\%truerights);
|
||||||
|
my $dh = undef;
|
||||||
|
opendir($dh, $pwd) or die "Could not read dir '$pwd', because: $!";
|
||||||
|
while(my $fn = readdir($dh)) {
|
||||||
|
next if $fn=~m#^\.\.?$#;
|
||||||
|
#perl -le 'my $dh = undef;opendir($dh, ".");while(my $fn = readdir($dh)) { my $mode = (stat($fn))[2];my $fm = $mode % 512;my $fmo=sprintf("%03o",$fm);print "$fn -> $fmo" }'
|
||||||
|
my $fullname = "$pwd/$fn";
|
||||||
|
printf(" set rights of '$fullname' back to %03o\n", $truerights{$fullname});
|
||||||
|
chmodWrap($truerights{$fullname}, $fullname);
|
||||||
|
resetRights($fullname) if -d $fullname;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
sub renameWithRights {
|
||||||
|
my ($from, $to) = @_;
|
||||||
|
print " rename file '$from' to '$to'\n";
|
||||||
|
my %oldrights = %truerights;
|
||||||
|
%truerights = ();
|
||||||
|
while(my ($k,$v) = each %oldrights) {
|
||||||
|
$k =~ s#^\./\Q$from\E#./$to#;
|
||||||
|
$truerights{$k} = $v;
|
||||||
|
}
|
||||||
|
#my $rights = $truerights{$from};
|
||||||
|
#delete $truerights{$from};
|
||||||
|
rename($from, $to) or die "Could not rename '$from' to '$to', because $!";
|
||||||
|
my $waittimer = 20;
|
||||||
|
while(-e $from || not(-e $to) and $waittimer-- > 0) {
|
||||||
|
sleep 1
|
||||||
|
}
|
||||||
|
die "rename file from '$from' to '$to', but it is still there" if -e $from;
|
||||||
|
die "rename file from '$from' to '$to', but there is no file under the new name" unless -e $to;
|
||||||
|
#$truerights{$to} = $rights
|
||||||
|
}
|
||||||
|
|
||||||
|
print Data::Dumper::Dumper(\%truerights);
|
||||||
|
#exit 0;
|
||||||
|
|
||||||
|
# Checksummen:
|
||||||
|
# outerjson c27f -- toplevel $outerjson.json, by sha256sum $outerjson.json
|
||||||
|
# imageid d940 -- toplevel verzeichnis mit der layer darin; doc says: Each image’s ID is given by the SHA256 hash of its configuration JSON.
|
||||||
|
# we'll try as configuration "remove nodejs $oldhash"
|
||||||
|
# or we just use a random number ;)
|
||||||
|
# layertar fd3d -- doc says: Each image’s ID is given by the SHA256 hash of its configuration JSON.
|
||||||
|
#
|
||||||
|
##### FOUND
|
||||||
|
# outerjson c27f64c8de183296ef409baecc27ddac8cd4065aac760b1b512caf482ad782dd -- in manifest.json
|
||||||
|
# imageid d940253667b5ab47060e8bf537bd5b3e66a2447978f3c784a22b115a262fccbf -- in manifest.json
|
||||||
|
# imageid d940253667b5ab47060e8bf537bd5b3e66a2447978f3c784a22b115a262fccbf -- as toplevel dirname
|
||||||
|
# outerjson c27f64c8de183296ef409baecc27ddac8cd4065aac760b1b512caf482ad782dd -- as toplevel filename
|
||||||
|
# imageid d940253667b5ab47060e8bf537bd5b3e66a2447978f3c784a22b115a262fccbf -- in $layerdir/json
|
||||||
|
# layertar fd3d3cdf4ece09864ac933aa664eb5f397cf5ca28652125addd689726f8485cd -- in $outerjson.json
|
||||||
|
#
|
||||||
|
#
|
||||||
|
##### COMPUTE
|
||||||
|
# toplevel
|
||||||
|
# outerjson c27f64c8de183296ef409baecc27ddac8cd4065aac760b1b512caf482ad782dd $outerjson.json
|
||||||
|
# b21db3fcc85b23d91067a2a5834e114ca9eec0364742c8680546f040598d8cd9 manifest.json
|
||||||
|
# 238f234e3a1ddb27a034f4ee1e59735175741e5cc05673b5dd41d9a42bac2ebd uniworx.tar.gz
|
||||||
|
# in $layerdir/
|
||||||
|
# 028c1e8d9688b420f7316bb44ce0e26f4712dc21ef93c5af8000c102b1405ad4 json
|
||||||
|
# layertar fd3d3cdf4ece09864ac933aa664eb5f397cf5ca28652125addd689726f8485cd layer.tar
|
||||||
|
# d0ff5974b6aa52cf562bea5921840c032a860a91a3512f7fe8f768f6bbe005f6 VERSION
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# sha256sum layer.tar fd3d3cdf4ece09864ac933aa664eb5f397cf5ca28652125addd689726f8485cd
|
||||||
|
|
||||||
|
my ($outerjson, $imageid) = ();
|
||||||
|
|
||||||
|
{
|
||||||
|
my $dirh = undef;
|
||||||
|
opendir($dirh, '.') or die "Could not read dir '.', because: $!";
|
||||||
|
while(my $fn = readdir($dirh)) {
|
||||||
|
next if $fn=~m#^\.#;
|
||||||
|
if($fn=~m#(.{16,})\.json#) { # it shall match on hash sums but not for example on manifest.json
|
||||||
|
$outerjson = $1;
|
||||||
|
next
|
||||||
|
}
|
||||||
|
if($fn=~m#^[0-9a-f]{64}$#) {
|
||||||
|
$imageid = $fn
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
die "Bad archive, could not found expected files and directories" unless defined($outerjson) and defined($imageid);
|
||||||
|
|
||||||
|
#system("pwd");
|
||||||
|
#print "will run: sha256sum $imageid/layer.tar\n";
|
||||||
|
|
||||||
|
my $oldLayerdir = qx(sha256sum $imageid/layer.tar);
|
||||||
|
#print "oldLayerdir is for now $oldLayerdir\n\n";
|
||||||
|
$oldLayerdir =~ m#^([0-9a-f]{64}).*$# or die "layer.tar not found or sha256sum not installed!";
|
||||||
|
$oldLayerdir = $1;
|
||||||
|
|
||||||
|
# tar --delete --file layer.tar nix/store/cdalbhzm3z4gz07wyg89maprdbjc4yah-nodejs-14.17.0
|
||||||
|
my $layerContent = qx(tar -tf $imageid/layer.tar);
|
||||||
|
|
||||||
|
my @rms = $layerContent=~m#^((?:\./)?nix/store/[a-z0-9]+-(?:nodejs|openjdk|ghc)-[^/]+/)$#gm;
|
||||||
|
|
||||||
|
print "rm <<$_>>\n" for @rms;
|
||||||
|
|
||||||
|
system("tar --delete --file $imageid/layer.tar '$_'") for @rms;
|
||||||
|
|
||||||
|
|
||||||
|
### Deconstruction finished, now lets put everything together again after fixing the checksums
|
||||||
|
|
||||||
|
|
||||||
|
my $newImageId = qx(echo 'remove nodejs $imageid' | sha256sum);
|
||||||
|
$newImageId =~ m#^([0-9a-f]{64}).*$# or die "sha256sum not installed!";
|
||||||
|
$newImageId = $1;
|
||||||
|
|
||||||
|
my $newLayerdir = qx(sha256sum $imageid/layer.tar);
|
||||||
|
$newLayerdir =~ m#^([0-9a-f]{64}).*$# or die "sha256sum not installed!";
|
||||||
|
$newLayerdir = $1;
|
||||||
|
|
||||||
|
# new outerjson is computed later, as we first have to change its content
|
||||||
|
|
||||||
|
sub cautionWaiter {
|
||||||
|
# some file operations give the impression that they are not instant.
|
||||||
|
# Hence, we wait here a bit to see if that fixes stuff
|
||||||
|
#sleep 5; # seems not to be the reason
|
||||||
|
}
|
||||||
|
|
||||||
|
sub replaceInFile {
|
||||||
|
my ($filename, $replacer) = @_;
|
||||||
|
return unless -e $filename;
|
||||||
|
my $fh = undef;
|
||||||
|
open($fh, '<', $filename) or die "Could not read $filename, because: $!";
|
||||||
|
my $content = join '', <$fh>;
|
||||||
|
close $fh;
|
||||||
|
keys %$replacer;
|
||||||
|
while(my ($k,$v) = each %$replacer) {
|
||||||
|
$content=~s#\Q$k\E#$v#g;
|
||||||
|
}
|
||||||
|
my $wh = undef;
|
||||||
|
open($wh, '>', $filename) or die "Could not write $filename, because: $!";
|
||||||
|
print $wh $content;
|
||||||
|
close $wh;
|
||||||
|
}
|
||||||
|
|
||||||
|
my %replacer = (
|
||||||
|
$oldLayerdir => $newLayerdir,
|
||||||
|
$imageid => $newImageId,
|
||||||
|
);
|
||||||
|
|
||||||
|
replaceInFile("$imageid/json", \%replacer);
|
||||||
|
replaceInFile("$outerjson.json", \%replacer);
|
||||||
|
|
||||||
|
cautionWaiter();
|
||||||
|
|
||||||
|
my $newOuterjson = qx(sha256sum '$outerjson.json');
|
||||||
|
$newOuterjson =~ m#^([0-9a-f]{64}).*$# or die "sha256sum not installed!";
|
||||||
|
$newOuterjson = $1;
|
||||||
|
|
||||||
|
cautionWaiter();
|
||||||
|
|
||||||
|
renameWithRights("$outerjson.json", "$newOuterjson.json");
|
||||||
|
$replacer{$outerjson} = $newOuterjson;
|
||||||
|
|
||||||
|
replaceInFile("manifest.json", \%replacer);
|
||||||
|
|
||||||
|
replaceInFile("repositories", \%replacer);
|
||||||
|
|
||||||
|
cautionWaiter();
|
||||||
|
renameWithRights($imageid, $newImageId);
|
||||||
|
|
||||||
|
cautionWaiter();
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
resetRights(".");
|
||||||
|
|
||||||
|
|
||||||
|
system("find");
|
||||||
|
|
||||||
|
unlink("uniworx.tar.gz");
|
||||||
|
|
||||||
|
system("tar czvf uniwox-rmnodejs.tar.gz *");
|
||||||
|
|
||||||
|
cautionWaiter();
|
||||||
|
print "Debug output, content of container:\n";
|
||||||
|
system("tar tzvf uniwox-rmnodejs.tar.gz");
|
||||||
|
|
||||||
|
cautionWaiter();
|
||||||
|
#unlink("../uniworx.tar.gz");
|
||||||
|
|
||||||
|
system("cp uniwox-rmnodejs.tar.gz ../uniworx-sanitized.tar.gz");
|
||||||
|
|
||||||
64
.ports/assign.hs
Normal file
64
.ports/assign.hs
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2024 David Mosbach <david.mosbach@uniworx.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
{-# Language OverloadedStrings, LambdaCase, TypeApplications #-}
|
||||||
|
|
||||||
|
import Data.Text (Text)
|
||||||
|
import qualified Data.Text as T
|
||||||
|
import System.Directory
|
||||||
|
import System.Environment
|
||||||
|
import System.IO
|
||||||
|
|
||||||
|
main :: IO ()
|
||||||
|
main = getArgs >>= \case
|
||||||
|
["--assign", offsetFile] -> parseOffsets offsetFile >>= uncurry nextOffset
|
||||||
|
["--remove", offset] -> removeOffset offset
|
||||||
|
_ -> fail "unsupported args"
|
||||||
|
|
||||||
|
parseOffsets :: FilePath -> IO (Int,Int)
|
||||||
|
parseOffsets offsetFile = do
|
||||||
|
user <- T.pack <$> getEnv "USER"
|
||||||
|
let pred x = "//" `T.isPrefixOf` x || T.null (T.strip x)
|
||||||
|
tokenise = map (filter (not . pred) . T.lines) . T.split (=='#')
|
||||||
|
extract = map tail . filter (\u -> not (null u) && user == (T.strip $ head u))
|
||||||
|
((extract . tokenise . T.pack) <$> readFile offsetFile) >>= \case
|
||||||
|
[[min,max]] -> return (read $ T.unpack min, read $ T.unpack max)
|
||||||
|
x -> print x >> fail "malformed offset file"
|
||||||
|
|
||||||
|
nextOffset :: Int -> Int -> IO ()
|
||||||
|
nextOffset min max
|
||||||
|
| min > max = nextOffset max min
|
||||||
|
| otherwise = do
|
||||||
|
home <- getEnv "HOME"
|
||||||
|
offset <- findFile [home] ".port-offsets" >>= \case
|
||||||
|
Nothing -> writeFile (home ++ "/.port-offsets") (show min) >> return min
|
||||||
|
Just path -> do
|
||||||
|
used <- (map (read @Int) . filter (not . null) . lines) <$> readFile path
|
||||||
|
o <- next min max used
|
||||||
|
appendFile path ('\n' : show o)
|
||||||
|
return o
|
||||||
|
print offset
|
||||||
|
where
|
||||||
|
next :: Int -> Int -> [Int] -> IO Int
|
||||||
|
next min max used
|
||||||
|
| min > max = fail "all offsets currently in use"
|
||||||
|
| min `elem` used = next (min+1) max used
|
||||||
|
| otherwise = return min
|
||||||
|
|
||||||
|
removeOffset :: String -> IO ()
|
||||||
|
removeOffset offset = do
|
||||||
|
home <- getEnv "HOME"
|
||||||
|
findFile [home] ".port-offsets" >>= \case
|
||||||
|
Nothing -> fail "offset file does not exist"
|
||||||
|
Just path -> do
|
||||||
|
remaining <- (filter (/= offset) . lines) <$> readFile path
|
||||||
|
run <- getEnv "XDG_RUNTIME_DIR"
|
||||||
|
(tempPath, fh) <- openTempFile run ".port-offsets"
|
||||||
|
let out = unlines remaining
|
||||||
|
hPutStr fh $ out
|
||||||
|
case T.null (T.strip $ T.pack out) of
|
||||||
|
True -> removeFile path
|
||||||
|
False -> writeFile path $ out
|
||||||
|
removeFile tempPath
|
||||||
|
|
||||||
24
.ports/offsets
Normal file
24
.ports/offsets
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
// SPDX-FileCopyrightText: 2024 David Mosbach <david.mosbach@uniworx.de>
|
||||||
|
//
|
||||||
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
# gkleen
|
||||||
|
-1000
|
||||||
|
-950
|
||||||
|
|
||||||
|
# ishka
|
||||||
|
-949
|
||||||
|
-899
|
||||||
|
|
||||||
|
# jost
|
||||||
|
-898
|
||||||
|
-848
|
||||||
|
|
||||||
|
# mosbach
|
||||||
|
-847
|
||||||
|
-797
|
||||||
|
|
||||||
|
# savau
|
||||||
|
-796
|
||||||
|
-746
|
||||||
|
|
||||||
1670
CHANGELOG.md
1670
CHANGELOG.md
File diff suppressed because it is too large
Load Diff
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, David Mosbach <david.mosbach@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -25,8 +25,8 @@ mail-from:
|
|||||||
mail-object-domain: "_env:MAILOBJECT_DOMAIN:localhost"
|
mail-object-domain: "_env:MAILOBJECT_DOMAIN:localhost"
|
||||||
mail-use-replyto-instead-sender: "_env:MAIL_USES_REPLYTO:true"
|
mail-use-replyto-instead-sender: "_env:MAIL_USES_REPLYTO:true"
|
||||||
mail-reroute-to:
|
mail-reroute-to:
|
||||||
name: "_env:MAIL_REROUTE_TO_NAME:"
|
name: "_env:MAIL_REROUTE_TO_NAME:"
|
||||||
email: "_env:MAIL_REROUTE_TO_EMAIL:"
|
email: "_env:MAIL_REROUTE_TO_EMAIL:"
|
||||||
#mail-verp:
|
#mail-verp:
|
||||||
# separator: "_env:VERP_SEPARATOR:+"
|
# separator: "_env:VERP_SEPARATOR:+"
|
||||||
# prefix: "_env:VERP_PREFIX:bounce"
|
# prefix: "_env:VERP_PREFIX:bounce"
|
||||||
@ -66,7 +66,7 @@ keep-unreferenced-files: 86400
|
|||||||
health-check-interval:
|
health-check-interval:
|
||||||
matching-cluster-config: "_env:HEALTHCHECK_INTERVAL_MATCHING_CLUSTER_CONFIG:600"
|
matching-cluster-config: "_env:HEALTHCHECK_INTERVAL_MATCHING_CLUSTER_CONFIG:600"
|
||||||
http-reachable: "_env:HEALTHCHECK_INTERVAL_HTTP_REACHABLE:600"
|
http-reachable: "_env:HEALTHCHECK_INTERVAL_HTTP_REACHABLE:600"
|
||||||
ldap-admins: "_env:HEALTHCHECK_INTERVAL_LDAP_ADMINS:600"
|
ldap-admins: "_env:HEALTHCHECK_INTERVAL_LDAP_ADMINS:600" # TODO: either generalize over every external auth sources, or otherwise reimplement for different semantics
|
||||||
smtp-connect: "_env:HEALTHCHECK_INTERVAL_SMTP_CONNECT:600"
|
smtp-connect: "_env:HEALTHCHECK_INTERVAL_SMTP_CONNECT:600"
|
||||||
widget-memcached: "_env:HEALTHCHECK_INTERVAL_WIDGET_MEMCACHED:600"
|
widget-memcached: "_env:HEALTHCHECK_INTERVAL_WIDGET_MEMCACHED:600"
|
||||||
active-job-executors: "_env:HEALTHCHECK_INTERVAL_ACTIVE_JOB_EXECUTORS:60"
|
active-job-executors: "_env:HEALTHCHECK_INTERVAL_ACTIVE_JOB_EXECUTORS:60"
|
||||||
@ -77,13 +77,10 @@ health-check-http: "_env:HEALTHCHECK_HTTP:true" # Can we assume, that we can rea
|
|||||||
health-check-active-job-executors-timeout: "_env:HEALTHCHECK_ACTIVE_JOB_EXECUTORS_TIMEOUT:5"
|
health-check-active-job-executors-timeout: "_env:HEALTHCHECK_ACTIVE_JOB_EXECUTORS_TIMEOUT:5"
|
||||||
health-check-active-widget-memcached-timeout: "_env:HEALTHCHECK_ACTIVE_WIDGET_MEMCACHED_TIMEOUT:2"
|
health-check-active-widget-memcached-timeout: "_env:HEALTHCHECK_ACTIVE_WIDGET_MEMCACHED_TIMEOUT:2"
|
||||||
health-check-smtp-connect-timeout: "_env:HEALTHCHECK_SMTP_CONNECT_TIMEOUT:5"
|
health-check-smtp-connect-timeout: "_env:HEALTHCHECK_SMTP_CONNECT_TIMEOUT:5"
|
||||||
health-check-ldap-admins-timeout: "_env:HEALTHCHECK_LDAP_ADMINS_TIMEOUT:60"
|
health-check-ldap-admins-timeout: "_env:HEALTHCHECK_LDAP_ADMINS_TIMEOUT:60" # TODO: either generalize over every external auth sources, or otherwise reimplement for different semantics
|
||||||
health-check-http-reachable-timeout: "_env:HEALTHCHECK_HTTP_REACHABLE_TIMEOUT:2"
|
health-check-http-reachable-timeout: "_env:HEALTHCHECK_HTTP_REACHABLE_TIMEOUT:2"
|
||||||
health-check-matching-cluster-config-timeout: "_env:HEALTHCHECK_MATCHING_CLUSTER_CONFIG_TIMEOUT:2"
|
health-check-matching-cluster-config-timeout: "_env:HEALTHCHECK_MATCHING_CLUSTER_CONFIG_TIMEOUT:2"
|
||||||
|
|
||||||
synchronise-ldap-users-within: "_env:SYNCHRONISE_LDAP_WITHIN:1209600" # 14 Tage in Sekunden
|
|
||||||
synchronise-ldap-users-interval: "_env:SYNCHRONISE_LDAP_INTERVAL:3600" # jede Stunde
|
|
||||||
|
|
||||||
synchronise-avs-users-within: "_env:SYNCHRONISE_AVS_WITHIN:5702400" # alle 66 Tage
|
synchronise-avs-users-within: "_env:SYNCHRONISE_AVS_WITHIN:5702400" # alle 66 Tage
|
||||||
synchronise-avs-users-interval: "_env:SYNCHRONISE_AVS_INTERVAL:21600" # alle 6 Stunden
|
synchronise-avs-users-interval: "_env:SYNCHRONISE_AVS_INTERVAL:21600" # alle 6 Stunden
|
||||||
|
|
||||||
@ -129,24 +126,47 @@ database:
|
|||||||
database: "_env:PGDATABASE:uniworx"
|
database: "_env:PGDATABASE:uniworx"
|
||||||
poolsize: "_env:PGPOOLSIZE:990"
|
poolsize: "_env:PGPOOLSIZE:990"
|
||||||
|
|
||||||
auto-db-migrate: '_env:AUTO_DB_MIGRATE:true'
|
auto-db-migrate: "_env:AUTO_DB_MIGRATE:true"
|
||||||
|
|
||||||
ldap:
|
# External sources used for user authentication and userdata lookups
|
||||||
- host: "_env:LDAPHOST:"
|
user-auth:
|
||||||
tls: "_env:LDAPTLS:"
|
# mode: single-source
|
||||||
port: "_env:LDAPPORT:389"
|
protocol: azureadv2
|
||||||
user: "_env:LDAPUSER:"
|
config:
|
||||||
pass: "_env:LDAPPASS:"
|
client-id: "_env:AZURECLIENTID:00000000-0000-0000-0000-000000000000"
|
||||||
baseDN: "_env:LDAPBASE:"
|
client-secret: "_env:AZURECLIENTSECRET:''"
|
||||||
scope: "_env:LDAPSCOPE:WholeSubtree"
|
tenant-id: "_env:AZURETENANTID:00000000-0000-0000-0000-000000000000"
|
||||||
timeout: "_env:LDAPTIMEOUT:5"
|
scopes: "_env:AZURESCOPES:[ID,Profile]"
|
||||||
search-timeout: "_env:LDAPSEARCHTIME:5"
|
# protocol: "ldap"
|
||||||
pool:
|
# config:
|
||||||
stripes: "_env:LDAPSTRIPES:1"
|
# host: "_env:LDAPHOST:"
|
||||||
timeout: "_env:LDAPTIMEOUT:20"
|
# tls: "_env:LDAPTLS:"
|
||||||
limit: "_env:LDAPLIMIT:10"
|
# port: "_env:LDAPPORT:389"
|
||||||
|
# user: "_env:LDAPUSER:"
|
||||||
|
# pass: "_env:LDAPPASS:"
|
||||||
|
# baseDN: "_env:LDAPBASE:"
|
||||||
|
# scope: "_env:LDAPSCOPE:WholeSubtree"
|
||||||
|
# timeout: "_env:LDAPTIMEOUT:5"
|
||||||
|
# search-timeout: "_env:LDAPSEARCHTIME:5"
|
||||||
|
|
||||||
ldap-re-test-failover: 60
|
single-sign-on: "_env:OIDC_SSO:false"
|
||||||
|
|
||||||
|
# Automatically redirect to SSO route when not signed on
|
||||||
|
# Note: This will force authentication, thus the site will be inaccessible without external credentials. Only use this option when it is ensured that every user that should be able to access the site has valid external credentials!
|
||||||
|
auto-sign-on: "_env:AUTO_SIGN_ON:false"
|
||||||
|
|
||||||
|
# TODO: generalize for arbitrary auth protocols
|
||||||
|
# TODO: maybe use separate pools for external databases?
|
||||||
|
ldap-pool:
|
||||||
|
stripes: "_env:LDAPSTRIPES:1"
|
||||||
|
timeout: "_env:LDAPTIMEOUT:20"
|
||||||
|
limit: "_env:LDAPLIMIT:10"
|
||||||
|
|
||||||
|
# TODO: reintroduce and move into failover settings once failover mode has been reimplemented
|
||||||
|
# user-retest-failover: 60
|
||||||
|
# TODO; maybe implement syncWithin and syncInterval per auth source
|
||||||
|
user-sync-within: "_env:USER_SYNC_WITHIN:1209600" # 14 Tage in Sekunden
|
||||||
|
user-sync-interval: "_env:USER_SYNC_INTERVAL:3600" # jede Stunde
|
||||||
|
|
||||||
lms-direct:
|
lms-direct:
|
||||||
upload-header: "_env:LMSUPLOADHEADER:true"
|
upload-header: "_env:LMSUPLOADHEADER:true"
|
||||||
|
|||||||
@ -16,8 +16,13 @@ fi
|
|||||||
branch="$(git rev-parse --abbrev-ref HEAD)"
|
branch="$(git rev-parse --abbrev-ref HEAD)"
|
||||||
|
|
||||||
if [[ $branch != "master" && $branch != "test" ]]; then
|
if [[ $branch != "master" && $branch != "test" ]]; then
|
||||||
|
if echo $@ | grep -xqe '--dev';
|
||||||
|
then
|
||||||
|
: # dev-releases possible on any branch
|
||||||
|
else
|
||||||
echo "Not on master or test" >&2
|
echo "Not on master or test" >&2
|
||||||
exit 1
|
exit 1
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
ourHash=$(git rev-parse HEAD)
|
ourHash=$(git rev-parse HEAD)
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -128,6 +128,8 @@ InterfaceName: Schnittstelle
|
|||||||
InterfaceLastSynch: Zuletzt
|
InterfaceLastSynch: Zuletzt
|
||||||
InterfaceSubtype: Betreffend
|
InterfaceSubtype: Betreffend
|
||||||
InterfaceWrite: Schreibend
|
InterfaceWrite: Schreibend
|
||||||
|
|
||||||
|
AdminUserPassword: Passwort
|
||||||
InterfaceSuccess: Rückmeldung
|
InterfaceSuccess: Rückmeldung
|
||||||
InterfaceInfo: Nachricht
|
InterfaceInfo: Nachricht
|
||||||
InterfaceFreshness: Prüfungszeitraum (h)
|
InterfaceFreshness: Prüfungszeitraum (h)
|
||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -128,6 +128,8 @@ InterfaceName: Interface
|
|||||||
InterfaceLastSynch: Last
|
InterfaceLastSynch: Last
|
||||||
InterfaceSubtype: Affecting
|
InterfaceSubtype: Affecting
|
||||||
InterfaceWrite: Write
|
InterfaceWrite: Write
|
||||||
|
|
||||||
|
AdminUserPassword: Password
|
||||||
InterfaceSuccess: Returned
|
InterfaceSuccess: Returned
|
||||||
InterfaceInfo: Message
|
InterfaceInfo: Message
|
||||||
InterfaceFreshness: Check hours
|
InterfaceFreshness: Check hours
|
||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 David Mosbach <david.mosbach@uniworx.de>, Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -72,8 +72,8 @@ UnauthorizedTutorialTutorControl: Ausbilder:innen dürfen diesen Kurs nicht edit
|
|||||||
UnauthorizedCourseTutor: Sie sind nicht Ausbilder:in für diese Kursart.
|
UnauthorizedCourseTutor: Sie sind nicht Ausbilder:in für diese Kursart.
|
||||||
UnauthorizedTutor: Sie sind nicht Ausbilder:in.
|
UnauthorizedTutor: Sie sind nicht Ausbilder:in.
|
||||||
UnauthorizedTutorialRegisterGroup: Sie sind bereits in einem Kurs mit derselben Registrierungs-Gruppe eingetragen.
|
UnauthorizedTutorialRegisterGroup: Sie sind bereits in einem Kurs mit derselben Registrierungs-Gruppe eingetragen.
|
||||||
UnauthorizedLDAP: Angegebener Nutzer/Angegebene Nutzerin meldet sich nicht mit Fraport Login an.
|
UnauthorizedExternal: Angegebene:r Benuzter:in meldet sich nicht über einen aktuell unterstützten externen Login an.
|
||||||
UnauthorizedPWHash: Angegebener Nutzer/Angegebene Nutzerin meldet sich nicht mit FRADrive-Kennung an.
|
UnauthorizedInternal: Angegebene:r Benutzer:in meldet sich nicht mit FRADrive-Kennung an.
|
||||||
UnauthorizedExternalExamListNotEmpty: Liste von externen Prüfungen ist nicht leer
|
UnauthorizedExternalExamListNotEmpty: Liste von externen Prüfungen ist nicht leer
|
||||||
UnauthorizedExternalExamLecturer: Sie sind nicht als Prüfer:in für diese externe Prüfung eingetragen
|
UnauthorizedExternalExamLecturer: Sie sind nicht als Prüfer:in für diese externe Prüfung eingetragen
|
||||||
UnauthorizedSubmissionSubmissionGroup: Sie sind nicht Mitglied in einer der registrierten Abgabegruppen, die an dieser Abgabe beteiligt sind
|
UnauthorizedSubmissionSubmissionGroup: Sie sind nicht Mitglied in einer der registrierten Abgabegruppen, die an dieser Abgabe beteiligt sind
|
||||||
@ -102,15 +102,15 @@ LDAPLoginTitle: Fraport Login für interne und externe Nutzer
|
|||||||
PWHashLoginTitle: Spezieller Funktionsnutzer Login
|
PWHashLoginTitle: Spezieller Funktionsnutzer Login
|
||||||
PWHashLoginNote: Verwenden Sie dieses Formular nur, wenn Sie explizit dazu aufgefordert wurden. Alle anderen sollten das andere Login Formular verwenden!
|
PWHashLoginNote: Verwenden Sie dieses Formular nur, wenn Sie explizit dazu aufgefordert wurden. Alle anderen sollten das andere Login Formular verwenden!
|
||||||
DummyLoginTitle: Development-Login
|
DummyLoginTitle: Development-Login
|
||||||
InternalLdapError: Interner Fehler beim Fraport Büko-Login
|
InternalLoginError: Interner Fehler beim Login
|
||||||
CampusUserInvalidIdent: Konnte anhand des Fraport Büko-Logins keine eindeutige Identifikation ermitteln
|
DecodeUserInvalidIdent: Konnte anhand des Fraport Büko-Logins keine eindeutige Identifikation ermitteln
|
||||||
CampusUserInvalidEmail: Konnte anhand des Fraport Büko-Logins keine E-Mail-Addresse ermitteln
|
DecodeUserInvalidEmail: Konnte anhand des Fraport Büko-Logins keine E-Mail-Addresse ermitteln
|
||||||
CampusUserInvalidDisplayName: Konnte anhand des Fraport Büko-Logins keinen vollen Namen ermitteln
|
DecodeUserInvalidDisplayName: Konnte anhand des Fraport Büko-Logins keinen vollen Namen ermitteln
|
||||||
CampusUserInvalidGivenName: Konnte anhand des Fraport Büko-Logins keinen Vornamen ermitteln
|
DecodeUserInvalidGivenName: Konnte anhand des Fraport Büko-Logins keinen Vornamen ermitteln
|
||||||
CampusUserInvalidSurname: Konnte anhand des Fraport Büko-Logins keinen Nachname ermitteln
|
DecodeUserInvalidSurname: Konnte anhand des Fraport Büko-Logins keinen Nachname ermitteln
|
||||||
CampusUserInvalidTitle: Konnte anhand des Fraport Büko-Logins keinen akademischen Titel ermitteln
|
DecodeUserInvalidTitle: Konnte anhand des Fraport Büko-Logins keinen akademischen Titel ermitteln
|
||||||
CampusUserInvalidFeaturesOfStudy parseErr@Text: Konnte anhand des Fraport Büko-Logins keine Studiengänge ermitteln
|
DecodeUserInvalidFeaturesOfStudy parseErr@Text: Konnte anhand des Fraport Büko-Logins keine Studiengänge ermitteln
|
||||||
CampusUserInvalidAssociatedSchools parseErr@Text: Konnte anhand des Fraport Büko-Logins keine Bereiche ermitteln
|
DecodeUserInvalidAssociatedSchools parseErr@Text: Konnte anhand des Fraport Büko-Logins keine Bereiche ermitteln
|
||||||
InvalidCredentialsADNoSuchObject: Benutzereintrag existiert nicht
|
InvalidCredentialsADNoSuchObject: Benutzereintrag existiert nicht
|
||||||
InvalidCredentialsADLogonFailure: Ungültiges Passwort
|
InvalidCredentialsADLogonFailure: Ungültiges Passwort
|
||||||
InvalidCredentialsADAccountRestriction: Beschränkungen des Fraport Accounts verhindern Login
|
InvalidCredentialsADAccountRestriction: Beschränkungen des Fraport Accounts verhindern Login
|
||||||
@ -139,3 +139,6 @@ FormHoneypotNamePlaceholder: Name
|
|||||||
FormHoneypotComment: Kommentar
|
FormHoneypotComment: Kommentar
|
||||||
FormHoneypotCommentPlaceholder: Kommentar
|
FormHoneypotCommentPlaceholder: Kommentar
|
||||||
FormHoneypotFilled: Bitte füllen Sie keines der verstecken Felder aus
|
FormHoneypotFilled: Bitte füllen Sie keines der verstecken Felder aus
|
||||||
|
|
||||||
|
Logout: Abmeldung
|
||||||
|
SingleSignOut: Abmeldung bei Azure
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, David Mosbach <david.mosbach@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -72,8 +72,8 @@ UnauthorizedTutorialTutorControl: Instructors may not edit this course.
|
|||||||
UnauthorizedCourseTutor: You are no instructor for this course.
|
UnauthorizedCourseTutor: You are no instructor for this course.
|
||||||
UnauthorizedTutor: You are no instructor.
|
UnauthorizedTutor: You are no instructor.
|
||||||
UnauthorizedTutorialRegisterGroup: You are already registered for a course with the same registration group.
|
UnauthorizedTutorialRegisterGroup: You are already registered for a course with the same registration group.
|
||||||
UnauthorizedLDAP: Specified user does not log in with their Fraport password.
|
UnauthorizedExternal: Specified user does not log in with any currently supported external login.
|
||||||
UnauthorizedPWHash: Specified user does not log in with an FRADrive-account.
|
UnauthorizedInternal: Specified user does not log in with a FRADrive-account.
|
||||||
UnauthorizedExternalExamListNotEmpty: List of external exams is not empty
|
UnauthorizedExternalExamListNotEmpty: List of external exams is not empty
|
||||||
UnauthorizedExternalExamLecturer: You are not an associated person for this external exam
|
UnauthorizedExternalExamLecturer: You are not an associated person for this external exam
|
||||||
UnauthorizedSubmissionSubmissionGroup: You are not member in any of the submission groups for this submission
|
UnauthorizedSubmissionSubmissionGroup: You are not member in any of the submission groups for this submission
|
||||||
@ -103,15 +103,15 @@ LDAPLoginTitle: Fraport login for intern and extern users
|
|||||||
PWHashLoginTitle: Special function user login
|
PWHashLoginTitle: Special function user login
|
||||||
PWHashLoginNote: Only use this login form if you have received special instructions to do so. All others should use the other login field.
|
PWHashLoginNote: Only use this login form if you have received special instructions to do so. All others should use the other login field.
|
||||||
DummyLoginTitle: Development login
|
DummyLoginTitle: Development login
|
||||||
InternalLdapError: Internal error during Fraport Büko login
|
InternalLoginError: Internal error during login
|
||||||
CampusUserInvalidIdent: Could not determine unique identification during Fraport Büko login
|
DecodeUserInvalidIdent: Could not determine unique identification during Fraport Büko login
|
||||||
CampusUserInvalidEmail: Could not determine email address during Fraport Büko login
|
DecodeUserInvalidEmail: Could not determine email address during Fraport Büko login
|
||||||
CampusUserInvalidDisplayName: Could not determine display name during Fraport Büko login
|
DecodeUserInvalidDisplayName: Could not determine display name during Fraport Büko login
|
||||||
CampusUserInvalidGivenName: Could not determine given name during Fraport Büko login
|
DecodeUserInvalidGivenName: Could not determine given name during Fraport Büko login
|
||||||
CampusUserInvalidSurname: Could not determine surname during Fraport Büko login
|
DecodeUserInvalidSurname: Could not determine surname during Fraport Büko login
|
||||||
CampusUserInvalidTitle: Could not determine title during Fraport Büko login
|
DecodeUserInvalidTitle: Could not determine title during Fraport Büko login
|
||||||
CampusUserInvalidFeaturesOfStudy parseErr: Could not determine features of study during Fraport Büko login
|
DecodeUserInvalidFeaturesOfStudy parseErr: Could not determine features of study during Fraport Büko login
|
||||||
CampusUserInvalidAssociatedSchools parseErr: Could not determine associated departments during Fraport Büko login
|
DecodeUserInvalidAssociatedSchools parseErr: Could not determine associated departments during Fraport Büko login
|
||||||
InvalidCredentialsADNoSuchObject: User entry does not exist
|
InvalidCredentialsADNoSuchObject: User entry does not exist
|
||||||
InvalidCredentialsADLogonFailure: Invalid password
|
InvalidCredentialsADLogonFailure: Invalid password
|
||||||
InvalidCredentialsADAccountRestriction: Restrictions on your Fraport account prevent a login
|
InvalidCredentialsADAccountRestriction: Restrictions on your Fraport account prevent a login
|
||||||
@ -140,3 +140,6 @@ FormHoneypotNamePlaceholder !ident-ok: Name
|
|||||||
FormHoneypotComment: Comment
|
FormHoneypotComment: Comment
|
||||||
FormHoneypotCommentPlaceholder: Comment
|
FormHoneypotCommentPlaceholder: Comment
|
||||||
FormHoneypotFilled: Please do not fill in any of the hidden fields
|
FormHoneypotFilled: Please do not fill in any of the hidden fields
|
||||||
|
|
||||||
|
Logout: Logout
|
||||||
|
SingleSignOut: Azure logout
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -75,11 +75,10 @@ NotPassed: Nicht bestanden
|
|||||||
|
|
||||||
#userAuthModeUpdate.hs + templates
|
#userAuthModeUpdate.hs + templates
|
||||||
MailSubjectUserAuthModeUpdate: Ihr FRADrive-Login
|
MailSubjectUserAuthModeUpdate: Ihr FRADrive-Login
|
||||||
UserAuthModeChangedToLDAP: Sie können sich nun mit Ihrer Fraport AG Kennung (Büko) in FRADrive einloggen.
|
UserAuthPasswordEnabled: Sie können sich nun mit einer FRADrive-internen Kennung einloggen.
|
||||||
UserAuthModeChangedToPWHash: Sie können sich nun mit einer FRADrive-internen Kennung einloggen.
|
UserAuthPasswordDisabled: Sie können sich nun nicht mehr mit Ihrer FRADrive-internen Kennung einloggen.
|
||||||
UserAuthModeChangedToNoLogin: Ihr Login auf der FRADrive Webseite wurde deaktiviert, aber ihr FRADrive Konto besteht weiterhin. Gültigkeit und Verlängerungen Ihrer Qualifikationen sind dadurch nicht beeinträchtigt. Wenden Sie sich an die Fahrschuladmins, wenn der Login auf der FRADrive Webseite benötigt werden sollte.
|
AuthExternalLoginTip: Sollten Sie Zugriff zu einem von FRADrive unterstützten externen Account (Azure-Login über Fraport-Kennung, Fraport-BüKo-Login) besitzen, so können Sie sich mit Ihren externen Login-Daten in FRADrive einloggen.
|
||||||
AuthPWHashTip: Sie müssen nun das mit "FRADrive-Login" beschriftete Login-Formular verwenden. Stellen Sie bitte sicher, dass Sie ein Passwort gesetzt haben, bevor Sie versuchen sich anzumelden.
|
PasswordResetEmailIncoming: Einen Link um ihr Passwort zu setzen bzw. zu ändern bekommen Sie aus Sicherheitsgründen in einer separaten E-Mail.
|
||||||
PasswordResetEmailIncoming: Einen Link um ihr Passwort zu setzen bzw. zu ändern bekommen Sie, aus Sicherheitsgründen, in einer separaten E-Mail.
|
|
||||||
MailFradrive !ident-ok: FRADrive
|
MailFradrive !ident-ok: FRADrive
|
||||||
MailBodyFradrive: ist die Führerscheinverwaltungsapp der Fraport AG.
|
MailBodyFradrive: ist die Führerscheinverwaltungsapp der Fraport AG.
|
||||||
|
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -75,10 +75,9 @@ NotPassed: Failed
|
|||||||
|
|
||||||
#userAuthModeUpdate.hs + templates
|
#userAuthModeUpdate.hs + templates
|
||||||
MailSubjectUserAuthModeUpdate: Your FRADrive login
|
MailSubjectUserAuthModeUpdate: Your FRADrive login
|
||||||
UserAuthModeChangedToLDAP: You can now log in to FRADrive using your Fraport AG account (Büko)
|
UserAuthPasswordEnabled: You can now log in using your FRADrive-internal account credentials.
|
||||||
UserAuthModeChangedToPWHash: You can now log in using your FRADrive-internal account
|
UserAuthPasswordDisabled: You can no longer log in using your FRADrive-internal account credentials.
|
||||||
UserAuthModeChangedToNoLogin: Your login for the FRADrive website has been deactivated, but you FRADrive account persists. This has no effect on you qualifications. Please contact the driving school admins, if you need new login credentials for the FRADrive website.
|
AuthExternalLoginTip: If you have access to an external account supported by FRADrive (Azure login via Fraport identification, Fraport-BüKo login), you can login in FRADrive using your external credentials.
|
||||||
AuthPWHashTip: You now need to use the login form labeled "FRADrive login". Please ensure that you have already set a password when you try to log in.
|
|
||||||
PasswordResetEmailIncoming: For security reasons you will receive a link to the page on which you can set and later change your password in a separate email.
|
PasswordResetEmailIncoming: For security reasons you will receive a link to the page on which you can set and later change your password in a separate email.
|
||||||
MailFradrive: FRADrive
|
MailFradrive: FRADrive
|
||||||
MailBodyFradrive: is the apron driver's licence management app of Fraport AG.
|
MailBodyFradrive: is the apron driver's licence management app of Fraport AG.
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -45,8 +45,8 @@ AuthTagUserSubmissions: Abgaben erfolgen durch Kursartteilnehmer:innen
|
|||||||
AuthTagCorrectorSubmissions: Abgaben erfolgen durch Korrektor:innen
|
AuthTagCorrectorSubmissions: Abgaben erfolgen durch Korrektor:innen
|
||||||
AuthTagCorrectionAnonymous: Korrektur ist anonymisiert
|
AuthTagCorrectionAnonymous: Korrektur ist anonymisiert
|
||||||
AuthTagSelf: Nutzer:in greift nur auf eigene Daten zu
|
AuthTagSelf: Nutzer:in greift nur auf eigene Daten zu
|
||||||
AuthTagIsLDAP: Nutzer:in meldet sich mit Fraport AG Kennung an
|
AuthTagIsExternal: Nutzer:in meldet sich mit extern verwalteten Logindaten an
|
||||||
AuthTagIsPWHash: Nutzer:in meldet sich mit FRADrive spezifischer Kennung an
|
AuthTagIsInternal: Nutzer:in meldet sich mit FRADrive-internen Logindaten an
|
||||||
AuthTagAuthentication: Nutzer:in ist angemeldet, falls erforderlich
|
AuthTagAuthentication: Nutzer:in ist angemeldet, falls erforderlich
|
||||||
AuthTagRead: Zugriff ist nur lesend
|
AuthTagRead: Zugriff ist nur lesend
|
||||||
AuthTagWrite: Zugriff ist i.A. schreibend
|
AuthTagWrite: Zugriff ist i.A. schreibend
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -45,8 +45,8 @@ AuthTagUserSubmissions: Submissions are made by course type participants
|
|||||||
AuthTagCorrectorSubmissions: Submissions are registered by correctors
|
AuthTagCorrectorSubmissions: Submissions are registered by correctors
|
||||||
AuthTagCorrectionAnonymous: Correction is anonymised
|
AuthTagCorrectionAnonymous: Correction is anonymised
|
||||||
AuthTagSelf: User is only accessing their only data
|
AuthTagSelf: User is only accessing their only data
|
||||||
AuthTagIsLDAP: User logs in using their Fraport AG account
|
AuthTagIsExternal: User logs in using externally managed credentials
|
||||||
AuthTagIsPWHash: User logs in using their FRADrive specific account
|
AuthTagIsInternal: User logs in using FRADrive-internal credentials
|
||||||
AuthTagAuthentication: User is authenticated
|
AuthTagAuthentication: User is authenticated
|
||||||
AuthTagRead: Access is read only
|
AuthTagRead: Access is read only
|
||||||
AuthTagWrite: Access might write
|
AuthTagWrite: Access might write
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@cip.ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -38,8 +38,8 @@ AuthPWHashConfigured: Nutzer:in meldet sich nun mit FRADrive spezifischer Kennun
|
|||||||
UsersCourseSchool: Bereich
|
UsersCourseSchool: Bereich
|
||||||
ActionNoUsersSelected: Keine Benutzer:innen ausgewählt
|
ActionNoUsersSelected: Keine Benutzer:innen ausgewählt
|
||||||
SynchroniseAvsUserQueued n@Int: AVS-Synchronisation von #{n} #{pluralDE n "Benutzer:in" "Benutzer:innen"} angestoßen
|
SynchroniseAvsUserQueued n@Int: AVS-Synchronisation von #{n} #{pluralDE n "Benutzer:in" "Benutzer:innen"} angestoßen
|
||||||
SynchroniseLdapUserQueued n@Int: LDAP-Synchronisation von #{n} #{pluralDE n "Benutzer:in" "Benutzer:innen"} angestoßen
|
SynchroniseUserdbUserQueued n@Int: Benutzerdatenbank-Synchronisation von #{n} #{pluralDE n "Benutzer:in" "Benutzer:innen"} angestoßen
|
||||||
SynchroniseLdapAllUsersQueued: LDAP-Synchronisation von allen Benutzer:innen angestoßen
|
SynchroniseUserdbAllUsersQueued: Benutzerdatenbank-Synchronisation von allen Benutzer:innen angestoßen
|
||||||
UserListTitle: Komprehensive Benutzerliste
|
UserListTitle: Komprehensive Benutzerliste
|
||||||
AccessRightsSaved: Berechtigungen erfolgreich verändert
|
AccessRightsSaved: Berechtigungen erfolgreich verändert
|
||||||
AccessRightsNotChanged: Berechtigungen wurden nicht verändert
|
AccessRightsNotChanged: Berechtigungen wurden nicht verändert
|
||||||
@ -48,6 +48,7 @@ AuthLDAPInvalidLookup: Bestehender Nutzer/Bestehende Nutzerin konnte nicht einde
|
|||||||
AuthLDAPAlreadyConfigured: Nutzer:in meldet sich bereits per Fraport AG Kennung in FRADrive an
|
AuthLDAPAlreadyConfigured: Nutzer:in meldet sich bereits per Fraport AG Kennung in FRADrive an
|
||||||
AuthLDAPConfigured: Nutzer:in meldet sich nun per Fraport AG Kennung in FRADrive an
|
AuthLDAPConfigured: Nutzer:in meldet sich nun per Fraport AG Kennung in FRADrive an
|
||||||
AuthLDAP !ident-ok: Fraport AG Kennung
|
AuthLDAP !ident-ok: Fraport AG Kennung
|
||||||
|
AuthAzure: Azure-Account
|
||||||
AuthNoLogin: Kein Login erlaubt.
|
AuthNoLogin: Kein Login erlaubt.
|
||||||
PasswordResetQueued: Link zum Passwort-Zurücksetzen versandt
|
PasswordResetQueued: Link zum Passwort-Zurücksetzen versandt
|
||||||
UserAssimilateUser: Benutzer:in
|
UserAssimilateUser: Benutzer:in
|
||||||
@ -95,10 +96,14 @@ UserAddSupervisor: Ansprechpartner hinzufügen
|
|||||||
UserSetSupervisor: Ansprechpartner ersetzen
|
UserSetSupervisor: Ansprechpartner ersetzen
|
||||||
UserRemoveSupervisor: Alle Ansprechpartner entfernen
|
UserRemoveSupervisor: Alle Ansprechpartner entfernen
|
||||||
UserIsSupervisor: Ist Ansprechpartner
|
UserIsSupervisor: Ist Ansprechpartner
|
||||||
AuthKindLDAP: Fraport AG Kennung
|
|
||||||
AuthKindPWHash: FRADrive Kennung
|
|
||||||
AuthKindNoLogin: Kein Login möglich
|
|
||||||
Name !ident-ok: Name
|
Name !ident-ok: Name
|
||||||
UsersChangeSupervisorsSuccess usr@Int spr@Int: #{tshow spr} Ansprechpartner für #{tshow usr} Benutzer gesetzt.
|
UsersChangeSupervisorsSuccess usr@Int spr@Int: #{tshow spr} Ansprechpartner für #{tshow usr} Benutzer gesetzt.
|
||||||
UsersChangeSupervisorsWarning usr@Int spr@Int bad@Int: Nur _{MsgUsersChangeSupervisorsSuccess usr spr} #{tshow bad} Ansprechpartner #{pluralDE bad "wurde" "wurden"} nicht gefunden!
|
UsersChangeSupervisorsWarning usr@Int spr@Int bad@Int: Nur _{MsgUsersChangeSupervisorsSuccess usr spr} #{tshow bad} Ansprechpartner #{pluralDE bad "wurde" "wurden"} nicht gefunden!
|
||||||
UsersRemoveSupervisors usr@Int: Alle Ansprechpartner für #{tshow usr} Benutzer gelöscht.
|
UsersRemoveSupervisors usr@Int: Alle Ansprechpartner für #{tshow usr} Benutzer gelöscht.
|
||||||
|
|
||||||
|
AdminUserAuthentication: Authentification
|
||||||
|
AdminUserAuthLastSync: Zuletzt synchronisiert
|
||||||
|
AuthKindLDAP: Fraport-AG-Kennung (LDAP)
|
||||||
|
AuthKindAzure: Azure-Login
|
||||||
|
AuthKindPWHash: Interne FRADrive-Kennung
|
||||||
|
AuthKindNoLogin: Kein Login möglich
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Steffen Jost <jost@cip.ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -38,8 +38,8 @@ AuthPWHashConfigured: User now logs in using their FRADrive specific account
|
|||||||
UsersCourseSchool: Department
|
UsersCourseSchool: Department
|
||||||
ActionNoUsersSelected: No users selected
|
ActionNoUsersSelected: No users selected
|
||||||
SynchroniseAvsUserQueued n: Triggered AVS synchronisation of #{n} #{pluralEN n "user" "users"}.
|
SynchroniseAvsUserQueued n: Triggered AVS synchronisation of #{n} #{pluralEN n "user" "users"}.
|
||||||
SynchroniseLdapUserQueued n: Triggered LDAP synchronisation of #{n} #{pluralEN n "user" "users"}.
|
SynchroniseUserdbUserQueued n: Triggered user database synchronisation of #{n} #{pluralEN n "user" "users"}.
|
||||||
SynchroniseLdapAllUsersQueued: Triggered LDAP synchronisation of all users
|
SynchroniseUserdbAllUsersQueued: Triggered user database synchronisation of all users
|
||||||
UserListTitle: Comprehensive list of users
|
UserListTitle: Comprehensive list of users
|
||||||
AccessRightsSaved: Successfully updated permissions
|
AccessRightsSaved: Successfully updated permissions
|
||||||
AccessRightsNotChanged: Permissions left unchanged
|
AccessRightsNotChanged: Permissions left unchanged
|
||||||
@ -48,6 +48,7 @@ AuthLDAPInvalidLookup: Existing user could not be uniquely matched with a LDAP e
|
|||||||
AuthLDAPAlreadyConfigured: User already logs in using their Fraport AG account
|
AuthLDAPAlreadyConfigured: User already logs in using their Fraport AG account
|
||||||
AuthLDAPConfigured: User now logs in using their Fraport AG account
|
AuthLDAPConfigured: User now logs in using their Fraport AG account
|
||||||
AuthLDAP: Fraport AG account
|
AuthLDAP: Fraport AG account
|
||||||
|
AuthAzure: Azure account
|
||||||
AuthNoLogin: No login allowed.
|
AuthNoLogin: No login allowed.
|
||||||
PasswordResetQueued: Sent link to reset password
|
PasswordResetQueued: Sent link to reset password
|
||||||
UserAssimilateUser: User
|
UserAssimilateUser: User
|
||||||
@ -95,10 +96,14 @@ UserAddSupervisor: Add supervisor
|
|||||||
UserSetSupervisor: Replace supervisors
|
UserSetSupervisor: Replace supervisors
|
||||||
UserRemoveSupervisor: Set to unsupervised
|
UserRemoveSupervisor: Set to unsupervised
|
||||||
UserIsSupervisor: Is supervisor
|
UserIsSupervisor: Is supervisor
|
||||||
AuthKindLDAP: Fraport AG account
|
|
||||||
AuthKindPWHash: FRADrive account
|
|
||||||
AuthKindNoLogin: No login
|
|
||||||
Name: Name
|
Name: Name
|
||||||
UsersChangeSupervisorsSuccess usr spr: #{pluralENsN spr "supervisor"} for #{pluralENsN usr "user"} set.
|
UsersChangeSupervisorsSuccess usr spr: #{pluralENsN spr "supervisor"} for #{pluralENsN usr "user"} set.
|
||||||
UsersChangeSupervisorsWarning usr spr bad: Only _{MsgUsersChangeSupervisorsSuccess usr spr} #{pluralENsN bad "supervisors"} could not be identified!
|
UsersChangeSupervisorsWarning usr spr bad: Only _{MsgUsersChangeSupervisorsSuccess usr spr} #{pluralENsN bad "supervisors"} could not be identified!
|
||||||
UsersRemoveSupervisors usr: Removed all supervisors for #{pluralENsN usr "user"}.
|
UsersRemoveSupervisors usr: Removed all supervisors for #{pluralENsN usr "user"}.
|
||||||
|
|
||||||
|
AdminUserAuthentication: Authentifizierung
|
||||||
|
AdminUserAuthLastSync: Last synchronised
|
||||||
|
AuthKindLDAP: Fraport AG account (LDAP)
|
||||||
|
AuthKindAzure: Azure account
|
||||||
|
AuthKindPWHash: Internal FRADrive login
|
||||||
|
AuthKindNoLogin: No login
|
||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, David Mosbach <david.mosbach@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -25,6 +25,7 @@ MenuInstance: Instanz-Identifikation
|
|||||||
MenuHealth: Instanz-Zustand
|
MenuHealth: Instanz-Zustand
|
||||||
MenuHealthInterface: Schnittstellen Zustand
|
MenuHealthInterface: Schnittstellen Zustand
|
||||||
MenuHelp: Hilfe
|
MenuHelp: Hilfe
|
||||||
|
MenuAccount: Konto
|
||||||
MenuProfile: Anpassen
|
MenuProfile: Anpassen
|
||||||
MenuLogin !ident-ok: Login
|
MenuLogin !ident-ok: Login
|
||||||
MenuLogout !ident-ok: Logout
|
MenuLogout !ident-ok: Logout
|
||||||
@ -142,7 +143,7 @@ MenuSap: SAP Schnittstelle
|
|||||||
|
|
||||||
MenuAvs: AVS Schnittstelle
|
MenuAvs: AVS Schnittstelle
|
||||||
MenuAvsSynchError: AVS Problemübersicht
|
MenuAvsSynchError: AVS Problemübersicht
|
||||||
MenuLdap: LDAP Schnittstelle
|
MenuExternalUser: Externe Benutzer
|
||||||
MenuApc: Druckerei
|
MenuApc: Druckerei
|
||||||
MenuPrintSend: Manueller Briefversand
|
MenuPrintSend: Manueller Briefversand
|
||||||
MenuPrintDownload: Brief herunterladen
|
MenuPrintDownload: Brief herunterladen
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, David Mosbach <david.mosbach@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -25,6 +25,7 @@ MenuInstance: Instance identification
|
|||||||
MenuHealth: Instance health
|
MenuHealth: Instance health
|
||||||
MenuHealthInterface: Interface health
|
MenuHealthInterface: Interface health
|
||||||
MenuHelp: Support
|
MenuHelp: Support
|
||||||
|
MenuAccount: Account
|
||||||
MenuProfile: Settings
|
MenuProfile: Settings
|
||||||
MenuLogin: Login
|
MenuLogin: Login
|
||||||
MenuLogout: Logout
|
MenuLogout: Logout
|
||||||
@ -142,7 +143,7 @@ MenuSap: SAP Interface
|
|||||||
|
|
||||||
MenuAvs: AVS Interface
|
MenuAvs: AVS Interface
|
||||||
MenuAvsSynchError: AVS Problem Overview
|
MenuAvsSynchError: AVS Problem Overview
|
||||||
MenuLdap: LDAP Interface
|
MenuExternalUser: External users
|
||||||
MenuApc: Printing
|
MenuApc: Printing
|
||||||
MenuPrintSend: Send Letter
|
MenuPrintSend: Send Letter
|
||||||
MenuPrintDownload: Download Letter
|
MenuPrintDownload: Download Letter
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Steffen Jost <jost@tcs.ifi.lmu.de>,Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
# SPDX-FileCopyrightText: 2023-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -159,3 +159,5 @@ SheetTypeNormal !ident-ok: Normal
|
|||||||
SheetTypeBonus !ident-ok: Bonus
|
SheetTypeBonus !ident-ok: Bonus
|
||||||
|
|
||||||
InvalidFormAction: Keine Aktion ausgeführt wegen ungültigen Formulardaten
|
InvalidFormAction: Keine Aktion ausgeführt wegen ungültigen Formulardaten
|
||||||
|
|
||||||
|
InvalidUuid: Invalide UUID!
|
||||||
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
# SPDX-FileCopyrightText: 2023-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -159,3 +159,5 @@ SheetTypeNormal: Normal
|
|||||||
SheetTypeBonus: Bonus
|
SheetTypeBonus: Bonus
|
||||||
|
|
||||||
InvalidFormAction: No action taken due to invalid form data
|
InvalidFormAction: No action taken due to invalid form data
|
||||||
|
|
||||||
|
InvalidUuid: Invalid UUID!
|
||||||
@ -40,21 +40,22 @@ Qualification
|
|||||||
-- - PinReset==1 mit bestehendem Passwort kann problemlos erneut gesendet werden
|
-- - PinReset==1 mit bestehendem Passwort kann problemlos erneut gesendet werden
|
||||||
-- - Flag "interner Mitarbeiter" wird von Know-How ignoriert / nicht ausgewertet (legacy)
|
-- - Flag "interner Mitarbeiter" wird von Know-How ignoriert / nicht ausgewertet (legacy)
|
||||||
|
|
||||||
QualificationPrecondition -- NOTE: this can only be enforced through a background job adding or removing qualifications
|
-- QualificationPrecondition -- NOTE: this can only be enforced through a background job adding or removing qualifications
|
||||||
qualification QualificationId OnDeleteCascade OnUpdateCascade -- AND: not unique, ie. qualification can have multiple required preconditions
|
-- qualification QualificationId OnDeleteCascade OnUpdateCascade -- AND: not unique, ie. qualification can have multiple required preconditions
|
||||||
required [QualificationId] -- OR : alternatives, any one will suffice
|
-- required [QualificationId] -- OR : alternatives, any one will suffice
|
||||||
continuous Bool -- expiring precondition blocks qualification
|
-- continuous Bool -- expiring precondition blocks qualification
|
||||||
deriving Generic
|
-- deriving Generic
|
||||||
|
|
||||||
-- Maybe an alternative for online qualification validity checking, transitivity through recursive CTEs? (already available in our version)
|
-- Maybe an alternative for online qualification validity checking, transitivity through recursive CTEs? (already available in our version)
|
||||||
-- QualificationRequirement
|
--QualificationRequirement
|
||||||
-- qualification QualificationId OnDeleteCascade OnUpdateCascade
|
-- qualification QualificationId OnDeleteCascade OnUpdateCascade
|
||||||
-- requirement QualificationId OnDeleteCascade OnUpdateCascade
|
-- requirement QualificationId OnDeleteCascade OnUpdateCascade
|
||||||
-- group Text -- OR: several requirements within the same group are considered equivalent
|
-- group Text -- OR: several requirements within the same group are considered equivalent
|
||||||
-- UniqueQualificationRequirement qualification requirement
|
-- UniqueQualificationRequirement qualification requirement
|
||||||
|
-- deriving Generic
|
||||||
--
|
--
|
||||||
|
|
||||||
-- TODO: connect Qualification with Exams!
|
-- TODO: connect Qualifications with Exams!?
|
||||||
|
|
||||||
QualificationEdit
|
QualificationEdit
|
||||||
user UserId
|
user UserId
|
||||||
@ -81,6 +82,7 @@ QualificationUserBlock
|
|||||||
from UTCTime
|
from UTCTime
|
||||||
reason Text
|
reason Text
|
||||||
blocker UserId Maybe
|
blocker UserId Maybe
|
||||||
|
-- precondition Bool default=false -- if true, this was due to a precondition
|
||||||
deriving Eq Ord Read Show Generic
|
deriving Eq Ord Read Show Generic
|
||||||
|
|
||||||
-- LMS Interface Tables, need regular processing by background jobs, per QualificationId:
|
-- LMS Interface Tables, need regular processing by background jobs, per QualificationId:
|
||||||
|
|||||||
@ -1,8 +1,8 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@cip.ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
-- The files in /models determine t he database scheme.
|
-- The files in /models determine the database scheme.
|
||||||
-- The organisational split into several files has no operational effects.
|
-- The organisational split into several files has no operational effects.
|
||||||
-- White-space and case matters: Each SQL table is named in 1st column of this file
|
-- White-space and case matters: Each SQL table is named in 1st column of this file
|
||||||
-- Indendent lower-case lines describe the SQL-columns of the table with name, type and options
|
-- Indendent lower-case lines describe the SQL-columns of the table with name, type and options
|
||||||
@ -11,17 +11,16 @@
|
|||||||
-- Indendent upper-case lines usually impose Uniqueness constraints for rows by some columns.
|
-- Indendent upper-case lines usually impose Uniqueness constraints for rows by some columns.
|
||||||
-- Each table will also have an column storing a unique numeric row key, unless there is a row Primary columnname
|
-- Each table will also have an column storing a unique numeric row key, unless there is a row Primary columnname
|
||||||
--
|
--
|
||||||
|
|
||||||
User json -- Each Uni2work user has a corresponding row in this table; created upon first login.
|
User json -- Each Uni2work user has a corresponding row in this table; created upon first login.
|
||||||
|
ident UserIdent -- Case-insensitive user-identifier
|
||||||
|
passwordHash Text Maybe -- If specified, allows the user to login with credentials independently of external authentication
|
||||||
|
lastAuthentication UTCTime Maybe -- When did the user last authenticate?
|
||||||
surname UserSurname -- Display user names always through 'nameWidget displayName surname'
|
surname UserSurname -- Display user names always through 'nameWidget displayName surname'
|
||||||
displayName UserDisplayName
|
displayName UserDisplayName
|
||||||
displayEmail UserEmail
|
displayEmail UserEmail
|
||||||
email UserEmail -- Case-insensitive eMail address, used for sending TODO: make this nullable
|
email UserEmail -- Case-insensitive eMail address, used for sending TODO: make this nullable
|
||||||
ident UserIdent -- Case-insensitive user-identifier
|
|
||||||
authentication AuthenticationMode -- 'AuthLDAP' or ('AuthPWHash'+password-hash)
|
|
||||||
lastAuthentication UTCTime Maybe -- last login date
|
|
||||||
created UTCTime default=now()
|
created UTCTime default=now()
|
||||||
lastLdapSynchronisation UTCTime Maybe
|
|
||||||
ldapPrimaryKey UserEduPersonPrincipalName Maybe
|
|
||||||
tokensIssuedAfter UTCTime Maybe -- do not accept bearer tokens issued before this time (accept all tokens if null)
|
tokensIssuedAfter UTCTime Maybe -- do not accept bearer tokens issued before this time (accept all tokens if null)
|
||||||
matrikelnummer UserMatriculation Maybe -- usually a number; AVS Personalnummer; nicht Fraport Personalnummer!
|
matrikelnummer UserMatriculation Maybe -- usually a number; AVS Personalnummer; nicht Fraport Personalnummer!
|
||||||
firstName Text -- For export in tables, pre-split firstName from displayName
|
firstName Text -- For export in tables, pre-split firstName from displayName
|
||||||
@ -50,11 +49,20 @@ User json -- Each Uni2work user has a corresponding row in this table; create
|
|||||||
prefersPostal Bool default=false -- user prefers letters by post instead of email
|
prefersPostal Bool default=false -- user prefers letters by post instead of email
|
||||||
examOfficeGetSynced Bool default=true -- whether synced status should be displayed for exam results by default
|
examOfficeGetSynced Bool default=true -- whether synced status should be displayed for exam results by default
|
||||||
examOfficeGetLabels Bool default=true -- whether labels should be displayed for exam results by default
|
examOfficeGetLabels Bool default=true -- whether labels should be displayed for exam results by default
|
||||||
UniqueAuthentication ident -- Column 'ident' can be used as a row-key in this table
|
lastSync UTCTime Maybe -- When was the User data last synchronised with external sources?
|
||||||
|
UniqueAuthentication ident -- Column 'ident' can be used as a row-key in this table
|
||||||
UniqueEmail email -- Column 'email' can be used as a row-key in this table
|
UniqueEmail email -- Column 'email' can be used as a row-key in this table
|
||||||
UniqueLdapPrimaryKey ldapPrimaryKey !force -- Column 'ldapPrimaryKey' is either empty or contains a unique value
|
|
||||||
deriving Show Eq Ord Generic -- Haskell-specific settings for runtime-value representing a row in memory
|
deriving Show Eq Ord Generic -- Haskell-specific settings for runtime-value representing a row in memory
|
||||||
|
|
||||||
|
-- | User data fetched from external user sources, used for authentication and data queries
|
||||||
|
ExternalUser
|
||||||
|
user UserIdent
|
||||||
|
source AuthSourceIdent -- Identifier of the external source in the config
|
||||||
|
data Value "default='{}'::jsonb" -- Raw user data from external source -- TODO: maybe make Maybe, iff the source only ever responds with "success"?
|
||||||
|
lastSync UTCTime -- When was the external source last queried?
|
||||||
|
UniqueExternalUser user source -- At most one entry of this user per source
|
||||||
|
deriving Show Eq Ord Generic
|
||||||
|
|
||||||
UserFunction -- Administratively assigned functions (lecturer, admin, evaluation, ...)
|
UserFunction -- Administratively assigned functions (lecturer, admin, evaluation, ...)
|
||||||
user UserId
|
user UserId
|
||||||
school SchoolId
|
school SchoolId
|
||||||
@ -99,4 +107,3 @@ UserSupervisor
|
|||||||
rerouteNotifications Bool -- User can be his own supervisor to receive notifications as well
|
rerouteNotifications Bool -- User can be his own supervisor to receive notifications as well
|
||||||
UniqueUserSupervisor supervisor user -- each supervisor/user combination is unique (same supervisor can superviser the same user only once)
|
UniqueUserSupervisor supervisor user -- each supervisor/user combination is unique (same supervisor can superviser the same user only once)
|
||||||
deriving Generic
|
deriving Generic
|
||||||
|
|
||||||
|
|||||||
@ -14,8 +14,8 @@ let
|
|||||||
'');
|
'');
|
||||||
in if self ? lastModified then fromDate else "1970-01-01T00:00:01Z";
|
in if self ? lastModified then fromDate else "1970-01-01T00:00:01Z";
|
||||||
|
|
||||||
mkUniworxDocker = { isTest }: prev.dockerTools.buildImage {
|
mkUniworxDocker = { scope, isTest }: prev.dockerTools.buildImage {
|
||||||
name = "uniworx${optionalString isTest "-test"}";
|
name = "uniworx" + (if scope == null then "" else "-${scope}");
|
||||||
tag =
|
tag =
|
||||||
let
|
let
|
||||||
versionFile = if isTest then ./test-version.json else ./version.json;
|
versionFile = if isTest then ./test-version.json else ./version.json;
|
||||||
@ -111,6 +111,7 @@ let
|
|||||||
};
|
};
|
||||||
in
|
in
|
||||||
mapAttrs (_name: mkUniworxDocker) {
|
mapAttrs (_name: mkUniworxDocker) {
|
||||||
uniworxTestDocker = { isTest = true; };
|
uniworxDocker = { isTest = false; scope = null; };
|
||||||
uniworxDocker = { isTest = false; };
|
uniworxTestDocker = { isTest = false; scope = "test"; };
|
||||||
|
uniworxDevDocker = { isTest = false; scope = "dev"; };
|
||||||
}
|
}
|
||||||
|
|||||||
@ -1,3 +1,3 @@
|
|||||||
{
|
{
|
||||||
"version": "27.4.59"
|
"version": "28.1.1"
|
||||||
}
|
}
|
||||||
|
|||||||
2
package-lock.json
generated
2
package-lock.json
generated
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "uni2work",
|
"name": "uni2work",
|
||||||
"version": "27.4.59",
|
"version": "28.1.1",
|
||||||
"lockfileVersion": 1,
|
"lockfileVersion": 1,
|
||||||
"requires": true,
|
"requires": true,
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "uni2work",
|
"name": "uni2work",
|
||||||
"version": "27.4.59",
|
"version": "28.1.1",
|
||||||
"description": "",
|
"description": "",
|
||||||
"keywords": [],
|
"keywords": [],
|
||||||
"author": "",
|
"author": "",
|
||||||
@ -25,7 +25,9 @@
|
|||||||
"i18n:test": "./missing-translations.sh",
|
"i18n:test": "./missing-translations.sh",
|
||||||
"prerelease": "./is-clean.sh && npm run test",
|
"prerelease": "./is-clean.sh && npm run test",
|
||||||
"release": "./release.sh",
|
"release": "./release.sh",
|
||||||
|
"release-dev": "./release.sh --dev",
|
||||||
"postrelease": "git push --follow-tags",
|
"postrelease": "git push --follow-tags",
|
||||||
|
"postrelease-dev": "git push --follow-tags",
|
||||||
"parse-changelog": "changelog-parser ./CHANGELOG.md > changelog.json"
|
"parse-changelog": "changelog-parser ./CHANGELOG.md > changelog.json"
|
||||||
},
|
},
|
||||||
"husky": {
|
"husky": {
|
||||||
|
|||||||
10
package.yaml
10
package.yaml
@ -1,11 +1,12 @@
|
|||||||
name: uniworx
|
name: uniworx
|
||||||
version: 27.4.59
|
version: 28.1.1
|
||||||
dependencies:
|
dependencies:
|
||||||
- base
|
- base
|
||||||
- yesod
|
- yesod
|
||||||
- yesod-core
|
- yesod-core
|
||||||
- yesod-persistent
|
- yesod-persistent
|
||||||
- yesod-auth
|
- yesod-auth
|
||||||
|
- yesod-auth-oauth2
|
||||||
- yesod-static
|
- yesod-static
|
||||||
- yesod-form
|
- yesod-form
|
||||||
- yesod-persistent
|
- yesod-persistent
|
||||||
@ -20,7 +21,6 @@ dependencies:
|
|||||||
- template-haskell
|
- template-haskell
|
||||||
- shakespeare
|
- shakespeare
|
||||||
- monad-control
|
- monad-control
|
||||||
- wai-extra
|
|
||||||
- yaml
|
- yaml
|
||||||
- http-conduit
|
- http-conduit
|
||||||
- directory
|
- directory
|
||||||
@ -30,7 +30,6 @@ dependencies:
|
|||||||
- conduit
|
- conduit
|
||||||
- monad-logger
|
- monad-logger
|
||||||
- fast-logger
|
- fast-logger
|
||||||
- wai-logger
|
|
||||||
- foreign-store
|
- foreign-store
|
||||||
- file-embed
|
- file-embed
|
||||||
- unordered-containers
|
- unordered-containers
|
||||||
@ -39,6 +38,10 @@ dependencies:
|
|||||||
- time
|
- time
|
||||||
- case-insensitive
|
- case-insensitive
|
||||||
- wai
|
- wai
|
||||||
|
- wai-cors
|
||||||
|
- wai-extra
|
||||||
|
- wai-logger
|
||||||
|
- wai-middleware-prometheus
|
||||||
- cryptonite
|
- cryptonite
|
||||||
- cryptonite-conduit
|
- cryptonite-conduit
|
||||||
- saltine
|
- saltine
|
||||||
@ -143,7 +146,6 @@ dependencies:
|
|||||||
- cookie
|
- cookie
|
||||||
- prometheus-client
|
- prometheus-client
|
||||||
- prometheus-metrics-ghc
|
- prometheus-metrics-ghc
|
||||||
- wai-middleware-prometheus
|
|
||||||
- extended-reals
|
- extended-reals
|
||||||
- rfc5051
|
- rfc5051
|
||||||
- unidecode
|
- unidecode
|
||||||
|
|||||||
11
release.sh
11
release.sh
@ -1,6 +1,6 @@
|
|||||||
#!/usr/bin/env bash
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
# SPDX-FileCopyrightText: 2023 Sarah Vaupel <sarah.vaupel@uniworx.de>
|
# SPDX-FileCopyrightText: 2023-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -14,7 +14,12 @@ case "$(git rev-parse --abbrev-ref HEAD)" in
|
|||||||
standard-version -a -t t
|
standard-version -a -t t
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
echo "Current branch not supported for release!"
|
if echo $@ | grep -xqe '--dev';
|
||||||
exit 1
|
then
|
||||||
|
standard-version -a -t d
|
||||||
|
else
|
||||||
|
echo "Current branch not supported for release!"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
|||||||
37
routes
37
routes
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>,David Mosbach <david.mosbach@uniworx.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -30,8 +30,8 @@
|
|||||||
-- !capacity -- course this route is associated with has at least one unit of participant capacity
|
-- !capacity -- course this route is associated with has at least one unit of participant capacity
|
||||||
-- !empty -- course this route is associated with has no participants whatsoever
|
-- !empty -- course this route is associated with has no participants whatsoever
|
||||||
--
|
--
|
||||||
-- !is-ldap -- user has authentication mode set to LDAP
|
-- !is-external -- user can login using external sources
|
||||||
-- !is-pw-hash -- user has authentication mode set to PWHash
|
-- !is-internal -- user can login using internal credentials
|
||||||
--
|
--
|
||||||
-- !materials -- only if course allows all materials to be free (no meaning outside of courses)
|
-- !materials -- only if course allows all materials to be free (no meaning outside of courses)
|
||||||
-- !time -- access depends on time somehow
|
-- !time -- access depends on time somehow
|
||||||
@ -46,6 +46,9 @@
|
|||||||
/static StaticR EmbeddedStatic appStatic !free
|
/static StaticR EmbeddedStatic appStatic !free
|
||||||
/auth AuthR Auth getAuth !free
|
/auth AuthR Auth getAuth !free
|
||||||
|
|
||||||
|
/logout SOutR GET !free
|
||||||
|
/logout/ssout SSOutR GET !free -- single sign-out (OIDC)
|
||||||
|
|
||||||
/metrics MetricsR GET !free -- verify if this can be free
|
/metrics MetricsR GET !free -- verify if this can be free
|
||||||
|
|
||||||
/err ErrorR GET !free
|
/err ErrorR GET !free
|
||||||
@ -59,23 +62,23 @@
|
|||||||
/users/#CryptoUUIDUser/password UserPasswordR GET POST !selfANDis-pw-hash
|
/users/#CryptoUUIDUser/password UserPasswordR GET POST !selfANDis-pw-hash
|
||||||
!/users/functionary-invite/new AdminNewFunctionaryInviteR GET POST
|
!/users/functionary-invite/new AdminNewFunctionaryInviteR GET POST
|
||||||
!/users/functionary-invite AdminFunctionaryInviteR GET POST
|
!/users/functionary-invite AdminFunctionaryInviteR GET POST
|
||||||
!/users/add AdminUserAddR GET POST
|
!/users/add AdminUserAddR GET POST
|
||||||
/admin AdminR GET
|
/admin AdminR GET
|
||||||
/admin/test AdminTestR GET POST
|
/admin/test AdminTestR GET POST
|
||||||
/admin/test/pdf AdminTestPdfR GET
|
/admin/test/pdf AdminTestPdfR GET
|
||||||
/admin/errMsg AdminErrMsgR GET POST
|
/admin/errMsg AdminErrMsgR GET POST
|
||||||
/admin/tokens AdminTokensR GET POST
|
/admin/tokens AdminTokensR GET POST
|
||||||
/admin/crontab AdminCrontabR GET
|
/admin/crontab AdminCrontabR GET
|
||||||
/admin/crontab/jobs AdminJobsR GET POST
|
/admin/crontab/jobs AdminJobsR GET POST
|
||||||
/admin/avs AdminAvsR GET POST
|
/admin/avs AdminAvsR GET POST
|
||||||
/admin/avs/#CryptoUUIDUser AdminAvsUserR GET
|
/admin/avs/#CryptoUUIDUser AdminAvsUserR GET
|
||||||
/admin/ldap AdminLdapR GET POST
|
/admin/external-user AdminExternalUserR GET POST
|
||||||
/admin/problems AdminProblemsR GET
|
/admin/problems AdminProblemsR GET
|
||||||
/admin/problems/no-contact ProblemUnreachableR GET
|
/admin/problems/no-contact ProblemUnreachableR GET
|
||||||
/admin/problems/no-avs-id ProblemWithoutAvsId GET
|
/admin/problems/no-avs-id ProblemWithoutAvsId GET
|
||||||
/admin/problems/r-without-f ProblemFbutNoR GET
|
/admin/problems/r-without-f ProblemFbutNoR GET
|
||||||
/admin/problems/avs ProblemAvsSynchR GET POST
|
/admin/problems/avs ProblemAvsSynchR GET POST
|
||||||
/admin/problems/avs/errors ProblemAvsErrorR GET
|
/admin/problems/avs/errors ProblemAvsErrorR GET
|
||||||
|
|
||||||
/print PrintCenterR GET POST !system-printer
|
/print PrintCenterR GET POST !system-printer
|
||||||
/print/acknowledge/#Day/#Int/#Int PrintAckR GET POST !system-printer
|
/print/acknowledge/#Day/#Int/#Int PrintAckR GET POST !system-printer
|
||||||
|
|||||||
38
shell.nix
38
shell.nix
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022-2023 Gregor Kleen <gregor@kleen.consulting>, Sarah Vaupel <sarah.vaupel@uniworx.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Gregor Kleen <gregor@kleen.consulting>, Sarah Vaupel <sarah.vaupel@uniworx.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, David Mosbach <david.mosbach@uniworx.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -9,6 +9,13 @@ let
|
|||||||
|
|
||||||
haskellPackages = pkgs.haskellPackages;
|
haskellPackages = pkgs.haskellPackages;
|
||||||
|
|
||||||
|
oauth2Flake = (builtins.getFlake "git+https://gitlab.uniworx.de/mosbach/oauth2-mock-server/?rev=7b995e6cffa963a24eb5d0373b2d29089533284f&ref=main").packages.x86_64-linux;
|
||||||
|
|
||||||
|
|
||||||
|
oauth2MockServer = oauth2Flake.default;
|
||||||
|
mkOauth2DB = oauth2Flake.mkOauth2DB;
|
||||||
|
killOauth2DB = oauth2Flake.killOauth2DB;
|
||||||
|
|
||||||
postgresSchema = pkgs.writeText "schema.sql" ''
|
postgresSchema = pkgs.writeText "schema.sql" ''
|
||||||
CREATE USER uniworx WITH SUPERUSER;
|
CREATE USER uniworx WITH SUPERUSER;
|
||||||
CREATE DATABASE uniworx_test;
|
CREATE DATABASE uniworx_test;
|
||||||
@ -21,6 +28,17 @@ let
|
|||||||
local all all trust
|
local all all trust
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
oauth2Schema = pkgs.writeText "oauth2_schema.sql" ''
|
||||||
|
CREATE USER oauth2mock WITH SUPERUSER;
|
||||||
|
CREATE DATABASE test_users;
|
||||||
|
GRANT ALL ON DATABASE test_users TO oauth2mock;
|
||||||
|
'';
|
||||||
|
|
||||||
|
oauth2Hba = pkgs.writeText "oauth2_hba_file" ''
|
||||||
|
local all all trust
|
||||||
|
'';
|
||||||
|
|
||||||
|
|
||||||
develop = pkgs.writeScriptBin "develop" ''
|
develop = pkgs.writeScriptBin "develop" ''
|
||||||
#!${pkgs.zsh}/bin/zsh -e
|
#!${pkgs.zsh}/bin/zsh -e
|
||||||
|
|
||||||
@ -44,6 +62,9 @@ let
|
|||||||
type cleanup_cache_memcached &>/dev/null && cleanup_cache_memcached
|
type cleanup_cache_memcached &>/dev/null && cleanup_cache_memcached
|
||||||
type cleanup_minio &>/dev/null && cleanup_minio
|
type cleanup_minio &>/dev/null && cleanup_minio
|
||||||
type cleanup_maildev &>/dev/null && cleanup_maildev
|
type cleanup_maildev &>/dev/null && cleanup_maildev
|
||||||
|
[[ -z "$OAUTH2_PGDIR" ]] || source ${killOauth2DB}/bin/killOauth2DB
|
||||||
|
[[ -z "$OAUTH2_PGHOST" ]] || pkill oauth2-mock-ser
|
||||||
|
[[ -z "$PORT_OFFSET" ]] || runghc .ports/assign.hs --remove $PORT_OFFSET
|
||||||
|
|
||||||
[ -f "''${basePath}/.develop.env" ] && rm -vf "''${basePath}/.develop.env"
|
[ -f "''${basePath}/.develop.env" ] && rm -vf "''${basePath}/.develop.env"
|
||||||
set +x
|
set +x
|
||||||
@ -51,7 +72,17 @@ let
|
|||||||
|
|
||||||
trap cleanup EXIT
|
trap cleanup EXIT
|
||||||
|
|
||||||
export PORT_OFFSET=$(((16#$(sha256sum <<<"$(hostname -f):''${basePath}" | head -c 16)) % 1000))
|
export PORT_OFFSET=$(runghc .ports/assign.hs --assign .ports/offsets)
|
||||||
|
# export PORT_OFFSET=$(((16#$(sha256sum <<<"$(hostname -f):''${basePath}" | head -c 16)) % 1000))
|
||||||
|
|
||||||
|
if [[ -z "$OAUTH2_PGHOST" ]]; then
|
||||||
|
set -xe
|
||||||
|
export OAUTH2_SERVER_PORT=$((9443 + $PORT_OFFSET))
|
||||||
|
export OAUTH2_DB_PORT=$((9444 + $PORT_OFFSET))
|
||||||
|
source ${mkOauth2DB}/bin/mkOauth2DB
|
||||||
|
${oauth2MockServer}/bin/oauth2-mock-server&
|
||||||
|
set +xe
|
||||||
|
fi
|
||||||
|
|
||||||
if [[ -z "$PGHOST" ]]; then
|
if [[ -z "$PGHOST" ]]; then
|
||||||
set -xe
|
set -xe
|
||||||
@ -271,6 +302,9 @@ in pkgs.mkShell {
|
|||||||
|
|
||||||
export CHROME_BIN=${pkgs.chromium}/bin/chromium
|
export CHROME_BIN=${pkgs.chromium}/bin/chromium
|
||||||
'';
|
'';
|
||||||
|
OAUTH2_HBA = oauth2Hba;
|
||||||
|
OAUTH2_DB_SCHEMA = oauth2Schema;
|
||||||
|
OAUTH2_TEST_USERS = ./test/Database/test-users.yaml;
|
||||||
nativeBuildInputs = [develop inDevelop killallUni2work diffRunning]
|
nativeBuildInputs = [develop inDevelop killallUni2work diffRunning]
|
||||||
++ (with pkgs;
|
++ (with pkgs;
|
||||||
[ stack nodejs-14_x postgresql_12 openldap exiftool memcached minio minio-client
|
[ stack nodejs-14_x postgresql_12 openldap exiftool memcached minio minio-client
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Sarah Vaupel <vaupel.sarah@campus.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, David Mosbach <david.mosbach@uniworx.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -6,10 +6,8 @@
|
|||||||
|
|
||||||
module Application
|
module Application
|
||||||
( getAppSettings, getAppDevSettings
|
( getAppSettings, getAppDevSettings
|
||||||
, appMain
|
, appMain, develMain
|
||||||
, develMain
|
|
||||||
, makeFoundation
|
, makeFoundation
|
||||||
, makeMiddleware
|
|
||||||
-- * for DevelMain
|
-- * for DevelMain
|
||||||
, foundationStoreNum
|
, foundationStoreNum
|
||||||
, getApplicationRepl
|
, getApplicationRepl
|
||||||
@ -20,111 +18,98 @@ module Application
|
|||||||
, addPWEntry
|
, addPWEntry
|
||||||
) where
|
) where
|
||||||
|
|
||||||
import Control.Monad.Logger (liftLoc, LoggingT(..), MonadLoggerIO(..))
|
import Import hiding (cancel, respond)
|
||||||
|
|
||||||
|
import Handler.Utils (runAppLoggingT)
|
||||||
|
import Handler.Utils.Memcached (manageMemcachedLocalInvalidations)
|
||||||
|
|
||||||
|
import Jobs
|
||||||
|
|
||||||
|
import Middleware
|
||||||
|
|
||||||
|
import Utils.Avs
|
||||||
|
import qualified Utils.Pool as Custom
|
||||||
|
import Utils.Postgresql
|
||||||
|
|
||||||
|
|
||||||
|
import Control.Concurrent.STM.Delay
|
||||||
|
import Control.Monad.Logger (liftLoc, LoggingT(..), MonadLoggerIO(..))
|
||||||
|
import Control.Monad.Trans.Cont (runContT, callCC)
|
||||||
|
import Control.Monad.Trans.Resource
|
||||||
|
|
||||||
|
import qualified Data.Acid.Memory as Acid
|
||||||
|
import qualified Data.Aeson as Aeson
|
||||||
|
import qualified Data.ByteString.Lazy as LBS
|
||||||
|
import qualified Data.IntervalMap.Strict as IntervalMap
|
||||||
|
import qualified Data.Map as Map
|
||||||
|
import Data.Ratio ((%))
|
||||||
|
import qualified Data.Set as Set
|
||||||
|
import Data.Streaming.Network (bindPortTCP)
|
||||||
|
import qualified Data.Text.Encoding as Text
|
||||||
|
import qualified Data.UUID as UUID
|
||||||
|
import qualified Data.UUID.V4 as UUID
|
||||||
|
|
||||||
|
import qualified Database.Memcached.Binary.IO as Memcached
|
||||||
import Database.Persist.Postgresql ( openSimpleConn, pgConnStr, pgPoolIdleTimeout
|
import Database.Persist.Postgresql ( openSimpleConn, pgConnStr, pgPoolIdleTimeout
|
||||||
, pgPoolSize
|
, pgPoolSize
|
||||||
)
|
)
|
||||||
import Database.Persist.SqlBackend.Internal ( connClose )
|
import Database.Persist.SqlBackend.Internal ( connClose )
|
||||||
import qualified Database.PostgreSQL.Simple as PG
|
import qualified Database.PostgreSQL.Simple as PG
|
||||||
import Import hiding (cancel, respond)
|
|
||||||
import Language.Haskell.TH.Syntax (qLocation)
|
|
||||||
import Network.Wai (Middleware)
|
|
||||||
import qualified Network.Wai as Wai
|
|
||||||
import Network.Wai.Handler.Warp (Settings, defaultSettings,
|
|
||||||
defaultShouldDisplayException,
|
|
||||||
runSettings, runSettingsSocket, setHost,
|
|
||||||
setBeforeMainLoop,
|
|
||||||
setOnException, setPort, getPort)
|
|
||||||
import Network.Connection (settingDisableCertificateValidation)
|
|
||||||
import Data.Streaming.Network (bindPortTCP)
|
|
||||||
import Network.Wai.Middleware.RequestLogger (Destination (Logger),
|
|
||||||
IPAddrSource (..),
|
|
||||||
OutputFormat (..), destination,
|
|
||||||
mkRequestLogger, outputFormat)
|
|
||||||
import System.Log.FastLogger ( defaultBufSize, newStderrLoggerSet, newStdoutLoggerSet, newFileLoggerSet
|
|
||||||
, toLogStr, rmLoggerSet
|
|
||||||
)
|
|
||||||
|
|
||||||
import Handler.Utils (runAppLoggingT)
|
|
||||||
|
|
||||||
import Foreign.Store
|
import Foreign.Store
|
||||||
|
|
||||||
import Web.Cookie
|
import GHC.RTS.Flags (getRTSFlags)
|
||||||
import Network.HTTP.Types.Header (hSetCookie)
|
|
||||||
|
|
||||||
import qualified Data.UUID as UUID
|
import Language.Haskell.TH.Syntax (qLocation)
|
||||||
import qualified Data.UUID.V4 as UUID
|
|
||||||
|
|
||||||
import System.Directory
|
import qualified Ldap.Client as Ldap (Host(Plain,Tls))
|
||||||
|
|
||||||
import Jobs
|
|
||||||
|
|
||||||
import qualified Data.Text.Encoding as Text
|
|
||||||
|
|
||||||
import Yesod.Auth.Util.PasswordStore
|
|
||||||
|
|
||||||
import qualified Data.ByteString.Lazy as LBS
|
|
||||||
|
|
||||||
|
import Network.Connection (settingDisableCertificateValidation)
|
||||||
import Network.HaskellNet.SSL hiding (Settings)
|
import Network.HaskellNet.SSL hiding (Settings)
|
||||||
import Network.HaskellNet.SMTP.SSL as SMTP hiding (Settings)
|
import Network.HaskellNet.SMTP.SSL as SMTP hiding (Settings)
|
||||||
|
import Network.HTTP.Client.TLS (mkManagerSettings)
|
||||||
|
import qualified Network.Minio as Minio
|
||||||
|
import Network.Socket (socketPort, Socket, PortNumber)
|
||||||
|
import qualified Network.Socket as Socket (close)
|
||||||
|
import Network.Wai.Handler.Warp ( Settings
|
||||||
|
, defaultSettings
|
||||||
|
, defaultShouldDisplayException
|
||||||
|
, runSettings, runSettingsSocket
|
||||||
|
, getPort, setPort
|
||||||
|
, setHost, setBeforeMainLoop, setOnException
|
||||||
|
)
|
||||||
|
|
||||||
|
import qualified Prometheus
|
||||||
|
|
||||||
|
import qualified System.Clock as Clock
|
||||||
|
import System.Directory
|
||||||
|
import System.Environment (lookupEnv)
|
||||||
|
import System.Exit
|
||||||
|
import System.Log.FastLogger ( defaultBufSize
|
||||||
|
, newStderrLoggerSet, newStdoutLoggerSet, newFileLoggerSet
|
||||||
|
, toLogStr, rmLoggerSet
|
||||||
|
)
|
||||||
|
import System.Log.FastLogger.Date
|
||||||
|
import System.Posix.Process (getProcessID)
|
||||||
|
import System.Posix.Signals (SignalInfo(..), installHandler, sigTERM, sigINT)
|
||||||
|
import qualified System.Posix.Signals as Signals (Handler(..))
|
||||||
|
import qualified System.Systemd.Daemon as Systemd
|
||||||
|
|
||||||
import UnliftIO.Concurrent
|
import UnliftIO.Concurrent
|
||||||
import UnliftIO.Pool
|
import UnliftIO.Pool
|
||||||
|
|
||||||
import Control.Monad.Trans.Resource
|
|
||||||
|
|
||||||
import System.Log.FastLogger.Date
|
|
||||||
import qualified Yesod.Core.Types as Yesod (Logger(..))
|
|
||||||
|
|
||||||
import qualified Data.HashMap.Strict as HashMap
|
|
||||||
|
|
||||||
import qualified Data.Aeson as Aeson
|
|
||||||
|
|
||||||
import System.Exit
|
|
||||||
|
|
||||||
import qualified Database.Memcached.Binary.IO as Memcached
|
|
||||||
|
|
||||||
import qualified System.Systemd.Daemon as Systemd
|
|
||||||
import System.Environment (lookupEnv)
|
|
||||||
import System.Posix.Process (getProcessID)
|
|
||||||
import System.Posix.Signals (SignalInfo(..), installHandler, sigTERM, sigINT)
|
|
||||||
import qualified System.Posix.Signals as Signals (Handler(..))
|
|
||||||
|
|
||||||
import Network.Socket (socketPort, Socket, PortNumber)
|
|
||||||
import qualified Network.Socket as Socket (close)
|
|
||||||
|
|
||||||
import Control.Concurrent.STM.Delay
|
|
||||||
import Control.Monad.Trans.Cont (runContT, callCC)
|
|
||||||
|
|
||||||
import Data.Ratio ((%))
|
|
||||||
import qualified Data.Set as Set
|
|
||||||
import qualified Data.Map as Map
|
|
||||||
|
|
||||||
import Handler.Utils.Routes (classifyHandler)
|
|
||||||
|
|
||||||
import qualified Data.Acid.Memory as Acid
|
|
||||||
import qualified Web.ServerSession.Backend.Acid as Acid
|
import qualified Web.ServerSession.Backend.Acid as Acid
|
||||||
|
|
||||||
import qualified Ldap.Client as Ldap (Host(Plain, Tls))
|
|
||||||
|
|
||||||
import qualified Network.Minio as Minio
|
|
||||||
|
|
||||||
import Web.ServerSession.Core (StorageException(..))
|
import Web.ServerSession.Core (StorageException(..))
|
||||||
|
|
||||||
import GHC.RTS.Flags (getRTSFlags)
|
import Yesod.Auth.OAuth2.AzureAD (oauth2AzureADScoped)
|
||||||
|
import Yesod.Auth.Util.PasswordStore
|
||||||
|
import qualified Yesod.Core.Types as Yesod (Logger(..))
|
||||||
|
|
||||||
import qualified Prometheus
|
#ifdef DEVELOPMENT
|
||||||
|
import Data.Maybe (fromJust)
|
||||||
|
import Auth.OAuth2 (azureMockServer)
|
||||||
|
#endif
|
||||||
|
|
||||||
import qualified Data.IntervalMap.Strict as IntervalMap
|
|
||||||
|
|
||||||
import qualified Utils.Pool as Custom
|
|
||||||
|
|
||||||
import Utils.Postgresql
|
|
||||||
import Handler.Utils.Memcached (manageMemcachedLocalInvalidations)
|
|
||||||
|
|
||||||
import qualified System.Clock as Clock
|
|
||||||
|
|
||||||
import Utils.Avs
|
|
||||||
|
|
||||||
-- Import all relevant handler modules here.
|
-- Import all relevant handler modules here.
|
||||||
-- (HPack takes care to add new modules to our cabal file nowadays.)
|
-- (HPack takes care to add new modules to our cabal file nowadays.)
|
||||||
@ -161,11 +146,11 @@ import Handler.PrintCenter
|
|||||||
import Handler.ApiDocs
|
import Handler.ApiDocs
|
||||||
import Handler.Swagger
|
import Handler.Swagger
|
||||||
import Handler.Firm
|
import Handler.Firm
|
||||||
|
import Handler.SingleSignOut
|
||||||
|
|
||||||
import ServantApi () -- YesodSubDispatch instances
|
import ServantApi () -- YesodSubDispatch instances
|
||||||
import Servant.API
|
import Servant.API
|
||||||
import Servant.Client
|
import Servant.Client
|
||||||
import Network.HTTP.Client.TLS (mkManagerSettings)
|
|
||||||
|
|
||||||
|
|
||||||
-- This line actually creates our YesodDispatch instance. It is the second half
|
-- This line actually creates our YesodDispatch instance. It is the second half
|
||||||
@ -236,7 +221,7 @@ makeFoundation appSettings''@AppSettings{..} = do
|
|||||||
-- from there, and then create the real foundation.
|
-- from there, and then create the real foundation.
|
||||||
let
|
let
|
||||||
mkFoundation :: _ -> (forall m. MonadIO m => Custom.Pool' m DBConnLabel DBConnUseState SqlBackend) -> _
|
mkFoundation :: _ -> (forall m. MonadIO m => Custom.Pool' m DBConnLabel DBConnUseState SqlBackend) -> _
|
||||||
mkFoundation appSettings' appConnPool appSmtpPool appLdapPool appCryptoIDKey appSessionStore appSecretBoxKey appWidgetMemcached appJSONWebKeySet appClusterID appMemcached appMemcachedLocal appUploadCache appVerpSecret appAuthKey appPersonalisedSheetFilesSeedKey appVolatileClusterSettingsCache appAvsQuery = UniWorX{..}
|
mkFoundation appSettings' appConnPool appSmtpPool appLdapPool appCryptoIDKey appSessionStore appSecretBoxKey appWidgetMemcached appJSONWebKeySet appClusterID appMemcached appMemcachedLocal appUploadCache appVerpSecret appAuthKey appAuthPlugins appPersonalisedSheetFilesSeedKey appVolatileClusterSettingsCache appAvsQuery = UniWorX{..}
|
||||||
tempFoundation = mkFoundation
|
tempFoundation = mkFoundation
|
||||||
(error "appSettings' forced in tempFoundation")
|
(error "appSettings' forced in tempFoundation")
|
||||||
(error "connPool forced in tempFoundation")
|
(error "connPool forced in tempFoundation")
|
||||||
@ -253,10 +238,12 @@ makeFoundation appSettings''@AppSettings{..} = do
|
|||||||
(error "MinioConn forced in tempFoundation")
|
(error "MinioConn forced in tempFoundation")
|
||||||
(error "VerpSecret forced in tempFoundation")
|
(error "VerpSecret forced in tempFoundation")
|
||||||
(error "AuthKey forced in tempFoundation")
|
(error "AuthKey forced in tempFoundation")
|
||||||
|
(error "AuthPlugins forced in tempFoundation")
|
||||||
(error "PersonalisedSheetFilesSeedKey forced in tempFoundation")
|
(error "PersonalisedSheetFilesSeedKey forced in tempFoundation")
|
||||||
(error "VolatileClusterSettingsCache forced in tempFoundation")
|
(error "VolatileClusterSettingsCache forced in tempFoundation")
|
||||||
(error "AvsQuery forced in tempFoundation")
|
(error "AvsQuery forced in tempFoundation")
|
||||||
|
|
||||||
|
|
||||||
runAppLoggingT tempFoundation $ do
|
runAppLoggingT tempFoundation $ do
|
||||||
$logInfoS "InstanceID" $ UUID.toText appInstanceID
|
$logInfoS "InstanceID" $ UUID.toText appInstanceID
|
||||||
$logInfoS "Configuration" $ tshowCrop appSettings''
|
$logInfoS "Configuration" $ tshowCrop appSettings''
|
||||||
@ -291,13 +278,32 @@ makeFoundation appSettings''@AppSettings{..} = do
|
|||||||
sqlPool = Custom.hoistPool (liftIO . flip runLoggingT logFunc) sqlPool'
|
sqlPool = Custom.hoistPool (liftIO . flip runLoggingT logFunc) sqlPool'
|
||||||
void . Prometheus.register . poolMetrics PoolDatabaseConnections $ sqlPool @IO
|
void . Prometheus.register . poolMetrics PoolDatabaseConnections $ sqlPool @IO
|
||||||
|
|
||||||
ldapPool <- traverse mkFailoverLabeled <=< forOf (traverse . traverse) appLdapConf $ \conf@LdapConf{..} -> do
|
-- ldapPool <- traverse mkFailoverLabeled <=< forOf (traverse . traverse) appUserDbConf $ \conf -> if
|
||||||
let ldapLabel = case ldapHost of
|
-- | UserDbSingleSource{..} <- conf
|
||||||
Ldap.Plain str -> pack str <> ":" <> tshow ldapPort
|
-- , UserDbLdap LdapConf{..} <- userdbSingleSource
|
||||||
Ldap.Tls str _ -> pack str <> ":" <> tshow ldapPort
|
-- , Just ResourcePoolConf{..} <- userdbPoolConf
|
||||||
$logDebugS "setup" $ "LDAP-Pool " <> ldapLabel
|
-- -> do
|
||||||
(ldapLabel,) . (conf,) <$> createLdapPool ldapHost ldapPort (poolStripes ldapPool) (poolTimeout ldapPool) ldapTimeout (poolLimit ldapPool)
|
-- let ldapLabel = case ldapHost of
|
||||||
forM_ ldapPool $ registerFailoverMetrics "ldap"
|
-- Ldap.Plain str -> pack str <> ":" <> tshow ldapPort
|
||||||
|
-- Ldap.Tls str _ -> pack str <> ":" <> tshow ldapPort
|
||||||
|
-- $logDebugS "setup" $ "LDAP-Pool " <> ldapLabel
|
||||||
|
-- (ldapLabel,) . (conf,) <$> createLdapPool ldapHost ldapPort poolStripes poolTimeout ldapTimeout poolLimit
|
||||||
|
-- | otherwise
|
||||||
|
-- -> return mempty
|
||||||
|
-- forM_ ldapPool $ registerFailoverMetrics "ldap"
|
||||||
|
|
||||||
|
-- TODO: reintroduce failover once UserDbFailover is implemented (see above)
|
||||||
|
ldapPool <- fmap join . forM appLdapPoolConf $ \ResourcePoolConf{..} -> if
|
||||||
|
| UserAuthConfSingleSource{..} <- appUserAuthConf
|
||||||
|
, AuthSourceConfLdap conf@LdapConf{..} <- userAuthConfSingleSource
|
||||||
|
-> do -- set up a singleton ldap pool with no failover
|
||||||
|
let ldapLabel = case ldapConfHost of
|
||||||
|
Ldap.Plain str -> pack str <> ":" <> tshow ldapConfPort
|
||||||
|
Ldap.Tls str _ -> pack str <> ":" <> tshow ldapConfPort
|
||||||
|
$logDebugS "setup" $ "LDAP-Pool " <> ldapLabel
|
||||||
|
Just . (conf,) <$> createLdapPool ldapConfHost ldapConfPort poolStripes poolTimeout ldapConfTimeout poolLimit
|
||||||
|
| otherwise -- No LDAP pool to be initialized
|
||||||
|
-> return Nothing
|
||||||
|
|
||||||
-- Perform database migration using our application's logging settings.
|
-- Perform database migration using our application's logging settings.
|
||||||
flip runReaderT tempFoundation $
|
flip runReaderT tempFoundation $
|
||||||
@ -318,6 +324,34 @@ makeFoundation appSettings''@AppSettings{..} = do
|
|||||||
appAuthKey <- clusterSetting (Proxy :: Proxy 'ClusterAuthKey) `customRunSqlPool` sqlPool
|
appAuthKey <- clusterSetting (Proxy :: Proxy 'ClusterAuthKey) `customRunSqlPool` sqlPool
|
||||||
appPersonalisedSheetFilesSeedKey <- clusterSetting (Proxy :: Proxy 'ClusterPersonalisedSheetFilesSeedKey) `customRunSqlPool` sqlPool
|
appPersonalisedSheetFilesSeedKey <- clusterSetting (Proxy :: Proxy 'ClusterPersonalisedSheetFilesSeedKey) `customRunSqlPool` sqlPool
|
||||||
|
|
||||||
|
-- TODO: use scopes from Settings
|
||||||
|
#ifdef DEVELOPMENT
|
||||||
|
oauth2Plugins <- liftIO $ sequence
|
||||||
|
[ (azureMockServer . fromJust) <$> lookupEnv "OAUTH2_SERVER_PORT"
|
||||||
|
, return $ oauth2AzureADScoped ["openid", "profile", "offline_access"] "42" "shhh"
|
||||||
|
]
|
||||||
|
#else
|
||||||
|
let -- Auth Plugins
|
||||||
|
-- loadPlugin p prefix = do -- Loads given YesodAuthPlugin
|
||||||
|
-- mID <- fmap Text.pack <$> appUserAuthConf ^? _UserAuthConfSingleSource . _AuthSourceConfAzureAdV2 . _azureConfClientId
|
||||||
|
-- mSecret <- fmap Text.pack <$> appUserAuthConf ^? _UserAuthConfSingleSource . _AuthSourceConfAzureAdV2 . _azureConfClientSecret
|
||||||
|
-- let mArgs = (,) <$> mID <*> mSecret
|
||||||
|
-- guard $ isJust mArgs
|
||||||
|
-- return . uncurry p $ fromJust mArgs
|
||||||
|
-- tenantID = case appUserAuthConf of
|
||||||
|
-- UserAuthConfSingleSource (AuthSourceConfAzureAdV2 AzureConf{..})
|
||||||
|
-- -> tshow azureConfTenantId
|
||||||
|
-- _other
|
||||||
|
-- -> error "Tenant ID missing!"
|
||||||
|
oauth2Plugins
|
||||||
|
| UserAuthConfSingleSource (AuthSourceConfAzureAdV2 AzureConf{..}) <- appUserAuthConf
|
||||||
|
= singleton $ oauth2AzureADScoped (Set.toList azureConfScopes) (tshow azureConfClientId) azureConfClientSecret
|
||||||
|
| otherwise
|
||||||
|
= mempty
|
||||||
|
#endif
|
||||||
|
let appAuthPlugins = oauth2Plugins
|
||||||
|
|
||||||
|
|
||||||
let appVolatileClusterSettingsCacheTime' = Clock.fromNanoSecs ns
|
let appVolatileClusterSettingsCacheTime' = Clock.fromNanoSecs ns
|
||||||
where (MkFixed ns :: Nano) = realToFrac appVolatileClusterSettingsCacheTime
|
where (MkFixed ns :: Nano) = realToFrac appVolatileClusterSettingsCacheTime
|
||||||
appVolatileClusterSettingsCache <- newTVarIO $ mkVolatileClusterSettingsCache appVolatileClusterSettingsCacheTime'
|
appVolatileClusterSettingsCache <- newTVarIO $ mkVolatileClusterSettingsCache appVolatileClusterSettingsCacheTime'
|
||||||
@ -377,7 +411,8 @@ makeFoundation appSettings''@AppSettings{..} = do
|
|||||||
|
|
||||||
$logDebugS "Runtime configuration" $ tshowCrop appSettings'
|
$logDebugS "Runtime configuration" $ tshowCrop appSettings'
|
||||||
|
|
||||||
let foundation = mkFoundation appSettings' sqlPool smtpPool ldapPool appCryptoIDKey appSessionStore appSecretBoxKey appWidgetMemcached appJSONWebKeySet appClusterID appMemcached appMemcachedLocal appUploadCache appVerpSecret appAuthKey appPersonalisedSheetFilesSeedKey appVolatileClusterSettingsCache appAvsQuery
|
-- TODO: reimplement user db failover
|
||||||
|
let foundation = mkFoundation appSettings' sqlPool smtpPool ldapPool appCryptoIDKey appSessionStore appSecretBoxKey appWidgetMemcached appJSONWebKeySet appClusterID appMemcached appMemcachedLocal appUploadCache appVerpSecret appAuthKey appAuthPlugins appPersonalisedSheetFilesSeedKey appVolatileClusterSettingsCache appAvsQuery
|
||||||
|
|
||||||
-- Return the foundation
|
-- Return the foundation
|
||||||
$logInfoS "setup" "*** DONE ***"
|
$logInfoS "setup" "*** DONE ***"
|
||||||
@ -476,66 +511,6 @@ createMemcached MemcachedConf{memcachedConnectInfo} = snd <$> allocate (Memcache
|
|||||||
makeApplication :: MonadIO m => UniWorX -> m Application
|
makeApplication :: MonadIO m => UniWorX -> m Application
|
||||||
makeApplication foundation = liftIO $ makeMiddleware foundation <*> toWaiAppPlain foundation
|
makeApplication foundation = liftIO $ makeMiddleware foundation <*> toWaiAppPlain foundation
|
||||||
|
|
||||||
makeMiddleware :: MonadIO m => UniWorX -> m Middleware
|
|
||||||
makeMiddleware app = do
|
|
||||||
logWare <- makeLogWare
|
|
||||||
return $ observeHTTPRequestLatency classifyHandler . logWare . normalizeCookies . defaultMiddlewaresNoLogging
|
|
||||||
where
|
|
||||||
makeLogWare = do
|
|
||||||
logWareMap <- liftIO $ newTVarIO HashMap.empty
|
|
||||||
|
|
||||||
let
|
|
||||||
mkLogWare ls@LogSettings{..} = do
|
|
||||||
logger <- readTVarIO . snd $ appLogger app
|
|
||||||
logWare <- mkRequestLogger def
|
|
||||||
{ outputFormat = bool
|
|
||||||
(Apache . bool FromSocket FromHeader $ app ^. _appIpFromHeader)
|
|
||||||
(Detailed True)
|
|
||||||
logDetailed
|
|
||||||
, destination = Logger $ loggerSet logger
|
|
||||||
}
|
|
||||||
atomically . modifyTVar' logWareMap $ HashMap.insert ls logWare
|
|
||||||
return logWare
|
|
||||||
|
|
||||||
void. liftIO $
|
|
||||||
mkLogWare =<< readTVarIO (appLogSettings app)
|
|
||||||
|
|
||||||
return $ \wai req fin -> do
|
|
||||||
lookupRes <- atomically $ do
|
|
||||||
ls <- readTVar $ appLogSettings app
|
|
||||||
existing <- HashMap.lookup ls <$> readTVar logWareMap
|
|
||||||
return $ maybe (Left ls) Right existing
|
|
||||||
logWare <- either mkLogWare return lookupRes
|
|
||||||
logWare wai req fin
|
|
||||||
|
|
||||||
normalizeCookies :: Wai.Middleware
|
|
||||||
normalizeCookies waiApp req respond = waiApp req $ \res -> do
|
|
||||||
resHdrs' <- go $ Wai.responseHeaders res
|
|
||||||
respond $ Wai.mapResponseHeaders (const resHdrs') res
|
|
||||||
where parseSetCookie' :: ByteString -> IO (Maybe SetCookie)
|
|
||||||
parseSetCookie' = fmap (either (\(_ :: SomeException) -> Nothing) Just) . try . evaluate . force . parseSetCookie
|
|
||||||
|
|
||||||
go [] = return []
|
|
||||||
go (hdr@(hdrName, hdrValue) : hdrs)
|
|
||||||
| hdrName == hSetCookie = do
|
|
||||||
mcookieHdr <- parseSetCookie' hdrValue
|
|
||||||
case mcookieHdr of
|
|
||||||
Nothing -> (hdr :) <$> go hdrs
|
|
||||||
Just cookieHdr -> do
|
|
||||||
let cookieHdrMatches hdrValue' = maybeT (return False) $ do
|
|
||||||
cookieHdr' <- MaybeT $ parseSetCookie' hdrValue'
|
|
||||||
-- See https://tools.ietf.org/html/rfc6265
|
|
||||||
guard $ setCookiePath cookieHdr' == setCookiePath cookieHdr
|
|
||||||
guard $ setCookieName cookieHdr' == setCookieName cookieHdr
|
|
||||||
guard $ setCookieDomain cookieHdr' == setCookieDomain cookieHdr
|
|
||||||
return True
|
|
||||||
others <- filterM (\(hdrName', hdrValue') -> and2M (pure $ hdrName' == hSetCookie) (cookieHdrMatches hdrValue')) hdrs
|
|
||||||
if | null others -> (hdr :) <$> go hdrs
|
|
||||||
| otherwise -> go hdrs
|
|
||||||
| otherwise = (hdr :) <$> go hdrs
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
-- | Warp settings for the given foundation value.
|
-- | Warp settings for the given foundation value.
|
||||||
warpSettings :: UniWorX -> Settings
|
warpSettings :: UniWorX -> Settings
|
||||||
warpSettings foundation = defaultSettings
|
warpSettings foundation = defaultSettings
|
||||||
@ -616,6 +591,8 @@ appMain = runResourceT $ do
|
|||||||
foundation <- makeFoundation settings
|
foundation <- makeFoundation settings
|
||||||
|
|
||||||
runAppLoggingT foundation $ do
|
runAppLoggingT foundation $ do
|
||||||
|
$logDebugS "AppSettings" $ tshow settings
|
||||||
|
|
||||||
$logInfoS "setup" "Job-Handling"
|
$logInfoS "setup" "Job-Handling"
|
||||||
handleJobs foundation
|
handleJobs foundation
|
||||||
|
|
||||||
@ -732,7 +709,7 @@ shutdownApp app = do
|
|||||||
liftIO $ do
|
liftIO $ do
|
||||||
Custom.purgePool $ appConnPool app
|
Custom.purgePool $ appConnPool app
|
||||||
for_ (appSmtpPool app) destroyAllResources
|
for_ (appSmtpPool app) destroyAllResources
|
||||||
for_ (appLdapPool app) . mapFailover $ views _2 destroyAllResources
|
for_ (appLdapPool app) $ views _2 destroyAllResources
|
||||||
for_ (appWidgetMemcached app) Memcached.close
|
for_ (appWidgetMemcached app) Memcached.close
|
||||||
for_ (appMemcached app) $ views _memcachedConn Memcached.close
|
for_ (appMemcached app) $ views _memcachedConn Memcached.close
|
||||||
release . fst $ appLogger app
|
release . fst $ appLogger app
|
||||||
@ -757,7 +734,7 @@ db' = handler' . runDB
|
|||||||
addPWEntry :: User
|
addPWEntry :: User
|
||||||
-> Text {-^ Password -}
|
-> Text {-^ Password -}
|
||||||
-> IO ()
|
-> IO ()
|
||||||
addPWEntry User{ userAuthentication = _, ..} (Text.encodeUtf8 -> pw) = db' $ do
|
addPWEntry User{ userPasswordHash = _, ..} (Text.encodeUtf8 -> pw) = db' $ do
|
||||||
PWHashConf{..} <- getsYesod $ view _appAuthPWHash
|
PWHashConf{..} <- getsYesod $ view _appAuthPWHash
|
||||||
(AuthPWHash . Text.decodeUtf8 -> userAuthentication) <- liftIO $ makePasswordWith pwHashAlgorithm pw pwHashStrength
|
(Just . Text.decodeUtf8 -> userPasswordHash) <- liftIO $ makePasswordWith pwHashAlgorithm pw pwHashStrength
|
||||||
void $ insert User{..}
|
void $ insert User{..}
|
||||||
|
|||||||
242
src/Auth/LDAP.hs
242
src/Auth/LDAP.hs
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Felix Hamann <felix.hamann@campus.lmu.de>,Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Felix Hamann <felix.hamann@campus.lmu.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@cip.ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -7,11 +7,11 @@
|
|||||||
module Auth.LDAP
|
module Auth.LDAP
|
||||||
( apLdap
|
( apLdap
|
||||||
, ADError(..), ADInvalidCredentials(..)
|
, ADError(..), ADInvalidCredentials(..)
|
||||||
, campusLogin
|
, ldapLogin
|
||||||
, CampusUserException(..)
|
, LdapUserException(..)
|
||||||
, campusUser, campusUser', campusUser''
|
, ldapUser, ldapUser', ldapUser''
|
||||||
, campusUserReTest, campusUserReTest'
|
--, ldapUserReTest, ldapUserReTest'
|
||||||
, campusUserMatr, campusUserMatr'
|
, ldapUserMatr, ldapUserMatr'
|
||||||
, CampusMessage(..)
|
, CampusMessage(..)
|
||||||
, ldapPrimaryKey
|
, ldapPrimaryKey
|
||||||
, ldapUserPrincipalName, ldapUserEmail, ldapUserDisplayName
|
, ldapUserPrincipalName, ldapUserEmail, ldapUserDisplayName
|
||||||
@ -20,32 +20,36 @@ module Auth.LDAP
|
|||||||
, ldapUserMobile, ldapUserTelephone
|
, ldapUserMobile, ldapUserTelephone
|
||||||
, ldapUserFraportPersonalnummer, ldapUserFraportAbteilung
|
, ldapUserFraportPersonalnummer, ldapUserFraportAbteilung
|
||||||
, ldapUserTitle
|
, ldapUserTitle
|
||||||
|
, ldapSearch
|
||||||
) where
|
) where
|
||||||
|
|
||||||
import Import.NoFoundation
|
import Import.NoFoundation
|
||||||
|
|
||||||
import qualified Data.CaseInsensitive as CI
|
import Auth.LDAP.AD
|
||||||
|
|
||||||
import Utils.Metrics
|
|
||||||
import Utils.Form
|
|
||||||
|
|
||||||
import qualified Ldap.Client as Ldap
|
import qualified Ldap.Client as Ldap
|
||||||
|
|
||||||
|
import Utils.Form
|
||||||
|
import Utils.Metrics
|
||||||
|
|
||||||
|
import qualified Data.CaseInsensitive as CI
|
||||||
import qualified Data.Text.Encoding as Text
|
import qualified Data.Text.Encoding as Text
|
||||||
|
|
||||||
import qualified Yesod.Auth.Message as Msg
|
import qualified Yesod.Auth.Message as Msg
|
||||||
|
|
||||||
import Auth.LDAP.AD
|
|
||||||
|
|
||||||
-- allow Ldap.Attr usage as key for Data.Map
|
-- | Plugin name of the LDAP yesod auth plugin
|
||||||
deriving newtype instance Ord Ldap.Attr
|
apLdap :: Text
|
||||||
|
apLdap = "LDAP"
|
||||||
|
|
||||||
|
|
||||||
|
-- TODO: rename
|
||||||
data CampusLogin = CampusLogin
|
data CampusLogin = CampusLogin
|
||||||
{ campusIdent :: CI Text
|
{ campusIdent :: CI Text
|
||||||
, campusPassword :: Text
|
, campusPassword :: Text
|
||||||
} deriving (Generic)
|
} deriving (Generic)
|
||||||
|
|
||||||
|
-- TODO: rename
|
||||||
data CampusMessage = MsgCampusIdentPlaceholder
|
data CampusMessage = MsgCampusIdentPlaceholder
|
||||||
| MsgCampusIdent
|
| MsgCampusIdent
|
||||||
| MsgCampusPassword
|
| MsgCampusPassword
|
||||||
@ -53,8 +57,12 @@ data CampusMessage = MsgCampusIdentPlaceholder
|
|||||||
deriving (Eq, Ord, Enum, Bounded, Read, Show, Generic)
|
deriving (Eq, Ord, Enum, Bounded, Read, Show, Generic)
|
||||||
|
|
||||||
|
|
||||||
findUser :: LdapConf -> Ldap -> Text -> [Ldap.Attr] -> IO [Ldap.SearchEntry]
|
findUser :: LdapConf
|
||||||
findUser conf@LdapConf{..} ldap ident retAttrs = fromMaybe [] <$> findM (assertM (not . null) . lift . flip (Ldap.search ldap ldapBase $ userSearchSettings conf) retAttrs) userFilters
|
-> Ldap
|
||||||
|
-> Text -- ^ needle
|
||||||
|
-> [Ldap.Attr]
|
||||||
|
-> IO [Ldap.SearchEntry]
|
||||||
|
findUser conf@LdapConf{..} ldap ident retAttrs = fromMaybe [] <$> findM (assertM (not . null) . lift . flip (Ldap.search ldap ldapConfBase $ userSearchSettings conf) retAttrs) userFilters
|
||||||
where
|
where
|
||||||
userFilters =
|
userFilters =
|
||||||
[ ldapUserPrincipalName Ldap.:= Text.encodeUtf8 ident
|
[ ldapUserPrincipalName Ldap.:= Text.encodeUtf8 ident
|
||||||
@ -69,21 +77,37 @@ findUser conf@LdapConf{..} ldap ident retAttrs = fromMaybe [] <$> findM (assertM
|
|||||||
[ ldapUserFraportPersonalnummer Ldap.:= Text.encodeUtf8 ident
|
[ ldapUserFraportPersonalnummer Ldap.:= Text.encodeUtf8 ident
|
||||||
]
|
]
|
||||||
|
|
||||||
findUserMatr :: LdapConf -> Ldap -> Text -> [Ldap.Attr] -> IO [Ldap.SearchEntry]
|
findUserMatr :: LdapConf
|
||||||
findUserMatr conf@LdapConf{..} ldap userMatr retAttrs = fromMaybe [] <$> findM (assertM (not . null) . lift . flip (Ldap.search ldap ldapBase $ userSearchSettings conf) retAttrs) userFilters
|
-> Ldap
|
||||||
|
-> Text -- ^ matriculation needle
|
||||||
|
-> [Ldap.Attr]
|
||||||
|
-> IO [Ldap.SearchEntry]
|
||||||
|
findUserMatr conf@LdapConf{..} ldap userMatr retAttrs = fromMaybe [] <$> findM (assertM (not . null) . lift . flip (Ldap.search ldap ldapConfBase $ userSearchSettings conf) retAttrs) userFilters
|
||||||
where
|
where
|
||||||
userFilters =
|
userFilters =
|
||||||
[ ldapUserFraportPersonalnummer Ldap.:= Text.encodeUtf8 userMatr
|
[ ldapUserFraportPersonalnummer Ldap.:= Text.encodeUtf8 userMatr
|
||||||
]
|
]
|
||||||
|
|
||||||
userSearchSettings :: LdapConf -> Ldap.Mod Ldap.Search
|
userSearchSettings :: LdapConf
|
||||||
|
-> Ldap.Mod Ldap.Search
|
||||||
userSearchSettings LdapConf{..} = mconcat
|
userSearchSettings LdapConf{..} = mconcat
|
||||||
[ Ldap.scope ldapScope
|
[ Ldap.scope ldapConfScope
|
||||||
, Ldap.size 2
|
, Ldap.size 2
|
||||||
, Ldap.time ldapSearchTimeout
|
, Ldap.time ldapConfSearchTimeout
|
||||||
, Ldap.derefAliases Ldap.DerefAlways
|
, Ldap.derefAliases Ldap.DerefAlways
|
||||||
]
|
]
|
||||||
|
|
||||||
|
ldapSearch :: forall m.
|
||||||
|
( MonadUnliftIO m
|
||||||
|
, MonadCatch m
|
||||||
|
)
|
||||||
|
=> (LdapConf, LdapPool)
|
||||||
|
-> Text -- ^ needle
|
||||||
|
-> m [Ldap.SearchEntry]
|
||||||
|
ldapSearch (conf@LdapConf{..}, ldapPool) needle = either (throwM . LdapUserLdapError) return <=< withLdap ldapPool $ \ldap -> liftIO $ do
|
||||||
|
Ldap.bind ldap ldapConfDn ldapConfPassword
|
||||||
|
findUser conf ldap needle []
|
||||||
|
|
||||||
ldapPrimaryKey, ldapUserPrincipalName, ldapUserDisplayName, ldapUserFirstName, ldapUserSurname, ldapAffiliation, ldapUserTitle, ldapUserTelephone, ldapUserMobile, ldapUserFraportPersonalnummer, ldapUserFraportAbteilung :: Ldap.Attr
|
ldapPrimaryKey, ldapUserPrincipalName, ldapUserDisplayName, ldapUserFirstName, ldapUserSurname, ldapAffiliation, ldapUserTitle, ldapUserTelephone, ldapUserMobile, ldapUserFraportPersonalnummer, ldapUserFraportAbteilung :: Ldap.Attr
|
||||||
ldapPrimaryKey = Ldap.Attr "cn" -- should always be identical to "sAMAccountName"
|
ldapPrimaryKey = Ldap.Attr "cn" -- should always be identical to "sAMAccountName"
|
||||||
ldapUserPrincipalName = Ldap.Attr "userPrincipalName"
|
ldapUserPrincipalName = Ldap.Attr "userPrincipalName"
|
||||||
@ -104,30 +128,35 @@ ldapUserEmail = Ldap.Attr "mail" :|
|
|||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
data CampusUserException = CampusUserLdapError LdapPoolError
|
-- TODO: deprecate in favour of FetchUserDataException
|
||||||
| CampusUserNoResult
|
data LdapUserException = LdapUserLdapError LdapPoolError
|
||||||
| CampusUserAmbiguous
|
| LdapUserNoResult
|
||||||
|
| LdapUserAmbiguous
|
||||||
deriving (Show, Eq, Generic)
|
deriving (Show, Eq, Generic)
|
||||||
|
|
||||||
instance Exception CampusUserException
|
instance Exception LdapUserException
|
||||||
|
|
||||||
makePrisms ''CampusUserException
|
makePrisms ''LdapUserException
|
||||||
|
|
||||||
campusUserWith :: ( MonadUnliftIO m
|
|
||||||
, MonadCatch m
|
ldapUserWith :: ( MonadUnliftIO m
|
||||||
)
|
, MonadCatch m
|
||||||
=> ( Lens (LdapConf, LdapPool) (LdapConf, Ldap) LdapPool Ldap
|
--, MonadLogger m
|
||||||
-> Failover (LdapConf, LdapPool)
|
)
|
||||||
-> FailoverMode
|
-- ( Lens (LdapConf, LdapPool) (LdapConf, Ldap) LdapPool Ldap
|
||||||
-> ((LdapConf, Ldap) -> m (Either CampusUserException (Ldap.AttrList [])))
|
-- -> (LdapConf, LdapPool)
|
||||||
-> m (Either LdapPoolError (Either CampusUserException (Ldap.AttrList [])))
|
-- -> ((LdapConf, Ldap) -> m (Either CampusUserException (Ldap.AttrList [])))
|
||||||
)
|
-- -> m (Either LdapPoolError (Either CampusUserException (Ldap.AttrList [])))
|
||||||
-> Failover (LdapConf, LdapPool)
|
-- )
|
||||||
-> FailoverMode
|
=> ( LdapPool
|
||||||
-> Creds site
|
-> (Ldap -> m (Either LdapUserException (Ldap.AttrList [])))
|
||||||
-> m (Either CampusUserException (Ldap.AttrList []))
|
-> m (Either LdapPoolError (Either LdapUserException (Ldap.AttrList [])))
|
||||||
campusUserWith withLdap' pool mode Creds{..} = either (throwM . CampusUserLdapError) return <=< withLdap' _2 pool mode $ \(conf@LdapConf{..}, ldap) -> liftIO . runExceptT $ do
|
)
|
||||||
lift $ Ldap.bind ldap ldapDn ldapPassword
|
-> (LdapConf, LdapPool)
|
||||||
|
-> Creds site
|
||||||
|
-> m (Either LdapUserException (Ldap.AttrList []))
|
||||||
|
ldapUserWith withLdap' (conf@LdapConf{..}, pool) Creds{..} = either (throwM . LdapUserLdapError) return <=< withLdap' pool $ \ldap -> liftIO . runExceptT $ do
|
||||||
|
lift $ Ldap.bind ldap ldapConfDn ldapConfPassword
|
||||||
results <- case lookup "DN" credsExtra of
|
results <- case lookup "DN" credsExtra of
|
||||||
Just userDN -> do
|
Just userDN -> do
|
||||||
let userFilter = Ldap.Present ldapUserPrincipalName
|
let userFilter = Ldap.Present ldapUserPrincipalName
|
||||||
@ -135,43 +164,91 @@ campusUserWith withLdap' pool mode Creds{..} = either (throwM . CampusUserLdapEr
|
|||||||
Nothing -> do
|
Nothing -> do
|
||||||
lift $ findUser conf ldap credsIdent []
|
lift $ findUser conf ldap credsIdent []
|
||||||
case results of
|
case results of
|
||||||
[] -> throwE CampusUserNoResult
|
[] -> throwE LdapUserNoResult
|
||||||
[Ldap.SearchEntry _ attrs] -> return attrs
|
[Ldap.SearchEntry _ attrs] -> return attrs
|
||||||
_otherwise -> throwE CampusUserAmbiguous
|
_otherwise -> throwE LdapUserAmbiguous
|
||||||
|
|
||||||
campusUserReTest :: (MonadUnliftIO m, MonadMask m, MonadLogger m) => Failover (LdapConf, LdapPool) -> (Nano -> Bool) -> FailoverMode -> Creds site -> m (Ldap.AttrList [])
|
|
||||||
campusUserReTest pool doTest mode creds = throwLeft =<< campusUserWith (\l -> flip (withLdapFailoverReTest l) doTest) pool mode creds
|
|
||||||
|
|
||||||
campusUserReTest' :: (MonadMask m, MonadLogger m, MonadUnliftIO m) => Failover (LdapConf, LdapPool) -> (Nano -> Bool) -> FailoverMode -> User -> m (Maybe (Ldap.AttrList []))
|
|
||||||
campusUserReTest' pool doTest mode User{userIdent,userLdapPrimaryKey}
|
|
||||||
= runMaybeT . catchIfMaybeT (is _CampusUserNoResult) $ campusUserReTest pool doTest mode (Creds apLdap upsertIdent [])
|
|
||||||
where upsertIdent = fromMaybe (CI.original userIdent) userLdapPrimaryKey
|
|
||||||
|
|
||||||
|
|
||||||
campusUser :: (MonadMask m, MonadUnliftIO m, MonadLogger m) => Failover (LdapConf, LdapPool) -> FailoverMode -> Creds site -> m (Ldap.AttrList [])
|
-- TODO: reintroduce once failover has been reimplemented
|
||||||
campusUser pool mode creds = throwLeft =<< campusUserWith withLdapFailover pool mode creds
|
-- ldapUserReTest :: ( MonadUnliftIO m
|
||||||
|
-- , MonadMask m
|
||||||
|
-- , MonadLogger m
|
||||||
|
-- )
|
||||||
|
-- => Failover (LdapConf, LdapPool)
|
||||||
|
-- -> (Nano -> Bool)
|
||||||
|
-- -> FailoverMode
|
||||||
|
-- -> Creds site
|
||||||
|
-- -> m (Ldap.AttrList [])
|
||||||
|
-- ldapUserReTest pool doTest mode creds = throwLeft =<< ldapUserWith (\l -> flip (withLdapFailoverReTest l) doTest) pool mode creds
|
||||||
|
--
|
||||||
|
-- ldapUserReTest' :: ( MonadMask m
|
||||||
|
-- , MonadLogger m
|
||||||
|
-- , MonadUnliftIO m
|
||||||
|
-- )
|
||||||
|
-- => Failover (LdapConf, LdapPool)
|
||||||
|
-- -> (Nano -> Bool)
|
||||||
|
-- -> FailoverMode
|
||||||
|
-- -> User
|
||||||
|
-- -> m (Maybe (Ldap.AttrList []))
|
||||||
|
-- ldapUserReTest' pool doTest mode User{userIdent,userLdapPrimaryKey}
|
||||||
|
-- = runMaybeT . catchIfMaybeT (is _CampusUserNoResult) $ ldapUserReTest pool doTest mode (Creds apLdap upsertIdent [])
|
||||||
|
-- where upsertIdent = fromMaybe (CI.original userIdent) userLdapPrimaryKey
|
||||||
|
|
||||||
campusUser' :: (MonadMask m, MonadUnliftIO m, MonadLogger m) => Failover (LdapConf, LdapPool) -> FailoverMode -> User -> m (Maybe (Ldap.AttrList []))
|
|
||||||
campusUser' pool mode User{userIdent}
|
|
||||||
= campusUser'' pool mode $ CI.original userIdent
|
|
||||||
|
|
||||||
campusUser'' :: (MonadMask m, MonadUnliftIO m, MonadLogger m) => Failover (LdapConf, LdapPool) -> FailoverMode -> Text -> m (Maybe (Ldap.AttrList []))
|
-- TODO: deprecate in favour of fetchUserData
|
||||||
campusUser'' pool mode ident
|
ldapUser :: ( MonadMask m
|
||||||
= runMaybeT . catchIfMaybeT (is _CampusUserNoResult) $ campusUser pool mode (Creds apLdap ident [])
|
, MonadUnliftIO m
|
||||||
|
--, MonadLogger m
|
||||||
|
)
|
||||||
|
=> (LdapConf, LdapPool)
|
||||||
|
-> Creds site
|
||||||
|
-> m (Ldap.AttrList [])
|
||||||
|
ldapUser pool creds = throwLeft =<< ldapUserWith withLdap pool creds
|
||||||
|
|
||||||
campusUserMatr :: (MonadUnliftIO m, MonadMask m, MonadLogger m) => Failover (LdapConf, LdapPool) -> FailoverMode -> UserMatriculation -> m (Ldap.AttrList [])
|
ldapUser' :: ( MonadMask m
|
||||||
campusUserMatr pool mode userMatr = either (throwM . CampusUserLdapError) return <=< withLdapFailover _2 pool mode $ \(conf@LdapConf{..}, ldap) -> liftIO $ do
|
, MonadUnliftIO m
|
||||||
Ldap.bind ldap ldapDn ldapPassword
|
--, MonadLogger m
|
||||||
|
)
|
||||||
|
=> (LdapConf, LdapPool)
|
||||||
|
-> User
|
||||||
|
-> m (Maybe (Ldap.AttrList []))
|
||||||
|
ldapUser' pool User{userIdent}
|
||||||
|
= ldapUser'' pool $ CI.original userIdent
|
||||||
|
|
||||||
|
ldapUser'' :: ( MonadMask m
|
||||||
|
, MonadUnliftIO m
|
||||||
|
--, MonadLogger m
|
||||||
|
)
|
||||||
|
=> (LdapConf, LdapPool)
|
||||||
|
-> Text
|
||||||
|
-> m (Maybe (Ldap.AttrList []))
|
||||||
|
ldapUser'' pool ident
|
||||||
|
= runMaybeT . catchIfMaybeT (is _LdapUserNoResult) $ ldapUser pool (Creds apLdap ident [])
|
||||||
|
|
||||||
|
|
||||||
|
ldapUserMatr :: ( MonadUnliftIO m
|
||||||
|
, MonadMask m
|
||||||
|
--, MonadLogger m
|
||||||
|
)
|
||||||
|
=> (LdapConf, LdapPool)
|
||||||
|
-> UserMatriculation
|
||||||
|
-> m (Ldap.AttrList [])
|
||||||
|
ldapUserMatr (conf@LdapConf{..}, pool) userMatr = either (throwM . LdapUserLdapError) return <=< withLdap pool $ \ldap -> liftIO $ do
|
||||||
|
Ldap.bind ldap ldapConfDn ldapConfPassword
|
||||||
results <- findUserMatr conf ldap userMatr []
|
results <- findUserMatr conf ldap userMatr []
|
||||||
case results of
|
case results of
|
||||||
[] -> throwM CampusUserNoResult
|
[] -> throwM LdapUserNoResult
|
||||||
[Ldap.SearchEntry _ attrs] -> return attrs
|
[Ldap.SearchEntry _ attrs] -> return attrs
|
||||||
_otherwise -> throwM CampusUserAmbiguous
|
_otherwise -> throwM LdapUserAmbiguous
|
||||||
|
|
||||||
campusUserMatr' :: (MonadMask m, MonadUnliftIO m, MonadLogger m) => Failover (LdapConf, LdapPool) -> FailoverMode -> UserMatriculation -> m (Maybe (Ldap.AttrList []))
|
|
||||||
campusUserMatr' pool mode
|
|
||||||
= runMaybeT . catchIfMaybeT (is _CampusUserNoResult) . campusUserMatr pool mode
|
|
||||||
|
|
||||||
|
ldapUserMatr' :: ( MonadMask m
|
||||||
|
, MonadUnliftIO m
|
||||||
|
--, MonadLogger m
|
||||||
|
)
|
||||||
|
=> (LdapConf, LdapPool)
|
||||||
|
-> UserMatriculation
|
||||||
|
-> m (Maybe (Ldap.AttrList []))
|
||||||
|
ldapUserMatr' pool = runMaybeT . catchIfMaybeT (is _LdapUserNoResult) . ldapUserMatr pool
|
||||||
|
|
||||||
|
|
||||||
newtype ADInvalidCredentials = ADInvalidCredentials ADError
|
newtype ADInvalidCredentials = ADInvalidCredentials ADError
|
||||||
@ -186,25 +263,28 @@ campusForm :: ( RenderMessage (HandlerSite m) FormMessage
|
|||||||
, RenderMessage (HandlerSite m) (ValueRequired (HandlerSite m))
|
, RenderMessage (HandlerSite m) (ValueRequired (HandlerSite m))
|
||||||
, RenderMessage (HandlerSite m) CampusMessage
|
, RenderMessage (HandlerSite m) CampusMessage
|
||||||
, MonadHandler m
|
, MonadHandler m
|
||||||
) => WForm m (FormResult CampusLogin)
|
)
|
||||||
|
=> WForm m (FormResult CampusLogin)
|
||||||
campusForm = do
|
campusForm = do
|
||||||
MsgRenderer mr <- getMsgRenderer
|
MsgRenderer mr <- getMsgRenderer
|
||||||
aFormToWForm $ CampusLogin
|
aFormToWForm $ CampusLogin
|
||||||
<$> areq ciField (fslpI MsgCampusIdent (mr MsgCampusIdentPlaceholder) & addAttr "autofocus" "" & addAttr "autocomplete" "username") Nothing
|
<$> areq ciField (fslpI MsgCampusIdent (mr MsgCampusIdentPlaceholder) & addAttr "autofocus" "" & addAttr "autocomplete" "username") Nothing
|
||||||
<*> areq passwordField (fslpI MsgCampusPassword (mr MsgCampusPasswordPlaceholder) & addAttr "autocomplete" "current-password") Nothing
|
<*> areq passwordField (fslpI MsgCampusPassword (mr MsgCampusPasswordPlaceholder) & addAttr "autocomplete" "current-password") Nothing
|
||||||
|
|
||||||
apLdap :: Text
|
|
||||||
apLdap = "LDAP"
|
|
||||||
|
|
||||||
campusLogin :: forall site.
|
-- TODO: reintroduce Failover
|
||||||
( YesodAuth site
|
ldapLogin :: forall site.
|
||||||
, RenderMessage site CampusMessage
|
( YesodAuth site
|
||||||
, RenderAFormSite site
|
, RenderMessage site CampusMessage
|
||||||
, RenderMessage site (ValueRequired site)
|
, RenderAFormSite site
|
||||||
, RenderMessage site ADInvalidCredentials
|
, RenderMessage site (ValueRequired site)
|
||||||
, Button site ButtonSubmit
|
, RenderMessage site ADInvalidCredentials
|
||||||
) => Failover (LdapConf, LdapPool) -> FailoverMode -> AuthPlugin site
|
, Button site ButtonSubmit
|
||||||
campusLogin pool mode = AuthPlugin{..}
|
)
|
||||||
|
=> LdapConf
|
||||||
|
-> LdapPool
|
||||||
|
-> AuthPlugin site
|
||||||
|
ldapLogin conf@LdapConf{..} pool = AuthPlugin{..}
|
||||||
where
|
where
|
||||||
apName :: Text
|
apName :: Text
|
||||||
apName = apLdap
|
apName = apLdap
|
||||||
@ -215,8 +295,8 @@ campusLogin pool mode = AuthPlugin{..}
|
|||||||
tp <- getRouteToParent
|
tp <- getRouteToParent
|
||||||
|
|
||||||
resp <- formResultMaybe loginRes $ \CampusLogin{ campusIdent = CI.original -> campusIdent, ..} -> Just <$> do
|
resp <- formResultMaybe loginRes $ \CampusLogin{ campusIdent = CI.original -> campusIdent, ..} -> Just <$> do
|
||||||
ldapResult <- withLdapFailover _2 pool mode $ \(conf@LdapConf{..}, ldap) -> liftIO $ do
|
ldapResult <- withLdap pool $ \ldap -> liftIO $ do
|
||||||
Ldap.bind ldap ldapDn ldapPassword
|
Ldap.bind ldap ldapConfDn ldapConfPassword
|
||||||
searchResults <- findUser conf ldap campusIdent [ldapUserPrincipalName]
|
searchResults <- findUser conf ldap campusIdent [ldapUserPrincipalName]
|
||||||
case searchResults of
|
case searchResults of
|
||||||
[Ldap.SearchEntry (Ldap.Dn userDN) userAttrs]
|
[Ldap.SearchEntry (Ldap.Dn userDN) userAttrs]
|
||||||
|
|||||||
248
src/Auth/OAuth2.hs
Normal file
248
src/Auth/OAuth2.hs
Normal file
@ -0,0 +1,248 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2023-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, David Mosbach <david.mosbach@uniworx.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
{-# OPTIONS_GHC -fno-warn-orphans #-}
|
||||||
|
{-# OPTIONS_GHC -fno-warn-redundant-constraints #-}
|
||||||
|
|
||||||
|
module Auth.OAuth2
|
||||||
|
( apAzure
|
||||||
|
, azurePrimaryKey, azureUserPrincipalName, azureUserDisplayName, azureUserGivenName, azureUserSurname, azureUserMail, azureUserTelephone, azureUserMobile, azureUserPreferredLanguage
|
||||||
|
-- , azureUser, azureUser'
|
||||||
|
, AzureUserException(..), _AzureUserError, _AzureUserNoResult, _AzureUserAmbiguous
|
||||||
|
, apAzureMock
|
||||||
|
, azureMockServer
|
||||||
|
, queryOAuth2User
|
||||||
|
, refreshOAuth2Token
|
||||||
|
, singleSignOut
|
||||||
|
) where
|
||||||
|
|
||||||
|
-- import qualified Data.CaseInsensitive as CI
|
||||||
|
import Data.Maybe (fromJust)
|
||||||
|
import Data.Text
|
||||||
|
|
||||||
|
import Import.NoFoundation hiding (pack, unpack)
|
||||||
|
|
||||||
|
import Network.HTTP.Simple (httpJSONEither, getResponseBody, JSONException)
|
||||||
|
|
||||||
|
import System.Environment (lookupEnv)
|
||||||
|
|
||||||
|
import Yesod.Auth.OAuth2
|
||||||
|
import Yesod.Auth.OAuth2.Prelude hiding (encodeUtf8)
|
||||||
|
|
||||||
|
-- | Plugin name of the OAuth2 yesod plugin for Azure ADv2
|
||||||
|
apAzure :: Text
|
||||||
|
apAzure = "AzureADv2"
|
||||||
|
|
||||||
|
|
||||||
|
-- TODO: deprecate in favour of FetchUserDataException
|
||||||
|
data AzureUserException = AzureUserError
|
||||||
|
| AzureUserNoResult
|
||||||
|
| AzureUserAmbiguous
|
||||||
|
deriving (Show, Eq, Generic)
|
||||||
|
|
||||||
|
instance Exception AzureUserException
|
||||||
|
|
||||||
|
makePrisms ''AzureUserException
|
||||||
|
|
||||||
|
|
||||||
|
azurePrimaryKey, azureUserPrincipalName, azureUserDisplayName, azureUserGivenName, azureUserSurname, azureUserMail, azureUserTelephone, azureUserMobile, azureUserPreferredLanguage :: Text
|
||||||
|
azurePrimaryKey = "id"
|
||||||
|
azureUserPrincipalName = "userPrincipalName"
|
||||||
|
azureUserDisplayName = "displayName"
|
||||||
|
azureUserGivenName = "givenName"
|
||||||
|
azureUserSurname = "surname"
|
||||||
|
azureUserMail = "mail"
|
||||||
|
azureUserTelephone = "businessPhones"
|
||||||
|
azureUserMobile = "mobilePhone"
|
||||||
|
azureUserPreferredLanguage = "preferredLanguage"
|
||||||
|
|
||||||
|
|
||||||
|
-- | User lookup in Microsoft Graph with given credentials
|
||||||
|
-- TODO: deprecate in favour of fetchUserData
|
||||||
|
-- azureUser :: ( MonadMask m
|
||||||
|
-- , MonadHandler m
|
||||||
|
-- -- , HandlerSite m ~ site
|
||||||
|
-- -- , BackendCompatible SqlBackend (YesodPersistBackend site)
|
||||||
|
-- -- , BaseBackend (YesodPersistBackend site) ~ SqlBackend
|
||||||
|
-- -- , YesodPersist site
|
||||||
|
-- -- , PersistUniqueWrite (YesodPersistBackend site)
|
||||||
|
-- )
|
||||||
|
-- => AzureConf
|
||||||
|
-- -> Creds site
|
||||||
|
-- -> m [(Text, [ByteString])] -- (Either AzureUserException [(Text, [ByteString])])
|
||||||
|
-- azureUser AzureConf{..} Creds{..} = fmap throwLeft . runExceptT $ do
|
||||||
|
-- now <- liftIO getCurrentTime
|
||||||
|
-- results <- queryOAuth2User @[(Text, [ByteString])] credsIdent
|
||||||
|
-- case results of
|
||||||
|
-- Right [res] -> do
|
||||||
|
-- -- void . liftHandler . runDB $ upsert ExternalUser
|
||||||
|
-- -- { externalUserUser = error "no userid" -- TODO: use azureUserPrimaryKey once UserIdent is referenced instead of UserId
|
||||||
|
-- -- , externalUserSource = AuthSourceIdAzure azureConfClientId
|
||||||
|
-- -- , externalUserData = toJSON res
|
||||||
|
-- -- , externalUserLastSync = now
|
||||||
|
-- -- }
|
||||||
|
-- -- [ ExternalUserData =. toJSON res
|
||||||
|
-- -- , ExternalUserLastSync =. now
|
||||||
|
-- -- ]
|
||||||
|
-- return res
|
||||||
|
-- Right _multiple -> throwE AzureUserAmbiguous
|
||||||
|
-- Left _ -> throwE AzureUserNoResult
|
||||||
|
|
||||||
|
-- | User lookup in Microsoft Graph with given user
|
||||||
|
-- azureUser' :: ( MonadMask m
|
||||||
|
-- , MonadHandler m
|
||||||
|
-- , HandlerSite m ~ site
|
||||||
|
-- , BaseBackend (YesodPersistBackend site) ~ SqlBackend
|
||||||
|
-- , YesodPersist site
|
||||||
|
-- , PersistUniqueWrite (YesodPersistBackend site)
|
||||||
|
-- )
|
||||||
|
-- => AzureConf
|
||||||
|
-- -> User
|
||||||
|
-- -> ReaderT (YesodPersistBackend site) m (Maybe [(Text, [ByteString])]) -- (Either AzureUserException [(Text, [ByteString])])
|
||||||
|
-- azureUser' conf User{userIdent}
|
||||||
|
-- = runMaybeT . catchIfMaybeT (is _AzureUserNoResult) $ azureUser conf (Creds apAzure (CI.original userIdent) [])
|
||||||
|
|
||||||
|
|
||||||
|
-----------------------------------------------
|
||||||
|
---- OAuth2 + OIDC development auth plugin ----
|
||||||
|
-----------------------------------------------
|
||||||
|
|
||||||
|
apAzureMock :: Text
|
||||||
|
apAzureMock = "uniworx_dev"
|
||||||
|
|
||||||
|
newtype UserID = UserID Text
|
||||||
|
instance FromJSON UserID where
|
||||||
|
parseJSON = withObject "UserID" $ \o ->
|
||||||
|
UserID <$> o .: "id"
|
||||||
|
|
||||||
|
azureMockServer :: YesodAuth m => String -> AuthPlugin m
|
||||||
|
azureMockServer port =
|
||||||
|
let oa = OAuth2
|
||||||
|
{ oauthClientId = "42"
|
||||||
|
, oauthClientSecret = Just "shhh"
|
||||||
|
, oauthOAuthorizeEndpoint = fromString (mockServerURL <> "/auth")
|
||||||
|
`withQuery` [ scopeParam " " ["openid", "profile", "email", "offline_access"] -- TODO read scopes from config
|
||||||
|
, ("response_type", "code id_token")
|
||||||
|
, ("nonce", "Foo") -- TODO generate meaningful value
|
||||||
|
]
|
||||||
|
, oauthAccessTokenEndpoint = fromString $ mockServerURL <> "/token"
|
||||||
|
, oauthCallback = Nothing
|
||||||
|
}
|
||||||
|
mockServerURL = "http://localhost:" <> fromString port
|
||||||
|
profileSrc = fromString $ mockServerURL <> "/users/me"
|
||||||
|
in authOAuth2 apAzureMock oa $ \manager token -> do
|
||||||
|
(UserID userID, userResponse) <- authGetProfile apAzureMock manager token profileSrc
|
||||||
|
return Creds
|
||||||
|
{ credsPlugin = apAzureMock
|
||||||
|
, credsIdent = userID
|
||||||
|
, credsExtra = setExtra token userResponse
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
----------------------
|
||||||
|
---- User Queries ----
|
||||||
|
----------------------
|
||||||
|
|
||||||
|
data UserDataException = UserDataJSONException JSONException
|
||||||
|
| UserDataInternalException Text
|
||||||
|
deriving Show
|
||||||
|
|
||||||
|
instance Exception UserDataException
|
||||||
|
|
||||||
|
queryOAuth2User :: forall j m.
|
||||||
|
( FromJSON j
|
||||||
|
, MonadHandler m
|
||||||
|
, HasAppSettings (HandlerSite m)
|
||||||
|
, MonadThrow m
|
||||||
|
)
|
||||||
|
=> Text -- ^ User identifier (arbitrary needle)
|
||||||
|
-> m (Either UserDataException j)
|
||||||
|
queryOAuth2User userID = runExceptT $ do
|
||||||
|
(queryUrl, tokenUrl) <- mkBaseUrls
|
||||||
|
req <- parseRequest $ "GET " ++ queryUrl ++ unpack userID
|
||||||
|
mTokens <- lookupSessionJson SessionOAuth2Token
|
||||||
|
unless (isJust mTokens) . throwE $ UserDataInternalException "Tried to load session Oauth2 tokens, but there are none"
|
||||||
|
# ifdef DEVELOPMENT
|
||||||
|
let secure = False
|
||||||
|
# else
|
||||||
|
let secure = True
|
||||||
|
# endif
|
||||||
|
newTokens <- refreshOAuth2Token @m (fromJust mTokens) tokenUrl secure
|
||||||
|
setSessionJson SessionOAuth2Token (Just $ accessToken newTokens, refreshToken newTokens)
|
||||||
|
eResult <- lift $ getResponseBody <$> httpJSONEither @m @j (req
|
||||||
|
{ secure = secure
|
||||||
|
, requestHeaders = [("Authorization", encodeUtf8 . ("Bearer " <>) . atoken $ accessToken newTokens)]
|
||||||
|
})
|
||||||
|
case eResult of
|
||||||
|
Left x -> throwE $ UserDataJSONException x
|
||||||
|
Right x -> return x
|
||||||
|
|
||||||
|
|
||||||
|
mkBaseUrls :: (MonadHandler m, HasAppSettings (HandlerSite m)) => m (String, String)
|
||||||
|
mkBaseUrls = do
|
||||||
|
# ifndef DEVELOPMENT
|
||||||
|
tenantID <- fmap (maybe (throwM $ UserDataInternalException "Could not determine tenant ID from current app configuration") show) . getsYesod . preview $ _appUserAuthConf . _userAuthConfSingleSource . _AuthSourceConfAzureAdV2 . _azureConfTenantId
|
||||||
|
return ( "https://graph.microsoft.com/v1.0/users/"
|
||||||
|
, "https://login.microsoftonline.com/" ++ tenantID ++ "/oauth2/v2.0" )
|
||||||
|
# else
|
||||||
|
port :: String <- liftIO $ maybe (throwM $ UserDataInternalException "Development environment variable OAUTH2_SERVER_PORT is unset") id <$> lookupEnv "OAUTH2_SERVER_PORT"
|
||||||
|
let base = "http://localhost:" ++ port
|
||||||
|
return ( base ++ "/users/query?id="
|
||||||
|
, base ++ "/token" )
|
||||||
|
# endif
|
||||||
|
|
||||||
|
|
||||||
|
refreshOAuth2Token :: forall m.
|
||||||
|
( MonadHandler m
|
||||||
|
, MonadThrow m
|
||||||
|
)
|
||||||
|
=> (Maybe AccessToken, Maybe RefreshToken)
|
||||||
|
-> String
|
||||||
|
-> Bool
|
||||||
|
-> ExceptT UserDataException m OAuth2Token
|
||||||
|
refreshOAuth2Token (_, rToken) url secure
|
||||||
|
| isJust rToken = do
|
||||||
|
req <- parseRequest $ "POST " ++ url
|
||||||
|
let
|
||||||
|
body =
|
||||||
|
[ ("grant_type", "refresh_token")
|
||||||
|
, ("refresh_token", encodeUtf8 . rtoken $ fromJust rToken)
|
||||||
|
]
|
||||||
|
body' <- if secure then do
|
||||||
|
clientID <- liftIO $ fromJust <$> lookupEnv "CLIENT_ID"
|
||||||
|
clientSecret <- liftIO $ fromJust <$> lookupEnv "CLIENT_SECRET"
|
||||||
|
return $ body ++ [("client_id", fromString clientID), ("client_secret", fromString clientSecret), scopeParam " " ["openid","profile"," offline_access"]] -- TODO read from config
|
||||||
|
else return $ scopeParam " " ["openid","profile","offline_access"] : body -- TODO read from config
|
||||||
|
$logDebugS "\27[31mAdmin Handler\27[0m" $ tshow (requestBody $ urlEncodedBody body' req{ secure = secure })
|
||||||
|
eResult <- lift $ getResponseBody <$> httpJSONEither @m @OAuth2Token (urlEncodedBody body' req{ secure = secure })
|
||||||
|
case eResult of
|
||||||
|
Left x -> throwE $ UserDataJSONException x
|
||||||
|
Right x -> return x
|
||||||
|
| otherwise = throwE $ UserDataInternalException "Could not refresh access token. Refresh token is missing."
|
||||||
|
|
||||||
|
instance Show RequestBody where
|
||||||
|
show (RequestBodyLBS x) = show x
|
||||||
|
show _ = error ":("
|
||||||
|
|
||||||
|
|
||||||
|
-----------------------
|
||||||
|
---- Single Sign-Out ----
|
||||||
|
-----------------------
|
||||||
|
|
||||||
|
singleSignOut :: forall a m. (MonadHandler m)
|
||||||
|
=> Maybe Text -- ^ redirect uri
|
||||||
|
-> m a
|
||||||
|
singleSignOut mRedirect = do
|
||||||
|
# ifdef DEVELOPMENT
|
||||||
|
port <- liftIO $ fromJust <$> lookupEnv "OAUTH2_SERVER_PORT"
|
||||||
|
let base = "http://localhost:" <> pack port <> "/logout"
|
||||||
|
# else
|
||||||
|
let base = "" -- TODO find out fraport oidc end_session_endpoint
|
||||||
|
# endif
|
||||||
|
endpoint = case mRedirect of
|
||||||
|
Just r -> base <> "?post_logout_redirect_uri=" <> r
|
||||||
|
Nothing -> base
|
||||||
|
$logDebugS "\n\27[31mSSO\27[0m" endpoint
|
||||||
|
redirect endpoint
|
||||||
|
|
||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Felix Hamann <felix.hamann@campus.lmu.de>,Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Felix Hamann <felix.hamann@campus.lmu.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -68,12 +68,13 @@ hashLogin pwHashAlgo = AuthPlugin{..}
|
|||||||
tp <- getRouteToParent
|
tp <- getRouteToParent
|
||||||
|
|
||||||
resp <- formResultMaybe loginRes $ \HashLogin{..} -> Just <$> do
|
resp <- formResultMaybe loginRes $ \HashLogin{..} -> Just <$> do
|
||||||
user <- liftHandler . runDB . getBy $ UniqueAuthentication hashIdent
|
user :: Maybe (Entity User) <- liftHandler . runDB . getBy $ UniqueAuthentication hashIdent
|
||||||
case user of
|
case user of
|
||||||
Just (Entity _ User{ userAuthentication = AuthPWHash{..}, userIdent = CI.original -> userIdent })
|
Just (Entity _ User{userIdent,userPasswordHash})
|
||||||
| verifyPasswordWith pwHashAlgo (2^) (encodeUtf8 hashPassword) (encodeUtf8 authPWHash) -> do -- (2^) is magic.
|
| Just pwHash <- userPasswordHash
|
||||||
|
, verifyPasswordWith pwHashAlgo (2^) (encodeUtf8 hashPassword) (encodeUtf8 pwHash) -> do -- (2^) is magic.
|
||||||
observeLoginOutcome apName LoginSuccessful
|
observeLoginOutcome apName LoginSuccessful
|
||||||
setCredsRedirect $ Creds apName userIdent []
|
setCredsRedirect $ Creds apName (CI.original userIdent) []
|
||||||
other -> do
|
other -> do
|
||||||
$logDebugS apName $ tshow other
|
$logDebugS apName $ tshow other
|
||||||
observeLoginOutcome apName LoginInvalidCredentials
|
observeLoginOutcome apName LoginInvalidCredentials
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -1521,7 +1521,7 @@ tagAccessPredicate AuthSelf = APDB $ \_ _ mAuthId route _ -> exceptT return retu
|
|||||||
| uid == referencedUser -> return Authorized
|
| uid == referencedUser -> return Authorized
|
||||||
Nothing -> return AuthenticationRequired
|
Nothing -> return AuthenticationRequired
|
||||||
_other -> unauthorizedI MsgUnauthorizedSelf
|
_other -> unauthorizedI MsgUnauthorizedSelf
|
||||||
tagAccessPredicate AuthIsLDAP = APDB $ \_ _ _ route _ -> exceptT return return $ do
|
tagAccessPredicate AuthIsExternal = APDB $ \_ _ _ route _ -> exceptT return return $ do
|
||||||
referencedUser <- case route of
|
referencedUser <- case route of
|
||||||
AdminUserR cID -> return cID
|
AdminUserR cID -> return cID
|
||||||
AdminUserDeleteR cID -> return cID
|
AdminUserDeleteR cID -> return cID
|
||||||
@ -1529,13 +1529,17 @@ tagAccessPredicate AuthIsLDAP = APDB $ \_ _ _ route _ -> exceptT return return $
|
|||||||
UserNotificationR cID -> return cID
|
UserNotificationR cID -> return cID
|
||||||
UserPasswordR cID -> return cID
|
UserPasswordR cID -> return cID
|
||||||
CourseR _ _ _ (CUserR cID) -> return cID
|
CourseR _ _ _ (CUserR cID) -> return cID
|
||||||
_other -> throwError =<< $unsupportedAuthPredicate AuthIsLDAP route
|
_other -> throwError =<< $unsupportedAuthPredicate AuthIsExternal route
|
||||||
referencedUser' <- catchIfMExceptT (const $ unauthorizedI MsgUnauthorizedSelf) (const True :: CryptoIDError -> Bool) $ decrypt referencedUser
|
referencedUser' <- catchIfMExceptT (const $ unauthorizedI MsgUnauthorizedSelf) (const True :: CryptoIDError -> Bool) $ decrypt referencedUser
|
||||||
maybeTMExceptT (unauthorizedI MsgUnauthorizedLDAP) $ do
|
availableSources <- getsYesod (view _appUserAuthConf) >>= \case
|
||||||
User{..} <- MaybeT $ get referencedUser'
|
UserAuthConfSingleSource{..} -> return . singleton $ case userAuthConfSingleSource of
|
||||||
guard $ userAuthentication == AuthLDAP
|
AuthSourceConfAzureAdV2 AzureConf{..} -> AuthSourceIdAzure azureConfTenantId
|
||||||
|
AuthSourceConfLdap LdapConf{..} -> AuthSourceIdLdap ldapConfSourceId
|
||||||
|
maybeTMExceptT (unauthorizedI MsgUnauthorizedExternal) $ do
|
||||||
|
Entity _ User{userIdent} <- MaybeT $ getEntity referencedUser'
|
||||||
|
guardM . lift $ exists [ ExternalUserUser ==. userIdent, ExternalUserSource <-. availableSources ]
|
||||||
return Authorized
|
return Authorized
|
||||||
tagAccessPredicate AuthIsPWHash = APDB $ \_ _ _ route _ -> exceptT return return $ do
|
tagAccessPredicate AuthIsInternal = APDB $ \_ _ _ route _ -> exceptT return return $ do
|
||||||
referencedUser <- case route of
|
referencedUser <- case route of
|
||||||
AdminUserR cID -> return cID
|
AdminUserR cID -> return cID
|
||||||
AdminUserDeleteR cID -> return cID
|
AdminUserDeleteR cID -> return cID
|
||||||
@ -1543,11 +1547,11 @@ tagAccessPredicate AuthIsPWHash = APDB $ \_ _ _ route _ -> exceptT return return
|
|||||||
UserNotificationR cID -> return cID
|
UserNotificationR cID -> return cID
|
||||||
UserPasswordR cID -> return cID
|
UserPasswordR cID -> return cID
|
||||||
CourseR _ _ _ (CUserR cID) -> return cID
|
CourseR _ _ _ (CUserR cID) -> return cID
|
||||||
_other -> throwError =<< $unsupportedAuthPredicate AuthIsPWHash route
|
_other -> throwError =<< $unsupportedAuthPredicate AuthIsInternal route
|
||||||
referencedUser' <- catchIfMExceptT (const $ unauthorizedI MsgUnauthorizedSelf) (const True :: CryptoIDError -> Bool) $ decrypt referencedUser
|
referencedUser' <- catchIfMExceptT (const $ unauthorizedI MsgUnauthorizedSelf) (const True :: CryptoIDError -> Bool) $ decrypt referencedUser
|
||||||
maybeTMExceptT (unauthorizedI MsgUnauthorizedPWHash) $ do
|
maybeTMExceptT (unauthorizedI MsgUnauthorizedInternal) $ do
|
||||||
User{..} <- MaybeT $ get referencedUser'
|
User{..} <- MaybeT $ get referencedUser'
|
||||||
guard $ is _AuthPWHash userAuthentication
|
guard $ is _Just userPasswordHash
|
||||||
return Authorized
|
return Authorized
|
||||||
tagAccessPredicate AuthAuthentication = APDB $ \_ _ mAuthId route _ -> case route of
|
tagAccessPredicate AuthAuthentication = APDB $ \_ _ mAuthId route _ -> case route of
|
||||||
MessageR cID -> maybeT (unauthorizedI MsgUnauthorizedSystemMessageAuth) $ do
|
MessageR cID -> maybeT (unauthorizedI MsgUnauthorizedSystemMessageAuth) $ do
|
||||||
|
|||||||
@ -384,8 +384,6 @@ embedRenderMessage ''UniWorX ''ExamRequiredEquipmentPreset id
|
|||||||
embedRenderMessage ''UniWorX ''ChangelogItemKind id
|
embedRenderMessage ''UniWorX ''ChangelogItemKind id
|
||||||
embedRenderMessage ''UniWorX ''RoomReference' $ dropSuffix "'"
|
embedRenderMessage ''UniWorX ''RoomReference' $ dropSuffix "'"
|
||||||
|
|
||||||
embedRenderMessage ''UniWorX ''AuthenticationMode id
|
|
||||||
|
|
||||||
embedRenderMessage ''UniWorX ''RatingValidityException id
|
embedRenderMessage ''UniWorX ''RatingValidityException id
|
||||||
|
|
||||||
embedRenderMessage ''UniWorX ''UrlFieldMessage id
|
embedRenderMessage ''UniWorX ''UrlFieldMessage id
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>, David Mosbach <david.mosbach@uniworx.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -11,11 +11,14 @@ module Foundation.Instances
|
|||||||
, unsafeHandler
|
, unsafeHandler
|
||||||
) where
|
) where
|
||||||
|
|
||||||
|
import qualified Prelude as P
|
||||||
|
|
||||||
import Import.NoFoundation
|
import Import.NoFoundation
|
||||||
|
|
||||||
import qualified Data.Text as Text
|
import qualified Data.Text as Text
|
||||||
import Data.List (inits)
|
import Data.List (inits)
|
||||||
|
|
||||||
|
import Yesod.Auth.OAuth2
|
||||||
import qualified Yesod.Core.Unsafe as Unsafe
|
import qualified Yesod.Core.Unsafe as Unsafe
|
||||||
import qualified Yesod.Auth.Message as Auth
|
import qualified Yesod.Auth.Message as Auth
|
||||||
|
|
||||||
@ -23,6 +26,7 @@ import Utils.Form
|
|||||||
import Auth.LDAP
|
import Auth.LDAP
|
||||||
import Auth.PWHash
|
import Auth.PWHash
|
||||||
import Auth.Dummy
|
import Auth.Dummy
|
||||||
|
import Auth.OAuth2
|
||||||
|
|
||||||
import qualified Foundation.Yesod.Session as UniWorX
|
import qualified Foundation.Yesod.Session as UniWorX
|
||||||
import qualified Foundation.Yesod.Middleware as UniWorX
|
import qualified Foundation.Yesod.Middleware as UniWorX
|
||||||
@ -42,6 +46,8 @@ import Foundation.DB
|
|||||||
|
|
||||||
import Network.Wai.Parse (lbsBackEnd)
|
import Network.Wai.Parse (lbsBackEnd)
|
||||||
|
|
||||||
|
import System.Environment (lookupEnv)
|
||||||
|
|
||||||
import UnliftIO.Pool (withResource)
|
import UnliftIO.Pool (withResource)
|
||||||
|
|
||||||
import qualified Control.Monad.State.Class as State
|
import qualified Control.Monad.State.Class as State
|
||||||
@ -128,21 +134,30 @@ instance YesodAuth UniWorX where
|
|||||||
-- Where to send a user after logout
|
-- Where to send a user after logout
|
||||||
logoutDest _ = NewsR
|
logoutDest _ = NewsR
|
||||||
-- Override the above two destinations when a Referer: header is present
|
-- Override the above two destinations when a Referer: header is present
|
||||||
redirectToReferer _ = True
|
redirectToReferer _ = False
|
||||||
|
|
||||||
loginHandler = do
|
loginHandler = do
|
||||||
|
plugins <- getsYesod authPlugins
|
||||||
|
AppSettings{..} <- getsYesod appSettings'
|
||||||
|
|
||||||
|
when appSingleSignOn $ do
|
||||||
|
let plugin = P.head $ P.filter ((`elem` [apAzureMock, apAzure]) . apName) plugins
|
||||||
|
pieces = case oauth2Url (apName plugin) of
|
||||||
|
PluginR _ p -> p
|
||||||
|
_ -> error "Unexpected OAuth2 AuthRoute"
|
||||||
|
void $ apDispatch plugin "GET" pieces
|
||||||
|
|
||||||
toParent <- getRouteToParent
|
toParent <- getRouteToParent
|
||||||
liftHandler . defaultLayout $ do
|
liftHandler . defaultLayout $ do
|
||||||
plugins <- getsYesod authPlugins
|
|
||||||
$logDebugS "Auth" $ "Enabled plugins: " <> Text.intercalate ", " (map apName plugins)
|
$logDebugS "Auth" $ "Enabled plugins: " <> Text.intercalate ", " (map apName plugins)
|
||||||
|
mPort <- liftIO $ lookupEnv "OAUTH2_SERVER_PORT"
|
||||||
setTitleI MsgLoginTitle
|
setTitleI MsgLoginTitle
|
||||||
$(widgetFile "login")
|
$(widgetFile "login")
|
||||||
|
|
||||||
authenticate = UniWorX.authenticate
|
authenticate = UniWorX.authenticate
|
||||||
|
|
||||||
authPlugins UniWorX{ appSettings' = AppSettings{..}, appLdapPool } = catMaybes
|
authPlugins UniWorX{ appSettings' = AppSettings{..}, appLdapPool, appAuthPlugins } = appAuthPlugins ++ catMaybes
|
||||||
[ flip campusLogin campusUserFailoverMode <$> appLdapPool
|
[ uncurry ldapLogin <$> appLdapPool
|
||||||
, Just . hashLogin $ pwHashAlgorithm appAuthPWHash
|
, Just . hashLogin $ pwHashAlgorithm appAuthPWHash
|
||||||
, dummyLogin <$ guard appAuthDummyLogin
|
, dummyLogin <$ guard appAuthDummyLogin
|
||||||
]
|
]
|
||||||
@ -157,6 +172,11 @@ instance YesodAuth UniWorX where
|
|||||||
|
|
||||||
addMessage Success . toHtml $ mr Auth.NowLoggedIn
|
addMessage Success . toHtml $ mr Auth.NowLoggedIn
|
||||||
|
|
||||||
|
-- onLogout = do
|
||||||
|
-- AppSettings{..} <- getsYesod appSettings'
|
||||||
|
-- when appSingleSignOn $ singleSignOut @UniWorX Nothing
|
||||||
|
|
||||||
|
|
||||||
onErrorHtml dest msg = do
|
onErrorHtml dest msg = do
|
||||||
addMessage Error $ toHtml msg
|
addMessage Error $ toHtml msg
|
||||||
redirect dest
|
redirect dest
|
||||||
|
|||||||
@ -73,6 +73,8 @@ breadcrumb :: ( BearerAuthSite UniWorX
|
|||||||
=> Route UniWorX
|
=> Route UniWorX
|
||||||
-> m Breadcrumb
|
-> m Breadcrumb
|
||||||
breadcrumb (AuthR _) = i18nCrumb MsgMenuLogin $ Just NewsR
|
breadcrumb (AuthR _) = i18nCrumb MsgMenuLogin $ Just NewsR
|
||||||
|
breadcrumb SOutR = i18nCrumb MsgLogout Nothing
|
||||||
|
breadcrumb SSOutR = i18nCrumb MsgSingleSignOut Nothing
|
||||||
breadcrumb (StaticR _) = i18nCrumb MsgBreadcrumbStatic Nothing
|
breadcrumb (StaticR _) = i18nCrumb MsgBreadcrumbStatic Nothing
|
||||||
breadcrumb (WellKnownR _) = i18nCrumb MsgBreadcrumbWellKnown Nothing
|
breadcrumb (WellKnownR _) = i18nCrumb MsgBreadcrumbWellKnown Nothing
|
||||||
breadcrumb MetricsR = i18nCrumb MsgBreadcrumbMetrics Nothing
|
breadcrumb MetricsR = i18nCrumb MsgBreadcrumbMetrics Nothing
|
||||||
@ -115,7 +117,7 @@ breadcrumb AdminCrontabR = i18nCrumb MsgBreadcrumbAdminCrontab $ Just
|
|||||||
breadcrumb AdminJobsR = i18nCrumb MsgBreadcrumbAdminJobs $ Just AdminCrontabR
|
breadcrumb AdminJobsR = i18nCrumb MsgBreadcrumbAdminJobs $ Just AdminCrontabR
|
||||||
breadcrumb AdminAvsR = i18nCrumb MsgMenuAvs $ Just AdminR
|
breadcrumb AdminAvsR = i18nCrumb MsgMenuAvs $ Just AdminR
|
||||||
breadcrumb AdminAvsUserR{} = i18nCrumb MsgAvsPersonInfo $ Just AdminAvsR
|
breadcrumb AdminAvsUserR{} = i18nCrumb MsgAvsPersonInfo $ Just AdminAvsR
|
||||||
breadcrumb AdminLdapR = i18nCrumb MsgMenuLdap $ Just AdminR
|
breadcrumb AdminExternalUserR = i18nCrumb MsgMenuExternalUser $ Just AdminR
|
||||||
breadcrumb AdminProblemsR = i18nCrumb MsgProblemsHeading $ Just AdminR
|
breadcrumb AdminProblemsR = i18nCrumb MsgProblemsHeading $ Just AdminR
|
||||||
breadcrumb ProblemUnreachableR = i18nCrumb MsgProblemsUnreachableHeading $ Just AdminProblemsR
|
breadcrumb ProblemUnreachableR = i18nCrumb MsgProblemsUnreachableHeading $ Just AdminProblemsR
|
||||||
breadcrumb ProblemWithoutAvsId = i18nCrumb MsgProblemsNoAvsIdHeading $ Just AdminProblemsR
|
breadcrumb ProblemWithoutAvsId = i18nCrumb MsgProblemsNoAvsIdHeading $ Just AdminProblemsR
|
||||||
@ -542,42 +544,37 @@ defaultLinks :: ( MonadHandler m
|
|||||||
, BearerAuthSite UniWorX
|
, BearerAuthSite UniWorX
|
||||||
) => m [Nav]
|
) => m [Nav]
|
||||||
defaultLinks = fmap catMaybes . mapM runMaybeT $ -- Define the menu items of the header.
|
defaultLinks = fmap catMaybes . mapM runMaybeT $ -- Define the menu items of the header.
|
||||||
[ return NavHeader
|
[ return NavHeaderContainer
|
||||||
{ navHeaderRole = NavHeaderSecondary
|
{ navHeaderRole = NavHeaderSecondary
|
||||||
, navIcon = IconMenuLogout
|
, navLabel = SomeMessage MsgMenuAccount
|
||||||
, navLink = NavLink
|
, navIcon = IconMenuAccount
|
||||||
{ navLabel = MsgMenuLogout
|
, navChildren =
|
||||||
, navRoute = AuthR LogoutR
|
[ NavLink
|
||||||
, navAccess' = NavAccessHandler $ is _Just <$> maybeAuthId
|
{ navLabel = MsgMenuLogout
|
||||||
, navType = NavTypeLink { navModal = False }
|
, navRoute = SSOutR -- AuthR LogoutR
|
||||||
, navQuick' = mempty
|
, navAccess' = NavAccessHandler $ is _Just <$> maybeAuthId
|
||||||
, navForceActive = False
|
, navType = NavTypeLink { navModal = False }
|
||||||
}
|
, navQuick' = mempty
|
||||||
}
|
, navForceActive = False
|
||||||
, return NavHeader
|
}
|
||||||
{ navHeaderRole = NavHeaderSecondary
|
, NavLink
|
||||||
, navIcon = IconMenuLogin
|
{ navLabel = MsgMenuLogin
|
||||||
, navLink = NavLink
|
, navRoute = AuthR LoginR
|
||||||
{ navLabel = MsgMenuLogin
|
, navAccess' = NavAccessHandler $ is _Nothing <$> maybeAuthId
|
||||||
, navRoute = AuthR LoginR
|
, navType = NavTypeLink { navModal = False }
|
||||||
, navAccess' = NavAccessHandler $ is _Nothing <$> maybeAuthId
|
, navQuick' = mempty
|
||||||
, navType = NavTypeLink { navModal = True }
|
, navForceActive = False
|
||||||
, navQuick' = mempty
|
}
|
||||||
, navForceActive = False
|
, NavLink
|
||||||
}
|
{ navLabel = MsgMenuProfile
|
||||||
}
|
, navRoute = ProfileR
|
||||||
, return NavHeader
|
, navAccess' = NavAccessHandler $ is _Just <$> maybeAuthId
|
||||||
{ navHeaderRole = NavHeaderSecondary
|
, navType = NavTypeLink { navModal = False }
|
||||||
, navIcon = IconMenuProfile
|
, navQuick' = mempty
|
||||||
, navLink = NavLink
|
, navForceActive = False
|
||||||
{ navLabel = MsgMenuProfile
|
}
|
||||||
, navRoute = ProfileR
|
]
|
||||||
, navAccess' = NavAccessHandler $ is _Just <$> maybeAuthId
|
}
|
||||||
, navType = NavTypeLink { navModal = False }
|
|
||||||
, navQuick' = mempty
|
|
||||||
, navForceActive = False
|
|
||||||
}
|
|
||||||
}
|
|
||||||
, do
|
, do
|
||||||
mCurrentRoute <- getCurrentRoute
|
mCurrentRoute <- getCurrentRoute
|
||||||
|
|
||||||
@ -856,8 +853,8 @@ defaultLinks = fmap catMaybes . mapM runMaybeT $ -- Define the menu items of the
|
|||||||
, navForceActive = False
|
, navForceActive = False
|
||||||
}
|
}
|
||||||
, NavLink
|
, NavLink
|
||||||
{ navLabel = MsgMenuLdap
|
{ navLabel = MsgMenuExternalUser
|
||||||
, navRoute = AdminLdapR
|
, navRoute = AdminExternalUserR
|
||||||
, navAccess' = NavAccessTrue
|
, navAccess' = NavAccessTrue
|
||||||
, navType = NavTypeLink { navModal = False }
|
, navType = NavTypeLink { navModal = False }
|
||||||
, navQuick' = mempty
|
, navQuick' = mempty
|
||||||
@ -1214,8 +1211,8 @@ pageActions (AdminUserR cID) = return
|
|||||||
, navRoute = UserPasswordR cID
|
, navRoute = UserPasswordR cID
|
||||||
, navAccess' = NavAccessDB $ do
|
, navAccess' = NavAccessDB $ do
|
||||||
uid <- decrypt cID
|
uid <- decrypt cID
|
||||||
User{userAuthentication} <- get404 uid
|
User{userPasswordHash} <- get404 uid
|
||||||
return $ is _AuthPWHash userAuthentication
|
return $ is _Just userPasswordHash
|
||||||
, navType = NavTypeLink { navModal = True }
|
, navType = NavTypeLink { navModal = True }
|
||||||
, navQuick' = mempty
|
, navQuick' = mempty
|
||||||
, navForceActive = False
|
, navForceActive = False
|
||||||
|
|||||||
@ -157,6 +157,10 @@ siteLayout' overrideHeading widget = do
|
|||||||
|
|
||||||
isAuth <- isJust <$> maybeAuthId
|
isAuth <- isJust <$> maybeAuthId
|
||||||
|
|
||||||
|
when (appAutoSignOn && not isAuth) $ do
|
||||||
|
$logDebugS "AutoSignOn" "AutoSignOn is enabled in AppSettings and user is not authenticated"
|
||||||
|
redirect $ AuthR LoginR
|
||||||
|
|
||||||
now <- liftIO getCurrentTime
|
now <- liftIO getCurrentTime
|
||||||
|
|
||||||
muid <- maybeAuthPair
|
muid <- maybeAuthPair
|
||||||
|
|||||||
@ -79,7 +79,7 @@ data UniWorX = UniWorX
|
|||||||
, appStatic :: EmbeddedStatic -- ^ Settings for static file serving.
|
, appStatic :: EmbeddedStatic -- ^ Settings for static file serving.
|
||||||
, appConnPool :: forall m. MonadIO m => Custom.Pool' m DBConnLabel DBConnUseState SqlBackend -- ^ Database connection pool.
|
, appConnPool :: forall m. MonadIO m => Custom.Pool' m DBConnLabel DBConnUseState SqlBackend -- ^ Database connection pool.
|
||||||
, appSmtpPool :: Maybe SMTPPool
|
, appSmtpPool :: Maybe SMTPPool
|
||||||
, appLdapPool :: Maybe (Failover (LdapConf, LdapPool))
|
, appLdapPool :: Maybe (LdapConf, LdapPool) -- TODO: reintroduce Failover
|
||||||
, appWidgetMemcached :: Maybe Memcached.Connection -- ^ Actually a proper pool
|
, appWidgetMemcached :: Maybe Memcached.Connection -- ^ Actually a proper pool
|
||||||
, appHttpManager :: Manager
|
, appHttpManager :: Manager
|
||||||
, appLogger :: (ReleaseKey, TVar Logger)
|
, appLogger :: (ReleaseKey, TVar Logger)
|
||||||
@ -97,6 +97,7 @@ data UniWorX = UniWorX
|
|||||||
, appUploadCache :: Maybe MinioConn
|
, appUploadCache :: Maybe MinioConn
|
||||||
, appVerpSecret :: VerpSecret
|
, appVerpSecret :: VerpSecret
|
||||||
, appAuthKey :: Auth.Key
|
, appAuthKey :: Auth.Key
|
||||||
|
, appAuthPlugins :: [AuthPlugin UniWorX]
|
||||||
, appFileSourceARC :: Maybe (ARCHandle (FileContentChunkReference, (Int, Int)) Int ByteString)
|
, appFileSourceARC :: Maybe (ARCHandle (FileContentChunkReference, (Int, Int)) Int ByteString)
|
||||||
, appFileSourcePrewarm :: Maybe (LRUHandle (FileContentChunkReference, (Int, Int)) UTCTime Int ByteString)
|
, appFileSourcePrewarm :: Maybe (LRUHandle (FileContentChunkReference, (Int, Int)) UTCTime Int ByteString)
|
||||||
, appFileInjectInhibit :: TVar (IntervalMap UTCTime (Set FileContentReference))
|
, appFileInjectInhibit :: TVar (IntervalMap UTCTime (Set FileContentReference))
|
||||||
|
|||||||
@ -1,23 +1,44 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2023-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, David Mosbach <david.mosbach@uniworx.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
module Foundation.Types
|
module Foundation.Types
|
||||||
( UpsertCampusUserMode(..)
|
( UpsertUserMode(..)
|
||||||
, _UpsertCampusUserLoginLdap, _UpsertCampusUserLoginDummy, _UpsertCampusUserLoginOther, _UpsertCampusUserLdapSync, _UpsertCampusUserGuessUser
|
, _UpsertUserLogin, _UpsertUserLoginDummy, _UpsertUserLoginOther, _UpsertUserSync, _UpsertUserGuessUser
|
||||||
, _upsertCampusUserIdent
|
, _upsertUserSource, _upsertUserIdent
|
||||||
|
, UpsertUserData(..)
|
||||||
|
, _UpsertUserDataAzure, _UpsertUserDataLdap
|
||||||
|
, _upsertUserAzureTenantId, _upsertUserAzureData, _upsertUserLdapHost, _upsertUserLdapData
|
||||||
) where
|
) where
|
||||||
|
|
||||||
import Import.NoFoundation
|
import Import.NoFoundation
|
||||||
|
|
||||||
|
import qualified Ldap.Client as Ldap
|
||||||
|
|
||||||
data UpsertCampusUserMode
|
|
||||||
= UpsertCampusUserLoginLdap
|
|
||||||
| UpsertCampusUserLoginDummy { upsertCampusUserIdent :: UserIdent }
|
|
||||||
| UpsertCampusUserLoginOther { upsertCampusUserIdent :: UserIdent } -- erlaubt keinen späteren Login
|
|
||||||
| UpsertCampusUserLdapSync { upsertCampusUserIdent :: UserIdent }
|
|
||||||
| UpsertCampusUserGuessUser
|
|
||||||
deriving (Eq, Ord, Read, Show, Generic)
|
|
||||||
|
|
||||||
makeLenses_ ''UpsertCampusUserMode
|
-- TODO: rename?
|
||||||
makePrisms ''UpsertCampusUserMode
|
data UpsertUserMode
|
||||||
|
= UpsertUserLogin { upsertUserSource :: Text } -- TODO: use type synonym?
|
||||||
|
| UpsertUserLoginDummy { upsertUserIdent :: UserIdent }
|
||||||
|
| UpsertUserLoginOther { upsertUserIdent :: UserIdent } -- does not allow further login
|
||||||
|
| UpsertUserSync { upsertUserIdent :: UserIdent }
|
||||||
|
| UpsertUserGuessUser
|
||||||
|
deriving (Show)
|
||||||
|
|
||||||
|
makeLenses_ ''UpsertUserMode
|
||||||
|
makePrisms ''UpsertUserMode
|
||||||
|
|
||||||
|
|
||||||
|
data UpsertUserData
|
||||||
|
= UpsertUserDataAzure
|
||||||
|
{ upsertUserAzureTenantId :: UUID
|
||||||
|
, upsertUserAzureData :: [(Text, [ByteString])] -- TODO: use type synonym?
|
||||||
|
}
|
||||||
|
| UpsertUserDataLdap
|
||||||
|
{ upsertUserLdapHost :: Text
|
||||||
|
, upsertUserLdapData :: Ldap.AttrList []
|
||||||
|
}
|
||||||
|
deriving (Show)
|
||||||
|
|
||||||
|
makeLenses_ ''UpsertUserData
|
||||||
|
makePrisms ''UpsertUserData
|
||||||
|
|||||||
@ -1,69 +1,66 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@cip.ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, David Mosbach <david.mosbach@uniworx.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
module Foundation.Yesod.Auth
|
module Foundation.Yesod.Auth
|
||||||
( authenticate
|
( authenticate
|
||||||
, ldapLookupAndUpsert
|
, userLookupAndUpsert
|
||||||
, upsertCampusUser
|
, upsertUser, maybeUpsertUser
|
||||||
, decodeUserTest
|
, decodeUserTest
|
||||||
, CampusUserConversionException(..)
|
, DecodeUserException(..)
|
||||||
, campusUserFailoverMode, updateUserLanguage
|
, updateUserLanguage
|
||||||
) where
|
) where
|
||||||
|
|
||||||
import Import.NoFoundation hiding (authenticate)
|
import Import.NoFoundation hiding (authenticate)
|
||||||
|
|
||||||
|
import Auth.Dummy (apDummy)
|
||||||
|
import Auth.LDAP
|
||||||
|
import Auth.OAuth2
|
||||||
|
import Auth.PWHash (apHash)
|
||||||
|
|
||||||
import Foundation.Type
|
import Foundation.Type
|
||||||
import Foundation.Types
|
import Foundation.Types
|
||||||
import Foundation.I18n
|
import Foundation.I18n
|
||||||
|
|
||||||
import Handler.Utils.Profile
|
-- import Handler.Utils.Profile
|
||||||
import Handler.Utils.LdapSystemFunctions
|
import Handler.Utils.LdapSystemFunctions
|
||||||
import Handler.Utils.Memcached
|
import Handler.Utils.Memcached
|
||||||
import Foundation.Authorization (AuthorizationCacheKey(..))
|
import Foundation.Authorization (AuthorizationCacheKey(..))
|
||||||
|
|
||||||
import Yesod.Auth.Message
|
import Yesod.Auth.Message
|
||||||
import Auth.LDAP
|
import Yesod.Auth.OAuth2 (getAccessToken, getRefreshToken)
|
||||||
import Auth.PWHash (apHash)
|
|
||||||
import Auth.Dummy (apDummy)
|
|
||||||
|
|
||||||
import qualified Data.CaseInsensitive as CI
|
|
||||||
import qualified Control.Monad.Catch as C (Handler(..))
|
import qualified Control.Monad.Catch as C (Handler(..))
|
||||||
import qualified Ldap.Client as Ldap
|
|
||||||
|
import qualified Data.ByteString as ByteString
|
||||||
|
import qualified Data.CaseInsensitive as CI
|
||||||
|
import qualified Data.Map as Map
|
||||||
|
import qualified Data.List.NonEmpty as NonEmpty (toList)
|
||||||
|
import qualified Data.Set as Set
|
||||||
import qualified Data.Text as Text
|
import qualified Data.Text as Text
|
||||||
import qualified Data.Text.Encoding as Text
|
import qualified Data.Text.Encoding as Text
|
||||||
import qualified Data.ByteString as ByteString
|
|
||||||
import qualified Data.Set as Set
|
|
||||||
import qualified Data.Map as Map
|
|
||||||
-- import qualified Data.Conduit.Combinators as C
|
|
||||||
|
|
||||||
-- import qualified Data.List as List ((\\))
|
import qualified Ldap.Client as Ldap
|
||||||
|
|
||||||
-- import qualified Data.UUID as UUID
|
|
||||||
-- import Data.ByteArray (convert)
|
|
||||||
-- import Crypto.Hash (SHAKE128)
|
|
||||||
-- import qualified Data.Binary as Binary
|
|
||||||
|
|
||||||
-- import qualified Database.Esqueleto.Legacy as E
|
|
||||||
-- import qualified Database.Esqueleto.Utils as E
|
|
||||||
|
|
||||||
-- import Crypto.Hash.Conduit (sinkHash)
|
|
||||||
|
|
||||||
|
|
||||||
authenticate :: ( MonadHandler m, HandlerSite m ~ UniWorX
|
authenticate :: ( MonadHandler m, HandlerSite m ~ UniWorX
|
||||||
, YesodPersist UniWorX, BackendCompatible SqlBackend (YesodPersistBackend UniWorX)
|
, YesodPersist UniWorX, BackendCompatible SqlBackend (YesodPersistBackend UniWorX)
|
||||||
, YesodAuth UniWorX, UserId ~ AuthId UniWorX
|
, YesodAuth UniWorX, UserId ~ AuthId UniWorX
|
||||||
)
|
)
|
||||||
=> Creds UniWorX -> m (AuthenticationResult UniWorX)
|
=> Creds UniWorX
|
||||||
|
-> m (AuthenticationResult UniWorX)
|
||||||
authenticate creds@Creds{..} = liftHandler . runDB . withReaderT projectBackend $ do
|
authenticate creds@Creds{..} = liftHandler . runDB . withReaderT projectBackend $ do
|
||||||
|
$logDebugS "Auth Debug" $ "\a\27[31m" <> tshow creds <> "\27[0m"
|
||||||
|
setSessionJson SessionOAuth2Token (getAccessToken creds, getRefreshToken creds)
|
||||||
|
|
||||||
now <- liftIO getCurrentTime
|
now <- liftIO getCurrentTime
|
||||||
|
|
||||||
let
|
let
|
||||||
uAuth = UniqueAuthentication $ CI.mk credsIdent
|
uAuth = UniqueAuthentication $ CI.mk credsIdent
|
||||||
upsertMode = creds ^? _upsertCampusUserMode
|
upsertMode = creds ^? _upsertUserMode
|
||||||
|
|
||||||
isDummy = is (_Just . _UpsertCampusUserLoginDummy) upsertMode
|
isDummy = is (_Just . _UpsertUserLoginDummy) upsertMode
|
||||||
isOther = is (_Just . _UpsertCampusUserLoginOther) upsertMode
|
isOther = is (_Just . _UpsertUserLoginOther) upsertMode
|
||||||
|
|
||||||
excRecovery res
|
excRecovery res
|
||||||
| isDummy || isOther
|
| isDummy || isOther
|
||||||
@ -77,21 +74,21 @@ authenticate creds@Creds{..} = liftHandler . runDB . withReaderT projectBackend
|
|||||||
= return res
|
= return res
|
||||||
|
|
||||||
excHandlers =
|
excHandlers =
|
||||||
[ C.Handler $ \case
|
[ C.Handler $ \(fExc :: FetchUserDataException) -> case fExc of
|
||||||
CampusUserNoResult -> do
|
FetchUserDataNoResult -> do
|
||||||
$logWarnS "LDAP" $ "User lookup failed after successful login for " <> credsIdent
|
$logWarnS "FetchUserException" $ "User lookup failed after successful login for " <> credsIdent
|
||||||
excRecovery . UserError $ IdentifierNotFound credsIdent
|
excRecovery . UserError $ IdentifierNotFound credsIdent
|
||||||
CampusUserAmbiguous -> do
|
FetchUserDataAmbiguous -> do
|
||||||
$logWarnS "LDAP" $ "Multiple LDAP results for " <> credsIdent
|
$logWarnS "FetchUserException" $ "Multiple User results for " <> credsIdent
|
||||||
excRecovery . UserError $ IdentifierNotFound credsIdent
|
excRecovery . UserError $ IdentifierNotFound credsIdent
|
||||||
err -> do
|
err -> do
|
||||||
$logErrorS "LDAP" $ tshow err
|
$logErrorS "FetchUserException" $ tshow err
|
||||||
mr <- getMessageRender
|
mr <- getMessageRender
|
||||||
excRecovery . ServerError $ mr MsgInternalLdapError
|
excRecovery . ServerError $ mr MsgInternalLoginError
|
||||||
, C.Handler $ \(cExc :: CampusUserConversionException) -> do
|
, C.Handler $ \(dExc :: DecodeUserException) -> do
|
||||||
$logErrorS "LDAP" $ tshow cExc
|
$logErrorS "Auth" $ tshow dExc
|
||||||
mr <- getMessageRender
|
mr <- getMessageRender
|
||||||
excRecovery . ServerError $ mr cExc
|
excRecovery . ServerError $ mr dExc
|
||||||
]
|
]
|
||||||
|
|
||||||
acceptExisting :: SqlPersistT (HandlerFor UniWorX) (AuthenticationResult UniWorX)
|
acceptExisting :: SqlPersistT (HandlerFor UniWorX) (AuthenticationResult UniWorX)
|
||||||
@ -107,231 +104,300 @@ authenticate creds@Creds{..} = liftHandler . runDB . withReaderT projectBackend
|
|||||||
| not isDummy -> res <$ update uid [ UserLastAuthentication =. Just now ]
|
| not isDummy -> res <$ update uid [ UserLastAuthentication =. Just now ]
|
||||||
_other -> return res
|
_other -> return res
|
||||||
|
|
||||||
$logDebugS "auth" $ tshow Creds{..}
|
$logDebugS "Auth" $ tshow Creds{..}
|
||||||
ldapPool' <- getsYesod $ view _appLdapPool
|
|
||||||
|
|
||||||
flip catches excHandlers $ case ldapPool' of
|
flip catches excHandlers $ if
|
||||||
Just ldapPool
|
| not isDummy, not isOther
|
||||||
| Just upsertMode' <- upsertMode -> do
|
, Just upsertMode' <- upsertMode -> fetchUserData Creds{..} >>= \case
|
||||||
ldapData <- campusUser ldapPool campusUserFailoverMode Creds{..}
|
Just userData -> do
|
||||||
$logDebugS "LDAP" $ "Successful LDAP lookup: " <> tshow ldapData
|
$logDebugS "Auth" $ "Successful user data lookup: " <> tshow userData
|
||||||
Authenticated . entityKey <$> upsertCampusUser upsertMode' ldapData
|
Authenticated . entityKey <$> upsertUser upsertMode' userData
|
||||||
_other
|
Nothing
|
||||||
|
-> throwM FetchUserDataNoResult
|
||||||
|
| otherwise
|
||||||
-> acceptExisting
|
-> acceptExisting
|
||||||
|
|
||||||
|
|
||||||
data CampusUserConversionException
|
data DecodeUserException
|
||||||
= CampusUserInvalidIdent
|
= DecodeUserInvalidIdent
|
||||||
| CampusUserInvalidEmail
|
| DecodeUserInvalidEmail
|
||||||
| CampusUserInvalidDisplayName
|
| DecodeUserInvalidDisplayName
|
||||||
| CampusUserInvalidGivenName
|
| DecodeUserInvalidGivenName
|
||||||
| CampusUserInvalidSurname
|
| DecodeUserInvalidSurname
|
||||||
| CampusUserInvalidTitle
|
| DecodeUserInvalidTitle
|
||||||
-- | CampusUserInvalidMatriculation
|
| DecodeUserInvalidFeaturesOfStudy Text
|
||||||
| CampusUserInvalidFeaturesOfStudy Text
|
| DecodeUserInvalidAssociatedSchools Text
|
||||||
| CampusUserInvalidAssociatedSchools Text
|
|
||||||
deriving (Eq, Ord, Read, Show, Generic)
|
deriving (Eq, Ord, Read, Show, Generic)
|
||||||
deriving anyclass (Exception)
|
deriving anyclass (Exception)
|
||||||
|
|
||||||
_upsertCampusUserMode :: Traversal' (Creds UniWorX) UpsertCampusUserMode
|
|
||||||
_upsertCampusUserMode mMode cs@Creds{..}
|
_upsertUserMode :: Traversal' (Creds UniWorX) UpsertUserMode
|
||||||
| credsPlugin == apDummy = setMode <$> mMode (UpsertCampusUserLoginDummy $ CI.mk credsIdent)
|
_upsertUserMode mMode cs@Creds{..}
|
||||||
| credsPlugin == apLdap = setMode <$> mMode UpsertCampusUserLoginLdap
|
| credsPlugin == apDummy = setMode <$> mMode (UpsertUserLoginDummy $ CI.mk credsIdent)
|
||||||
| otherwise = setMode <$> mMode (UpsertCampusUserLoginOther $ CI.mk credsIdent)
|
| credsPlugin `elem` loginAPs
|
||||||
|
= setMode <$> mMode (UpsertUserLogin credsPlugin)
|
||||||
|
| otherwise = setMode <$> mMode (UpsertUserLoginOther $ CI.mk credsIdent)
|
||||||
where
|
where
|
||||||
setMode UpsertCampusUserLoginLdap
|
setMode UpsertUserLogin{..} | upsertUserSource `elem` loginAPs
|
||||||
= cs{ credsPlugin = apLdap }
|
= cs { credsPlugin = upsertUserSource }
|
||||||
setMode (UpsertCampusUserLoginDummy ident)
|
setMode UpsertUserLoginDummy{..}
|
||||||
= cs{ credsPlugin = apDummy
|
= cs { credsPlugin = apDummy
|
||||||
, credsIdent = CI.original ident
|
, credsIdent = CI.original upsertUserIdent
|
||||||
}
|
}
|
||||||
setMode (UpsertCampusUserLoginOther ident)
|
setMode UpsertUserLoginOther{..}
|
||||||
= cs{ credsPlugin = bool defaultOther credsPlugin (credsPlugin /= apDummy && credsPlugin /= apLdap)
|
= cs { credsPlugin = bool defaultOther credsPlugin (credsPlugin `notElem` [apDummy, apLdap, apAzure])
|
||||||
, credsIdent = CI.original ident
|
, credsIdent = CI.original upsertUserIdent
|
||||||
}
|
}
|
||||||
setMode _ = cs
|
setMode _ = cs
|
||||||
|
|
||||||
|
loginAPs = [ apAzure, apLdap ]
|
||||||
defaultOther = apHash
|
defaultOther = apHash
|
||||||
|
|
||||||
ldapLookupAndUpsert :: forall m. (MonadHandler m, HandlerSite m ~ UniWorX, MonadMask m, MonadUnliftIO m) => Text -> SqlPersistT m (Entity User)
|
|
||||||
ldapLookupAndUpsert ident =
|
|
||||||
getsYesod (view _appLdapPool) >>= \case
|
|
||||||
Nothing -> throwM $ CampusUserLdapError $ LdapHostNotResolved "No LDAP configuration in Foundation."
|
|
||||||
Just ldapPool ->
|
|
||||||
campusUser'' ldapPool campusUserFailoverMode ident >>= \case
|
|
||||||
Nothing -> throwM CampusUserNoResult
|
|
||||||
Just ldapResponse -> upsertCampusUser UpsertCampusUserGuessUser ldapResponse
|
|
||||||
|
|
||||||
{- THIS FUNCION JUST DECODES, BUT IT DOES NOT QUERY LDAP!
|
userLookupAndUpsert :: forall m.
|
||||||
upsertCampusUserByCn :: forall m.
|
( MonadHandler m
|
||||||
( MonadHandler m, HandlerSite m ~ UniWorX
|
, HandlerSite m ~ UniWorX
|
||||||
, MonadThrow m
|
, MonadMask m
|
||||||
)
|
, MonadUnliftIO m
|
||||||
=> Text -> SqlPersistT m (Entity User)
|
)
|
||||||
upsertCampusUserByCn persNo = upsertCampusUser UpsertCampusUserGuessUser [(ldapPrimaryKey,[Text.encodeUtf8 persNo])]
|
=> Text
|
||||||
-}
|
-> UpsertUserMode
|
||||||
|
-> SqlPersistT m (Maybe (Entity User))
|
||||||
|
userLookupAndUpsert credsIdent mode =
|
||||||
|
fetchUserData Creds{credsPlugin=mempty,credsExtra=mempty,..} >>= maybeUpsertUser mode
|
||||||
|
|
||||||
-- | Upsert User DB according to given LDAP data (does not query LDAP itself)
|
|
||||||
upsertCampusUser :: forall m.
|
data FetchUserDataException
|
||||||
( MonadHandler m, HandlerSite m ~ UniWorX
|
= FetchUserDataNoResult
|
||||||
, MonadCatch m
|
| FetchUserDataAmbiguous
|
||||||
)
|
| FetchUserDataException
|
||||||
=> UpsertCampusUserMode -> Ldap.AttrList [] -> SqlPersistT m (Entity User)
|
deriving (Eq, Ord, Read, Show, Generic)
|
||||||
upsertCampusUser upsertMode ldapData = do
|
deriving anyclass (Exception)
|
||||||
|
|
||||||
|
-- | Fetch user data with given credentials from external source(s)
|
||||||
|
fetchUserData :: forall m site.
|
||||||
|
( MonadHandler m
|
||||||
|
, HandlerSite m ~ UniWorX
|
||||||
|
, MonadCatch m
|
||||||
|
, MonadMask m
|
||||||
|
, MonadUnliftIO m
|
||||||
|
)
|
||||||
|
=> Creds site
|
||||||
|
-> SqlPersistT m (Maybe (NonEmpty UpsertUserData))
|
||||||
|
fetchUserData Creds{..} = do
|
||||||
|
userAuthConf <- getsYesod $ view _appUserAuthConf
|
||||||
|
now <- liftIO getCurrentTime
|
||||||
|
|
||||||
|
results :: Maybe (NonEmpty UpsertUserData) <- case userAuthConf of
|
||||||
|
UserAuthConfSingleSource{..} -> fmap (:| []) <$> case userAuthConfSingleSource of
|
||||||
|
AuthSourceConfAzureAdV2 AzureConf{ azureConfClientId = upsertUserAzureTenantId } -> do
|
||||||
|
queryOAuth2User @[(Text, [ByteString])] credsIdent >>= \case
|
||||||
|
Right upsertUserAzureData -> return $ Just UpsertUserDataAzure{..}
|
||||||
|
Left _ -> return Nothing
|
||||||
|
AuthSourceConfLdap LdapConf{..} -> getsYesod (view _appLdapPool) >>= \case
|
||||||
|
Just ldapPool -> fmap (UpsertUserDataLdap ldapConfSourceId) <$> ldapUser'' ldapPool credsIdent
|
||||||
|
Nothing -> throwM FetchUserDataException
|
||||||
|
|
||||||
|
-- insert ExternalUser entries for each fetched dataset
|
||||||
|
whenIsJust results $ \ress -> forM_ ress $ \res -> do
|
||||||
|
let externalUserLastSync = now
|
||||||
|
(externalUserData, externalUserSource) = case res of
|
||||||
|
UpsertUserDataAzure{..} -> (toJSON upsertUserAzureData, AuthSourceIdAzure upsertUserAzureTenantId)
|
||||||
|
UpsertUserDataLdap{..} -> (toJSON upsertUserLdapData, AuthSourceIdLdap upsertUserLdapHost)
|
||||||
|
externalUserUser <- if
|
||||||
|
| UpsertUserDataAzure{..} <- res
|
||||||
|
, azureData <- Map.fromListWith (++) $ upsertUserAzureData <&> second (filter (not . ByteString.null))
|
||||||
|
, [Text.decodeUtf8' -> Right azureUserPrincipalName'] <- azureData !!! azureUserPrincipalName
|
||||||
|
-> return $ CI.mk azureUserPrincipalName'
|
||||||
|
| UpsertUserDataLdap{..} <- res
|
||||||
|
, ldapData <- Map.fromListWith (++) $ upsertUserLdapData <&> second (filter (not . ByteString.null))
|
||||||
|
, [Text.decodeUtf8' -> Right ldapPrimaryKey'] <- ldapData !!! ldapPrimaryKey
|
||||||
|
-> return $ CI.mk ldapPrimaryKey'
|
||||||
|
| otherwise
|
||||||
|
-> throwM DecodeUserInvalidIdent
|
||||||
|
void $ upsert ExternalUser{..} [ExternalUserData =. externalUserData, ExternalUserLastSync =. externalUserLastSync]
|
||||||
|
|
||||||
|
return results
|
||||||
|
|
||||||
|
|
||||||
|
-- | Upsert User and related auth in DB according to given external source data (does not query source itself)
|
||||||
|
maybeUpsertUser :: forall m.
|
||||||
|
( MonadHandler m
|
||||||
|
, HandlerSite m ~ UniWorX
|
||||||
|
, MonadCatch m
|
||||||
|
)
|
||||||
|
=> UpsertUserMode
|
||||||
|
-> Maybe (NonEmpty UpsertUserData)
|
||||||
|
-> SqlPersistT m (Maybe (Entity User))
|
||||||
|
maybeUpsertUser _upsertMode Nothing = return Nothing
|
||||||
|
maybeUpsertUser _upsertMode (Just upsertData) = do
|
||||||
now <- liftIO getCurrentTime
|
now <- liftIO getCurrentTime
|
||||||
userDefaultConf <- getsYesod $ view _appUserDefaults
|
userDefaultConf <- getsYesod $ view _appUserDefaults
|
||||||
|
|
||||||
(newUser,userUpdate) <- decodeUser now userDefaultConf upsertMode ldapData
|
(newUser,userUpdate) <- decodeUser now userDefaultConf upsertData
|
||||||
--TODO: newUser should be associated with a company and company supervisor through Handler.Utils.Company.upsertUserCompany, but this is called by upsertAvsUser already - conflict?
|
--TODO: newUser should be associated with a company and company supervisor through Handler.Utils.Company.upsertUserCompany, but this is called by upsertAvsUser already - conflict?
|
||||||
|
|
||||||
oldUsers <- for (userLdapPrimaryKey newUser) $ \pKey -> selectKeysList [ UserLdapPrimaryKey ==. Just pKey ] []
|
oldUsers <- selectKeysList [ UserIdent ==. userIdent newUser ] []
|
||||||
|
|
||||||
user@(Entity userId userRec) <- case oldUsers of
|
user@(Entity userId _userRec) <- case oldUsers of
|
||||||
Just [oldUserId] -> updateGetEntity oldUserId userUpdate
|
[oldUserId] -> updateGetEntity oldUserId userUpdate
|
||||||
_other -> upsertBy (UniqueAuthentication (newUser ^. _userIdent)) newUser userUpdate
|
_other -> upsertBy (UniqueAuthentication (newUser ^. _userIdent)) newUser userUpdate
|
||||||
unless (validDisplayName (newUser ^. _userTitle)
|
|
||||||
(newUser ^. _userFirstName)
|
|
||||||
(newUser ^. _userSurname)
|
|
||||||
(userRec ^. _userDisplayName)) $
|
|
||||||
update userId [ UserDisplayName =. (newUser ^. _userDisplayName) ]
|
|
||||||
when (validEmail' (userRec ^. _userEmail)) $ do
|
|
||||||
let emUps = [ UserDisplayEmail =. (newUser ^. _userEmail) | not (validEmail' (userRec ^. _userDisplayEmail)) ]
|
|
||||||
++ [ UserAuthentication =. AuthLDAP | is _AuthNoLogin (userRec ^. _userAuthentication) ]
|
|
||||||
unless (null emUps) $ update userId emUps
|
|
||||||
-- Attempt to update ident, too:
|
|
||||||
unless (validEmail' (userRec ^. _userIdent)) $
|
|
||||||
void $ maybeCatchAll (update userId [ UserIdent =. (newUser ^. _userEmail) ] >> return (Just ()))
|
|
||||||
|
|
||||||
let
|
let
|
||||||
userSystemFunctions = determineSystemFunctions . Set.fromList $ map CI.mk userSystemFunctions'
|
userSystemFunctions = determineSystemFunctions . Set.fromList $ map CI.mk userSystemFunctions'
|
||||||
userSystemFunctions' = do
|
userSystemFunctions' = concat $ upsertData <&> \case
|
||||||
(k, v) <- ldapData
|
UpsertUserDataAzure{..} -> do
|
||||||
guard $ k == ldapAffiliation
|
(_k, v) <- upsertUserAzureData
|
||||||
v' <- v
|
v' <- v
|
||||||
Right str <- return $ Text.decodeUtf8' v'
|
Right str <- return $ Text.decodeUtf8' v'
|
||||||
assertM' (not . Text.null) $ Text.strip str
|
assertM' (not . Text.null) $ Text.strip str
|
||||||
|
UpsertUserDataLdap{..} -> do
|
||||||
|
(k, v) <- upsertUserLdapData
|
||||||
|
guard $ k == ldapAffiliation
|
||||||
|
v' <- v
|
||||||
|
Right str <- return $ Text.decodeUtf8' v'
|
||||||
|
assertM' (not . Text.null) $ Text.strip str
|
||||||
|
|
||||||
iforM_ userSystemFunctions $ \func preset -> do
|
iforM_ userSystemFunctions $ \func preset -> do
|
||||||
memcachedByInvalidate (AuthCacheSystemFunctionList func) $ Proxy @(Set UserId)
|
memcachedByInvalidate (AuthCacheSystemFunctionList func) $ Proxy @(Set UserId)
|
||||||
if | preset -> void $ upsert (UserSystemFunction userId func False False) []
|
if | preset -> void $ upsert (UserSystemFunction userId func False False) []
|
||||||
| otherwise -> deleteWhere [UserSystemFunctionUser ==. userId, UserSystemFunctionFunction ==. func, UserSystemFunctionIsOptOut ==. False, UserSystemFunctionManual ==. False]
|
| otherwise -> deleteWhere [UserSystemFunctionUser ==. userId, UserSystemFunctionFunction ==. func, UserSystemFunctionIsOptOut ==. False, UserSystemFunctionManual ==. False]
|
||||||
|
|
||||||
return user
|
return $ Just user
|
||||||
|
|
||||||
decodeUserTest :: (MonadHandler m, HandlerSite m ~ UniWorX, MonadCatch m)
|
upsertUser :: forall m.
|
||||||
=> Maybe UserIdent -> Ldap.AttrList [] -> m (Either CampusUserConversionException (User, [Update User]))
|
( MonadHandler m
|
||||||
decodeUserTest mbIdent ldapData = do
|
, HandlerSite m ~ UniWorX
|
||||||
now <- liftIO getCurrentTime
|
, MonadCatch m
|
||||||
userDefaultConf <- getsYesod $ view _appUserDefaults
|
)
|
||||||
let mode = maybe UpsertCampusUserLoginLdap UpsertCampusUserLoginDummy mbIdent
|
=> UpsertUserMode
|
||||||
try $ decodeUser now userDefaultConf mode ldapData
|
-> NonEmpty UpsertUserData
|
||||||
|
-> SqlPersistT m (Entity User)
|
||||||
|
upsertUser upsertMode upsertData = maybeUpsertUser upsertMode (Just upsertData) >>= \case
|
||||||
|
Nothing -> error "upsertUser: No user result from maybeUpsertUser!"
|
||||||
|
Just user -> return user
|
||||||
|
|
||||||
|
|
||||||
decodeUser :: (MonadThrow m) => UTCTime -> UserDefaultConf -> UpsertCampusUserMode -> Ldap.AttrList [] -> m (User,_)
|
decodeUser :: ( MonadThrow m
|
||||||
decodeUser now UserDefaultConf{..} upsertMode ldapData = do
|
)
|
||||||
let
|
=> UTCTime -- ^ Now
|
||||||
userTelephone = decodeLdap ldapUserTelephone
|
-> UserDefaultConf
|
||||||
userMobile = decodeLdap ldapUserMobile
|
-> NonEmpty UpsertUserData -- ^ Raw source data
|
||||||
userCompanyPersonalNumber = decodeLdap ldapUserFraportPersonalnummer
|
-> m (User,_) -- ^ Data for new User entry and updating existing User entries
|
||||||
userCompanyDepartment = decodeLdap ldapUserFraportAbteilung
|
decodeUser now UserDefaultConf{..} upsertData = do
|
||||||
|
|
||||||
userAuthentication
|
|
||||||
| is _UpsertCampusUserLoginOther upsertMode
|
|
||||||
= AuthNoLogin -- AuthPWHash (error "Non-LDAP logins should only work for users that are already known")
|
|
||||||
| otherwise = AuthLDAP
|
|
||||||
userLastAuthentication = guardOn isLogin now
|
|
||||||
isLogin = has (_UpsertCampusUserLoginLdap <> _UpsertCampusUserLoginOther . united) upsertMode
|
|
||||||
|
|
||||||
userTitle = decodeLdap ldapUserTitle -- CampusUserInvalidTitle
|
|
||||||
userFirstName = decodeLdap' ldapUserFirstName -- CampusUserInvalidGivenName
|
|
||||||
userSurname = decodeLdap' ldapUserSurname -- CampusUserInvalidSurname
|
|
||||||
userDisplayName <- decodeLdap1 ldapUserDisplayName CampusUserInvalidDisplayName <&> fixDisplayName -- do not check LDAP-given userDisplayName
|
|
||||||
|
|
||||||
--userDisplayName <- decodeLdap1 ldapUserDisplayName CampusUserInvalidDisplayName >>=
|
|
||||||
-- (maybeThrow CampusUserInvalidDisplayName . checkDisplayName userTitle userFirstName userSurname)
|
|
||||||
|
|
||||||
userIdent <- if
|
userIdent <- if
|
||||||
| [bs] <- ldapMap !!! ldapUserPrincipalName
|
| Just azureData <- mbAzureData
|
||||||
, Right userIdent' <- CI.mk <$> Text.decodeUtf8' bs
|
, [Text.decodeUtf8' -> Right azureUserPrincipalName'] <- azureData !!! azureUserPrincipalName
|
||||||
, hasn't _upsertCampusUserIdent upsertMode || has (_upsertCampusUserIdent . only userIdent') upsertMode
|
, Just azureUserPrincipalName'' <- assertM' (not . Text.null) $ Text.strip azureUserPrincipalName'
|
||||||
-> return userIdent'
|
-> return $ CI.mk azureUserPrincipalName''
|
||||||
| Just userIdent' <- upsertMode ^? _upsertCampusUserIdent
|
| Just ldapData <- mbLdapData
|
||||||
-> return userIdent'
|
, [Text.decodeUtf8' -> Right ldapPrimaryKey'] <- ldapData !!! ldapPrimaryKey
|
||||||
|
, Just ldapPrimaryKey'' <- assertM' (not . Text.null) $ Text.strip ldapPrimaryKey'
|
||||||
|
-> return $ CI.mk ldapPrimaryKey''
|
||||||
| otherwise
|
| otherwise
|
||||||
-> throwM CampusUserInvalidIdent
|
-> throwM DecodeUserInvalidIdent
|
||||||
|
|
||||||
userEmail <- if -- TODO: refactor! NOTE: LDAP doesnt know email for all users; we use userPrincialName instead; however validEmail refutes `E<number@fraport.de` here, too strong! Make Email-Field optional!
|
|
||||||
| userEmail : _ <- mapMaybe (assertM (elem '@') . either (const Nothing) Just . Text.decodeUtf8') (lookupSome ldapMap $ toList ldapUserEmail)
|
|
||||||
-> return $ CI.mk userEmail
|
|
||||||
-- | userEmail : _ <- mapMaybe (assertM validEmail . either (const Nothing) Just . Text.decodeUtf8') (lookupSome ldapMap $ toList ldapUserEmail) -- TOO STRONG, see above!
|
|
||||||
-- -> return $ CI.mk userEmail
|
|
||||||
| otherwise
|
|
||||||
-> throwM CampusUserInvalidEmail
|
|
||||||
|
|
||||||
userLdapPrimaryKey <- if
|
|
||||||
| [bs] <- ldapMap !!! ldapPrimaryKey
|
|
||||||
, Right userLdapPrimaryKey'' <- Text.decodeUtf8' bs
|
|
||||||
, Just userLdapPrimaryKey''' <- assertM' (not . Text.null) $ Text.strip userLdapPrimaryKey''
|
|
||||||
-> return $ Just userLdapPrimaryKey'''
|
|
||||||
| otherwise
|
|
||||||
-> return Nothing
|
|
||||||
|
|
||||||
let
|
let
|
||||||
|
(azureSurname, azureFirstName, azureDisplayName, azureEmail, azureTelephone, azureMobile, azureLanguages)
|
||||||
|
| Just azureData <- mbAzureData
|
||||||
|
= ( azureData `decodeAzure` azureUserSurname
|
||||||
|
, azureData `decodeAzure` azureUserGivenName
|
||||||
|
, azureData `decodeAzure` azureUserDisplayName
|
||||||
|
, azureData `decodeAzure` azureUserMail
|
||||||
|
, azureData `decodeAzure` azureUserTelephone
|
||||||
|
, azureData `decodeAzure` azureUserMobile
|
||||||
|
, Nothing -- azureData `decodeAzure` azureUserPreferredLanguage -- TODO: parse Languages from azureUserPreferredLanguage
|
||||||
|
)
|
||||||
|
| otherwise
|
||||||
|
= ( Nothing, Nothing, Nothing, Nothing, Nothing, Nothing, Nothing )
|
||||||
|
|
||||||
|
(ldapSurname, ldapFirstName, ldapDisplayName, ldapEmail, ldapTelephone, ldapMobile, ldapCompanyPersonalNumber, ldapCompanyDepartment)
|
||||||
|
| Just ldapData <- mbLdapData
|
||||||
|
= ( ldapData `decodeLdap` ldapUserSurname
|
||||||
|
, ldapData `decodeLdap` ldapUserFirstName
|
||||||
|
, ldapData `decodeLdap` ldapUserDisplayName
|
||||||
|
, ldapData `decodeLdap` Ldap.Attr "mail" -- TODO: use ldapUserEmail?
|
||||||
|
, ldapData `decodeLdap` ldapUserTelephone
|
||||||
|
, ldapData `decodeLdap` ldapUserMobile
|
||||||
|
, ldapData `decodeLdap` ldapUserFraportPersonalnummer
|
||||||
|
, ldapData `decodeLdap` ldapUserFraportAbteilung
|
||||||
|
)
|
||||||
|
| otherwise
|
||||||
|
= ( Nothing, Nothing, Nothing, Nothing, Nothing, Nothing, Nothing, Nothing )
|
||||||
|
|
||||||
|
-- TODO: throw on collisions?
|
||||||
|
|
||||||
|
-- TODO: use user-auth precedence from app config when implementing multi-source support
|
||||||
|
let
|
||||||
|
userSurname = fromMaybe mempty $ azureSurname <|> ldapSurname
|
||||||
|
userFirstName = fromMaybe mempty $ azureFirstName <|> ldapFirstName
|
||||||
|
userDisplayName = fromMaybe mempty $ azureDisplayName <|> ldapDisplayName
|
||||||
|
userEmail = maybe mempty CI.mk $ azureEmail <|> ldapEmail
|
||||||
|
userTelephone = azureTelephone <|> ldapTelephone
|
||||||
|
userMobile = azureMobile <|> ldapMobile
|
||||||
|
userLanguages = azureLanguages
|
||||||
|
userCompanyPersonalNumber = ldapCompanyPersonalNumber
|
||||||
|
userCompanyDepartment = ldapCompanyDepartment
|
||||||
|
|
||||||
newUser = User
|
newUser = User
|
||||||
{ userMaxFavourites = userDefaultMaxFavourites
|
{ userMaxFavourites = userDefaultMaxFavourites
|
||||||
, userMaxFavouriteTerms = userDefaultMaxFavouriteTerms
|
, userMaxFavouriteTerms = userDefaultMaxFavouriteTerms
|
||||||
, userTheme = userDefaultTheme
|
, userTheme = userDefaultTheme
|
||||||
, userDateTimeFormat = userDefaultDateTimeFormat
|
, userDateTimeFormat = userDefaultDateTimeFormat
|
||||||
, userDateFormat = userDefaultDateFormat
|
, userDateFormat = userDefaultDateFormat
|
||||||
, userTimeFormat = userDefaultTimeFormat
|
, userTimeFormat = userDefaultTimeFormat
|
||||||
, userDownloadFiles = userDefaultDownloadFiles
|
, userDownloadFiles = userDefaultDownloadFiles
|
||||||
, userWarningDays = userDefaultWarningDays
|
, userWarningDays = userDefaultWarningDays
|
||||||
, userShowSex = userDefaultShowSex
|
, userShowSex = userDefaultShowSex
|
||||||
, userSex = Nothing
|
, userSex = Nothing
|
||||||
, userBirthday = Nothing
|
, userBirthday = Nothing
|
||||||
, userExamOfficeGetSynced = userDefaultExamOfficeGetSynced
|
, userTitle = Nothing
|
||||||
, userExamOfficeGetLabels = userDefaultExamOfficeGetLabels
|
, userExamOfficeGetSynced = userDefaultExamOfficeGetSynced
|
||||||
, userNotificationSettings = def
|
, userExamOfficeGetLabels = userDefaultExamOfficeGetLabels
|
||||||
, userLanguages = Nothing
|
, userNotificationSettings = def
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userCreated = now
|
, userDisplayEmail = userEmail
|
||||||
, userLastLdapSynchronisation = Just now
|
, userMatrikelnummer = Nothing -- TODO: not known from Azure/LDAP, must be derived from REST interface to AVS
|
||||||
, userDisplayName = userDisplayName
|
, userPostAddress = Nothing -- TODO: not known from Azure/LDAP, must be derived from REST interface to AVS
|
||||||
, userDisplayEmail = userEmail
|
, userPostLastUpdate = Nothing
|
||||||
, userMatrikelnummer = Nothing -- not known from LDAP, must be derived from REST interface to AVS TODO
|
, userPinPassword = Nothing -- must be derived via AVS
|
||||||
, userPostAddress = Nothing -- not known from LDAP, must be derived from REST interface to AVS TODO
|
, userPrefersPostal = userDefaultPrefersPostal
|
||||||
, userPostLastUpdate = Nothing
|
, userPasswordHash = Nothing
|
||||||
, userPinPassword = Nothing -- must be derived via AVS
|
, userLastAuthentication = Nothing
|
||||||
, userPrefersPostal = userDefaultPrefersPostal
|
, userCreated = now
|
||||||
|
, userLastSync = Just now
|
||||||
, ..
|
, ..
|
||||||
}
|
}
|
||||||
userUpdate =
|
userUpdate =
|
||||||
[ UserLastAuthentication =. Just now | isLogin ] ++
|
[ UserSurname =. userSurname
|
||||||
[ UserEmail =. userEmail | validEmail' userEmail ] ++
|
, UserFirstName =. userFirstName
|
||||||
[
|
-- , UserDisplayName =. userDisplayName -- not updated, since users are allowed to change their DisplayName
|
||||||
-- UserDisplayName =. userDisplayName -- not updated here, since users are allowed to change their DisplayName; see line 272
|
, UserEmail =. userEmail
|
||||||
UserFirstName =. userFirstName
|
, UserTelephone =. userTelephone
|
||||||
, UserSurname =. userSurname
|
, UserMobile =. userMobile
|
||||||
, UserLastLdapSynchronisation =. Just now
|
, UserCompanyPersonalNumber =. userCompanyPersonalNumber
|
||||||
, UserLdapPrimaryKey =. userLdapPrimaryKey
|
, UserCompanyDepartment =. userCompanyDepartment
|
||||||
, UserMobile =. userMobile
|
, UserLastSync =. Just now
|
||||||
, UserTelephone =. userTelephone
|
|
||||||
, UserCompanyPersonalNumber =. userCompanyPersonalNumber
|
|
||||||
, UserCompanyDepartment =. userCompanyDepartment
|
|
||||||
]
|
]
|
||||||
return (newUser, userUpdate)
|
return (newUser, userUpdate)
|
||||||
|
|
||||||
where
|
where
|
||||||
ldapMap :: Map.Map Ldap.Attr [Ldap.AttrValue] -- Recall: Ldap.AttrValue == ByteString
|
mbAzureData :: Maybe (Map Text [ByteString])
|
||||||
ldapMap = Map.fromListWith (++) $ ldapData <&> second (filter (not . ByteString.null))
|
mbAzureData = fmap (Map.fromListWith (++) . map (second (filter (not . ByteString.null)))) . concat $ preview _upsertUserAzureData <$> NonEmpty.toList upsertData
|
||||||
|
mbLdapData :: Maybe (Map Ldap.Attr [Ldap.AttrValue]) -- Recall: Ldap.AttrValue == ByteString
|
||||||
|
mbLdapData = fmap (Map.fromListWith (++) . map (second (filter (not . ByteString.null)))) . concat $ preview _upsertUserLdapData <$> NonEmpty.toList upsertData
|
||||||
|
|
||||||
-- just returns Nothing on error, pure
|
-- just returns Nothing on error, pure
|
||||||
decodeLdap :: Ldap.Attr -> Maybe Text
|
decodeAzure :: Map Text [ByteString] -> Text -> Maybe Text
|
||||||
decodeLdap attr = listToMaybe . rights $ Text.decodeUtf8' <$> ldapMap !!! attr
|
decodeAzure azureData k = listToMaybe . rights $ Text.decodeUtf8' <$> azureData !!! k
|
||||||
|
decodeLdap :: Map Ldap.Attr [Ldap.AttrValue] -> Ldap.Attr -> Maybe Text
|
||||||
|
decodeLdap ldapData attr = listToMaybe . rights $ Text.decodeUtf8' <$> ldapData !!! attr
|
||||||
|
|
||||||
decodeLdap' :: Ldap.Attr -> Text
|
-- decodeAzure' :: Map Text [ByteString] -> Text -> Text
|
||||||
decodeLdap' = fromMaybe "" . decodeLdap
|
-- decodeAzure' azureData = fromMaybe "" . decodeAzure azureData
|
||||||
|
-- decodeLdap' :: Map Ldap.Attr [Ldap.AttrValue] -> Ldap.Attr -> Text
|
||||||
|
-- decodeLdap' ldapData = fromMaybe "" . decodeLdap ldapData
|
||||||
-- accept the first successful decoding or empty; only throw an error if all decodings fail
|
-- accept the first successful decoding or empty; only throw an error if all decodings fail
|
||||||
-- decodeLdap' :: (Exception e) => Ldap.Attr -> e -> m (Maybe Text)
|
-- decodeLdap' :: (Exception e) => Ldap.Attr -> e -> m (Maybe Text)
|
||||||
-- decodeLdap' attr err
|
-- decodeLdap' attr err
|
||||||
@ -343,11 +409,11 @@ decodeUser now UserDefaultConf{..} upsertMode ldapData = do
|
|||||||
|
|
||||||
-- only accepts the first successful decoding, ignoring all others, but failing if there is none
|
-- only accepts the first successful decoding, ignoring all others, but failing if there is none
|
||||||
-- decodeLdap1 :: (MonadThrow m, Exception e) => Ldap.Attr -> e -> m Text
|
-- decodeLdap1 :: (MonadThrow m, Exception e) => Ldap.Attr -> e -> m Text
|
||||||
decodeLdap1 attr err
|
-- decodeLdap1 ldapData attr err
|
||||||
| (h:_) <- rights vs = return h
|
-- | (h:_) <- rights vs = return h
|
||||||
| otherwise = throwM err
|
-- | otherwise = throwM err
|
||||||
where
|
-- where
|
||||||
vs = Text.decodeUtf8' <$> (ldapMap !!! attr)
|
-- vs = Text.decodeUtf8' <$> (ldapData !!! attr)
|
||||||
|
|
||||||
-- accept and merge one or more successful decodings, ignoring all others
|
-- accept and merge one or more successful decodings, ignoring all others
|
||||||
-- decodeLdapN attr err
|
-- decodeLdapN attr err
|
||||||
@ -357,6 +423,17 @@ decodeUser now UserDefaultConf{..} upsertMode ldapData = do
|
|||||||
-- where
|
-- where
|
||||||
-- vs = Text.decodeUtf8' <$> (ldapMap !!! attr)
|
-- vs = Text.decodeUtf8' <$> (ldapMap !!! attr)
|
||||||
|
|
||||||
|
decodeUserTest :: ( MonadHandler m
|
||||||
|
, HandlerSite m ~ UniWorX
|
||||||
|
, MonadCatch m
|
||||||
|
)
|
||||||
|
=> NonEmpty UpsertUserData
|
||||||
|
-> m (Either DecodeUserException (User, [Update User]))
|
||||||
|
decodeUserTest decodeData = do
|
||||||
|
now <- liftIO getCurrentTime
|
||||||
|
userDefaultConf <- getsYesod $ view _appUserDefaults
|
||||||
|
try $ decodeUser now userDefaultConf decodeData
|
||||||
|
|
||||||
|
|
||||||
associateUserSchoolsByTerms :: MonadIO m => UserId -> SqlPersistT m ()
|
associateUserSchoolsByTerms :: MonadIO m => UserId -> SqlPersistT m ()
|
||||||
associateUserSchoolsByTerms uid = do
|
associateUserSchoolsByTerms uid = do
|
||||||
@ -371,11 +448,14 @@ associateUserSchoolsByTerms uid = do
|
|||||||
, userSchoolIsOptOut = False
|
, userSchoolIsOptOut = False
|
||||||
}
|
}
|
||||||
|
|
||||||
updateUserLanguage :: ( MonadHandler m, HandlerSite m ~ UniWorX
|
|
||||||
|
updateUserLanguage :: ( MonadHandler m
|
||||||
|
, HandlerSite m ~ UniWorX
|
||||||
, YesodAuth UniWorX
|
, YesodAuth UniWorX
|
||||||
, UserId ~ AuthId UniWorX
|
, UserId ~ AuthId UniWorX
|
||||||
)
|
)
|
||||||
=> Maybe Lang -> SqlPersistT m (Maybe Lang)
|
=> Maybe Lang
|
||||||
|
-> SqlPersistT m (Maybe Lang)
|
||||||
updateUserLanguage (Just lang) = do
|
updateUserLanguage (Just lang) = do
|
||||||
unless (lang `elem` appLanguages) $
|
unless (lang `elem` appLanguages) $
|
||||||
invalidArgs ["Unsupported language"]
|
invalidArgs ["Unsupported language"]
|
||||||
@ -406,7 +486,4 @@ updateUserLanguage Nothing = runMaybeT $ do
|
|||||||
setRegisteredCookie CookieLang lang
|
setRegisteredCookie CookieLang lang
|
||||||
return lang
|
return lang
|
||||||
|
|
||||||
campusUserFailoverMode :: FailoverMode
|
embedRenderMessage ''UniWorX ''DecodeUserException id
|
||||||
campusUserFailoverMode = FailoverUnlimited
|
|
||||||
|
|
||||||
embedRenderMessage ''UniWorX ''CampusUserConversionException id
|
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -31,7 +31,7 @@ import Handler.Admin.ErrorMessage as Handler.Admin
|
|||||||
import Handler.Admin.Tokens as Handler.Admin
|
import Handler.Admin.Tokens as Handler.Admin
|
||||||
import Handler.Admin.Crontab as Handler.Admin
|
import Handler.Admin.Crontab as Handler.Admin
|
||||||
import Handler.Admin.Avs as Handler.Admin
|
import Handler.Admin.Avs as Handler.Admin
|
||||||
import Handler.Admin.Ldap as Handler.Admin
|
import Handler.Admin.ExternalUser as Handler.Admin
|
||||||
|
|
||||||
|
|
||||||
getAdminR :: Handler Html
|
getAdminR :: Handler Html
|
||||||
|
|||||||
74
src/Handler/Admin/ExternalUser.hs
Normal file
74
src/Handler/Admin/ExternalUser.hs
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, David Mosbach <david.mosbach@uniworx.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
module Handler.Admin.ExternalUser
|
||||||
|
( getAdminExternalUserR
|
||||||
|
, postAdminExternalUserR
|
||||||
|
) where
|
||||||
|
|
||||||
|
import Import
|
||||||
|
|
||||||
|
import Foundation.Yesod.Auth (userLookupAndUpsert) -- decodeUserTest
|
||||||
|
import Auth.OAuth2 (queryOAuth2User)
|
||||||
|
import Auth.LDAP
|
||||||
|
|
||||||
|
import Handler.Utils
|
||||||
|
|
||||||
|
import Data.Aeson.Encode.Pretty (encodePretty)
|
||||||
|
import qualified Data.Text.Lazy as Lazy
|
||||||
|
import qualified Data.Text.Lazy.Encoding as Lazy
|
||||||
|
|
||||||
|
|
||||||
|
getAdminExternalUserR, postAdminExternalUserR :: Handler Html
|
||||||
|
getAdminExternalUserR = postAdminExternalUserR
|
||||||
|
postAdminExternalUserR = do
|
||||||
|
((presult, pwidget), penctype) <- runFormPost $ identifyForm ("adminExternalUserLookup"::Text) $ \html ->
|
||||||
|
flip (renderAForm FormStandard) html $ areq textField (fslI MsgAdminUserIdent) Nothing
|
||||||
|
|
||||||
|
let
|
||||||
|
-- presentUtf8 v = Text.intercalate ", " (either tshow id . Text.decodeUtf8' <$> v)
|
||||||
|
-- presentLatin1 v = Text.intercalate ", " ( Text.decodeLatin1 <$> v)
|
||||||
|
|
||||||
|
procFormPerson :: Text -> Handler (Maybe [(AuthSourceIdent,Lazy.Text)]) -- (Maybe [(AuthSourceIdent, [(Text,(Int,Text,Text))])])
|
||||||
|
procFormPerson needle = getsYesod (view _appUserAuthConf) >>= \case
|
||||||
|
UserAuthConfSingleSource{..} -> case userAuthConfSingleSource of
|
||||||
|
AuthSourceConfAzureAdV2 AzureConf{..} -> do
|
||||||
|
-- only singleton results supported right now, i.e. lookups by email, userPrincipalName (aka fraport ident), or id
|
||||||
|
queryOAuth2User @Value needle >>= \case
|
||||||
|
Left _ -> addMessage Error (text2Html "Encountered UserDataException while Azure user query!") >> return Nothing
|
||||||
|
Right azureResponse -> return . Just . singleton . (AuthSourceIdAzure azureConfTenantId,) . Lazy.decodeUtf8 $ encodePretty azureResponse
|
||||||
|
-- Right azureData -> return . Just . singleton . (AuthSourceIdAzure azureConfTenantId,) $ azureData <&> \(k,vs) -> (k, (length vs, presentUtf8 vs, presentLatin1 vs))
|
||||||
|
AuthSourceConfLdap LdapConf{..} -> do
|
||||||
|
getsYesod (view _appLdapPool) >>= \case
|
||||||
|
Nothing -> addMessage Error (text2Html "LDAP Pool configuration missing!") >> return Nothing
|
||||||
|
Just pool -> do
|
||||||
|
ldapData <- ldapSearch pool needle
|
||||||
|
-- decodedErr <- decodeUserTest $ NonEmpty.singleton UpsertUserDataLdap{ upsertUserLdapHost = ldapConfSourceId, upsertUserLdapData = concat ldapData }
|
||||||
|
-- whenIsLeft decodedErr $ addMessageI Error
|
||||||
|
return . Just . singleton . (AuthSourceIdLdap ldapConfSourceId,) . Lazy.decodeUtf8 $ encodePretty ldapData
|
||||||
|
-- return . Just $ ldapData <&> \(Ldap.SearchEntry _dn attrs) -> (AuthSourceIdLdap{..}, (\(k,v) -> (tshow k, (length v, presentUtf8 v, presentLatin1 v))) <$> attrs)
|
||||||
|
|
||||||
|
mbData <- formResultMaybe presult procFormPerson
|
||||||
|
|
||||||
|
|
||||||
|
((uresult, uwidget), uenctype) <- runFormPost $ identifyForm ("adminExternalUserUpsert"::Text) $ \html ->
|
||||||
|
flip (renderAForm FormStandard) html $ areq textField (fslI MsgAdminUserIdent) Nothing
|
||||||
|
let procFormUpsert :: Text -> Handler (Maybe (Entity User))
|
||||||
|
procFormUpsert lid = runDB (userLookupAndUpsert lid UpsertUserGuessUser)
|
||||||
|
|
||||||
|
mbUpsert <- formResultMaybe uresult procFormUpsert
|
||||||
|
|
||||||
|
|
||||||
|
actionUrl <- fromMaybe AdminExternalUserR <$> getCurrentRoute
|
||||||
|
siteLayoutMsg MsgMenuExternalUser $ do
|
||||||
|
setTitleI MsgMenuExternalUser
|
||||||
|
let personForm = wrapForm pwidget def
|
||||||
|
{ formAction = Just $ SomeRoute actionUrl
|
||||||
|
, formEncoding = penctype
|
||||||
|
}
|
||||||
|
upsertForm = wrapForm uwidget def
|
||||||
|
{ formAction = Just $ SomeRoute actionUrl
|
||||||
|
, formEncoding = uenctype
|
||||||
|
}
|
||||||
|
$(widgetFile "admin/external-user")
|
||||||
@ -1,69 +0,0 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Steffen Jost <jost@tcs.ifi.lmu.de>
|
|
||||||
--
|
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
module Handler.Admin.Ldap
|
|
||||||
( getAdminLdapR
|
|
||||||
, postAdminLdapR
|
|
||||||
) where
|
|
||||||
|
|
||||||
import Import
|
|
||||||
-- import qualified Control.Monad.State.Class as State
|
|
||||||
-- import Data.Aeson (encode)
|
|
||||||
import qualified Data.CaseInsensitive as CI
|
|
||||||
import qualified Data.Text as Text
|
|
||||||
import qualified Data.Text.Encoding as Text
|
|
||||||
-- import qualified Data.Set as Set
|
|
||||||
import Foundation.Yesod.Auth (decodeUserTest,ldapLookupAndUpsert,campusUserFailoverMode,CampusUserConversionException())
|
|
||||||
import Handler.Utils
|
|
||||||
|
|
||||||
import qualified Ldap.Client as Ldap
|
|
||||||
import Auth.LDAP
|
|
||||||
|
|
||||||
|
|
||||||
getAdminLdapR, postAdminLdapR :: Handler Html
|
|
||||||
getAdminLdapR = postAdminLdapR
|
|
||||||
postAdminLdapR = do
|
|
||||||
((presult, pwidget), penctype) <- runFormPost $ identifyForm ("adminLdapLookup"::Text) $ \html ->
|
|
||||||
flip (renderAForm FormStandard) html $ areq textField (fslI MsgAdminUserIdent) Nothing
|
|
||||||
|
|
||||||
let procFormPerson :: Text -> Handler (Maybe (Ldap.AttrList []))
|
|
||||||
procFormPerson lid = do
|
|
||||||
ldapPool' <- getsYesod $ view _appLdapPool
|
|
||||||
case ldapPool' of
|
|
||||||
Nothing -> addMessage Error (text2Html "LDAP Configuration missing.") >> return Nothing
|
|
||||||
Just ldapPool -> do
|
|
||||||
addMessage Info $ text2Html "Input for LDAP test received."
|
|
||||||
ldapData <- campusUser'' ldapPool campusUserFailoverMode lid
|
|
||||||
decodedErr <- decodeUserTest (pure $ CI.mk lid) $ concat ldapData
|
|
||||||
whenIsLeft decodedErr $ addMessageI Error
|
|
||||||
return ldapData
|
|
||||||
mbLdapData <- formResultMaybe presult procFormPerson
|
|
||||||
|
|
||||||
|
|
||||||
((uresult, uwidget), uenctype) <- runFormPost $ identifyForm ("adminLdapUpsert"::Text) $ \html ->
|
|
||||||
flip (renderAForm FormStandard) html $ areq textField (fslI MsgAdminUserIdent) Nothing
|
|
||||||
let procFormUpsert :: Text -> Handler (Maybe (Either CampusUserConversionException (Entity User)))
|
|
||||||
procFormUpsert lid = pure <$> runDB (try $ ldapLookupAndUpsert lid)
|
|
||||||
mbLdapUpsert <- formResultMaybe uresult procFormUpsert
|
|
||||||
|
|
||||||
|
|
||||||
actionUrl <- fromMaybe AdminLdapR <$> getCurrentRoute
|
|
||||||
siteLayoutMsg MsgMenuLdap $ do
|
|
||||||
setTitleI MsgMenuLdap
|
|
||||||
let personForm = wrapForm pwidget def
|
|
||||||
{ formAction = Just $ SomeRoute actionUrl
|
|
||||||
, formEncoding = penctype
|
|
||||||
}
|
|
||||||
upsertForm = wrapForm uwidget def
|
|
||||||
{ formAction = Just $ SomeRoute actionUrl
|
|
||||||
, formEncoding = uenctype
|
|
||||||
}
|
|
||||||
presentUtf8 lv = Text.intercalate ", " (either tshow id . Text.decodeUtf8' <$> lv)
|
|
||||||
presentLatin1 lv = Text.intercalate ", " ( Text.decodeLatin1 <$> lv)
|
|
||||||
|
|
||||||
-- TODO: use i18nWidgetFile instead if this is to become permanent
|
|
||||||
$(widgetFile "ldap")
|
|
||||||
|
|
||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -321,8 +321,8 @@ postAdminTestR = do
|
|||||||
<dl .deflist>
|
<dl .deflist>
|
||||||
<dt .deflist__dt> appJobCronInterval
|
<dt .deflist__dt> appJobCronInterval
|
||||||
<dd .deflist__dd>#{tshow appJobCronInterval}
|
<dd .deflist__dd>#{tshow appJobCronInterval}
|
||||||
<dt .deflist__dt> appSynchroniseLdapUsersWithin
|
<dt .deflist__dt> appUserSyncWithin
|
||||||
<dd .deflist__dd>#{tshow appSynchroniseLdapUsersWithin}
|
<dd .deflist__dd>#{tshow appUserSyncWithin}
|
||||||
<dt .deflist__dt> appSynchroniseAvsUsersWithin
|
<dt .deflist__dt> appSynchroniseAvsUsersWithin
|
||||||
<dd .deflist__dd>#{tshow appSynchroniseAvsUsersWithin}
|
<dd .deflist__dd>#{tshow appSynchroniseAvsUsersWithin}
|
||||||
|]
|
|]
|
||||||
|
|||||||
@ -204,7 +204,6 @@ data UserTableCsv = UserTableCsv
|
|||||||
, csvUserSex :: Maybe Sex
|
, csvUserSex :: Maybe Sex
|
||||||
, csvUserBirthday :: Maybe Day
|
, csvUserBirthday :: Maybe Day
|
||||||
, csvUserMatriculation :: Maybe UserMatriculation
|
, csvUserMatriculation :: Maybe UserMatriculation
|
||||||
, csvUserEPPN :: Maybe UserEduPersonPrincipalName
|
|
||||||
, csvUserEmail :: UserEmail
|
, csvUserEmail :: UserEmail
|
||||||
, csvUserQualifications :: [QualificationName]
|
, csvUserQualifications :: [QualificationName]
|
||||||
, csvUserSubmissionGroup :: Maybe SubmissionGroupName
|
, csvUserSubmissionGroup :: Maybe SubmissionGroupName
|
||||||
@ -224,7 +223,6 @@ instance Csv.ToNamedRecord UserTableCsv where
|
|||||||
, "sex" Csv..= csvUserSex
|
, "sex" Csv..= csvUserSex
|
||||||
, "birthday" Csv..= csvUserBirthday
|
, "birthday" Csv..= csvUserBirthday
|
||||||
, "matriculation" Csv..= csvUserMatriculation
|
, "matriculation" Csv..= csvUserMatriculation
|
||||||
, "eduPersonPrincipalName" Csv..= csvUserEPPN
|
|
||||||
, "email" Csv..= csvUserEmail
|
, "email" Csv..= csvUserEmail
|
||||||
, "qualifications" Csv..= CsvSemicolonList csvUserQualifications
|
, "qualifications" Csv..= CsvSemicolonList csvUserQualifications
|
||||||
, "submission-group" Csv..= csvUserSubmissionGroup
|
, "submission-group" Csv..= csvUserSubmissionGroup
|
||||||
@ -286,7 +284,6 @@ data UserTableJson = UserTableJson
|
|||||||
, jsonUserName :: UserDisplayName
|
, jsonUserName :: UserDisplayName
|
||||||
, jsonUserSex :: Maybe (Maybe Sex)
|
, jsonUserSex :: Maybe (Maybe Sex)
|
||||||
, jsonUserMatriculation :: Maybe UserMatriculation
|
, jsonUserMatriculation :: Maybe UserMatriculation
|
||||||
, jsonUserEPPN :: Maybe UserEduPersonPrincipalName
|
|
||||||
, jsonUserEmail :: UserEmail
|
, jsonUserEmail :: UserEmail
|
||||||
, jsonUserQualifications :: Set QualificationName
|
, jsonUserQualifications :: Set QualificationName
|
||||||
, jsonUserSubmissionGroup :: Maybe SubmissionGroupName
|
, jsonUserSubmissionGroup :: Maybe SubmissionGroupName
|
||||||
@ -323,7 +320,6 @@ instance ToJSON UserTableJson where
|
|||||||
, pure $ "name" JSON..= jsonUserName
|
, pure $ "name" JSON..= jsonUserName
|
||||||
, ("sex" JSON..=) <$> jsonUserSex
|
, ("sex" JSON..=) <$> jsonUserSex
|
||||||
, ("matriculation" JSON..=) <$> jsonUserMatriculation
|
, ("matriculation" JSON..=) <$> jsonUserMatriculation
|
||||||
, ("eduPersonPrincipalName" JSON..=) <$> jsonUserEPPN
|
|
||||||
, pure $ "email" JSON..= jsonUserEmail
|
, pure $ "email" JSON..= jsonUserEmail
|
||||||
, ("qualifications" JSON..=) <$> assertM' (not . onull) jsonUserQualifications
|
, ("qualifications" JSON..=) <$> assertM' (not . onull) jsonUserQualifications
|
||||||
, ("submission-group" JSON..=) <$> jsonUserSubmissionGroup
|
, ("submission-group" JSON..=) <$> jsonUserSubmissionGroup
|
||||||
@ -566,7 +562,6 @@ makeCourseUserTable cid acts restrict colChoices psValidator csvColumns = do
|
|||||||
<*> view (hasUser . _userSex)
|
<*> view (hasUser . _userSex)
|
||||||
<*> view (hasUser . _userBirthday)
|
<*> view (hasUser . _userBirthday)
|
||||||
<*> view (hasUser . _userMatrikelnummer)
|
<*> view (hasUser . _userMatrikelnummer)
|
||||||
<*> view (hasUser . _userLdapPrimaryKey)
|
|
||||||
<*> view (hasUser . _userEmail)
|
<*> view (hasUser . _userEmail)
|
||||||
<*> (over traverse (qualificationName . entityVal) <$> view _userQualifications)
|
<*> (over traverse (qualificationName . entityVal) <$> view _userQualifications)
|
||||||
<*> preview (_userSubmissionGroup . _entityVal . _submissionGroupName)
|
<*> preview (_userSubmissionGroup . _entityVal . _submissionGroupName)
|
||||||
@ -598,7 +593,6 @@ makeCourseUserTable cid acts restrict colChoices psValidator csvColumns = do
|
|||||||
<*> view (hasUser . _userDisplayName)
|
<*> view (hasUser . _userDisplayName)
|
||||||
<*> views (hasUser . _userSex) (guardOn showSex)
|
<*> views (hasUser . _userSex) (guardOn showSex)
|
||||||
<*> view (hasUser . _userMatrikelnummer)
|
<*> view (hasUser . _userMatrikelnummer)
|
||||||
<*> view (hasUser . _userLdapPrimaryKey)
|
|
||||||
<*> view (hasUser . _userEmail)
|
<*> view (hasUser . _userEmail)
|
||||||
<*> view (_userQualifications . folded . to (Set.singleton . qualificationName . entityVal))
|
<*> view (_userQualifications . folded . to (Set.singleton . qualificationName . entityVal))
|
||||||
<*> preview (_userSubmissionGroup . _entityVal . _submissionGroupName)
|
<*> preview (_userSubmissionGroup . _entityVal . _submissionGroupName)
|
||||||
|
|||||||
@ -187,7 +187,6 @@ data ExamUserTableCsv = ExamUserTableCsv
|
|||||||
, csvEUserFirstName :: Maybe Text
|
, csvEUserFirstName :: Maybe Text
|
||||||
, csvEUserName :: Maybe Text
|
, csvEUserName :: Maybe Text
|
||||||
, csvEUserMatriculation :: Maybe Text
|
, csvEUserMatriculation :: Maybe Text
|
||||||
, csvEUserEPPN :: Maybe UserEduPersonPrincipalName
|
|
||||||
, csvEUserStudyFeatures :: UserTableStudyFeatures
|
, csvEUserStudyFeatures :: UserTableStudyFeatures
|
||||||
, csvEUserOccurrence :: Maybe (CI Text)
|
, csvEUserOccurrence :: Maybe (CI Text)
|
||||||
, csvEUserExercisePoints :: Maybe (Maybe Points)
|
, csvEUserExercisePoints :: Maybe (Maybe Points)
|
||||||
@ -208,7 +207,6 @@ instance ToNamedRecord ExamUserTableCsv where
|
|||||||
, "first-name" Csv..= csvEUserFirstName
|
, "first-name" Csv..= csvEUserFirstName
|
||||||
, "name" Csv..= csvEUserName
|
, "name" Csv..= csvEUserName
|
||||||
, "matriculation" Csv..= csvEUserMatriculation
|
, "matriculation" Csv..= csvEUserMatriculation
|
||||||
, "eduPersonPrincipalName" Csv..= csvEUserEPPN
|
|
||||||
, "study-features" Csv..= csvEUserStudyFeatures
|
, "study-features" Csv..= csvEUserStudyFeatures
|
||||||
, "occurrence" Csv..= csvEUserOccurrence
|
, "occurrence" Csv..= csvEUserOccurrence
|
||||||
] ++ catMaybes
|
] ++ catMaybes
|
||||||
@ -234,7 +232,6 @@ instance FromNamedRecord ExamUserTableCsv where
|
|||||||
<*> csv .:?? "first-name"
|
<*> csv .:?? "first-name"
|
||||||
<*> csv .:?? "name"
|
<*> csv .:?? "name"
|
||||||
<*> csv .:?? "matriculation"
|
<*> csv .:?? "matriculation"
|
||||||
<*> csv .:?? "eduPersonPrincipalName"
|
|
||||||
<*> pure mempty
|
<*> pure mempty
|
||||||
<*> csv .:?? "occurrence"
|
<*> csv .:?? "occurrence"
|
||||||
<*> fmap Just (csv .:?? "exercise-points")
|
<*> fmap Just (csv .:?? "exercise-points")
|
||||||
@ -277,7 +274,7 @@ examUserTableCsvHeader :: ( MonoFoldable mono
|
|||||||
=> SheetGradeSummary -> Bool -> mono -> Csv.Header
|
=> SheetGradeSummary -> Bool -> mono -> Csv.Header
|
||||||
examUserTableCsvHeader allBoni doBonus pNames = Csv.header $
|
examUserTableCsvHeader allBoni doBonus pNames = Csv.header $
|
||||||
[ "surname", "first-name", "name"
|
[ "surname", "first-name", "name"
|
||||||
, "matriculation", "eduPersonPrincipalName"
|
, "matriculation"
|
||||||
, "study-features"
|
, "study-features"
|
||||||
, "course-note"
|
, "course-note"
|
||||||
, "occurrence"
|
, "occurrence"
|
||||||
@ -615,7 +612,6 @@ postEUsersR tid ssh csh examn = do
|
|||||||
<*> view (resultUser . _entityVal . _userFirstName . to Just)
|
<*> view (resultUser . _entityVal . _userFirstName . to Just)
|
||||||
<*> view (resultUser . _entityVal . _userDisplayName . to Just)
|
<*> view (resultUser . _entityVal . _userDisplayName . to Just)
|
||||||
<*> view (resultUser . _entityVal . _userMatrikelnummer)
|
<*> view (resultUser . _entityVal . _userMatrikelnummer)
|
||||||
<*> view (resultUser . _entityVal . _userLdapPrimaryKey)
|
|
||||||
<*> view resultStudyFeatures
|
<*> view resultStudyFeatures
|
||||||
<*> preview (resultExamOccurrence . _entityVal . _examOccurrenceName)
|
<*> preview (resultExamOccurrence . _entityVal . _examOccurrenceName)
|
||||||
<*> fmap (bool (const Nothing) Just showPoints) (preview $ resultUser . _entityKey . to (examBonusAchieved ?? bonus) . _achievedPoints . _Wrapped)
|
<*> fmap (bool (const Nothing) Just showPoints) (preview $ resultUser . _entityKey . to (examBonusAchieved ?? bonus) . _achievedPoints . _Wrapped)
|
||||||
@ -939,7 +935,6 @@ postEUsersR tid ssh csh examn = do
|
|||||||
guessUser' ExamUserTableCsv{..} = do
|
guessUser' ExamUserTableCsv{..} = do
|
||||||
let criteria = PredDNF . maybe Set.empty Set.singleton . fromNullable . Set.fromList . fmap PLVariable $ catMaybes
|
let criteria = PredDNF . maybe Set.empty Set.singleton . fromNullable . Set.fromList . fmap PLVariable $ catMaybes
|
||||||
[ GuessUserMatrikelnummer <$> csvEUserMatriculation
|
[ GuessUserMatrikelnummer <$> csvEUserMatriculation
|
||||||
, GuessUserEduPersonPrincipalName <$> csvEUserEPPN
|
|
||||||
, GuessUserDisplayName <$> csvEUserName
|
, GuessUserDisplayName <$> csvEUserName
|
||||||
, GuessUserSurname <$> csvEUserSurname
|
, GuessUserSurname <$> csvEUserSurname
|
||||||
, GuessUserFirstName <$> csvEUserFirstName
|
, GuessUserFirstName <$> csvEUserFirstName
|
||||||
|
|||||||
@ -67,7 +67,7 @@ fakeQualificationUsers (Entity qid Qualification{qualificationRefreshWithin}) (u
|
|||||||
let pw = "123.456"
|
let pw = "123.456"
|
||||||
PWHashConf{..} <- getsYesod $ view _appAuthPWHash
|
PWHashConf{..} <- getsYesod $ view _appAuthPWHash
|
||||||
pwHash <- liftIO $ PWStore.makePasswordWith pwHashAlgorithm pw pwHashStrength
|
pwHash <- liftIO $ PWStore.makePasswordWith pwHashAlgorithm pw pwHashStrength
|
||||||
return $ AuthPWHash $ TEnc.decodeUtf8 pwHash
|
return $ TEnc.decodeUtf8 pwHash
|
||||||
theSupervisor <- selectKeysList [UserSurname ==. "Jost", UserFirstName ==. "Steffen"] [Asc UserCreated, LimitTo 1]
|
theSupervisor <- selectKeysList [UserSurname ==. "Jost", UserFirstName ==. "Steffen"] [Asc UserCreated, LimitTo 1]
|
||||||
let addSupervisor = case theSupervisor of
|
let addSupervisor = case theSupervisor of
|
||||||
[s] -> \suid k -> case k of
|
[s] -> \suid k -> case k of
|
||||||
@ -83,15 +83,14 @@ fakeQualificationUsers (Entity qid Qualification{qualificationRefreshWithin}) (u
|
|||||||
fakeUser :: ([Text], UserSurname, (Maybe Languages, DateTimeFormat, DateTimeFormat, DateTimeFormat), Bool, Int) -> User
|
fakeUser :: ([Text], UserSurname, (Maybe Languages, DateTimeFormat, DateTimeFormat, DateTimeFormat), Bool, Int) -> User
|
||||||
fakeUser (firstNames, userSurname, (userLanguages, userDateTimeFormat, userDateFormat, userTimeFormat), userPrefersPostal, _isSupervised) =
|
fakeUser (firstNames, userSurname, (userLanguages, userDateTimeFormat, userDateFormat, userTimeFormat), userPrefersPostal, _isSupervised) =
|
||||||
let userIdent = CI.mk $ Text.intercalate "." (take 1 firstNames ++ (Text.take 1 <$> drop 1 firstNames) ++ [userSurname]) <> "@example.com"
|
let userIdent = CI.mk $ Text.intercalate "." (take 1 firstNames ++ (Text.take 1 <$> drop 1 firstNames) ++ [userSurname]) <> "@example.com"
|
||||||
|
userPasswordHash = Just pwSimple
|
||||||
|
userLastAuthentication = Nothing
|
||||||
userEmail = userIdent
|
userEmail = userIdent
|
||||||
userDisplayEmail = userIdent
|
userDisplayEmail = userIdent
|
||||||
userDisplayName = Text.unwords $ firstNames <> [userSurname]
|
userDisplayName = Text.unwords $ firstNames <> [userSurname]
|
||||||
userMatrikelnummer = Just "TESTUSER"
|
userMatrikelnummer = Just "TESTUSER"
|
||||||
userAuthentication = pwSimple
|
|
||||||
userLastAuthentication = Nothing
|
|
||||||
userCreated = now
|
userCreated = now
|
||||||
userLastLdapSynchronisation = Nothing
|
userLastSync = Just now
|
||||||
userLdapPrimaryKey = Nothing
|
|
||||||
userTokensIssuedAfter = Nothing
|
userTokensIssuedAfter = Nothing
|
||||||
userFirstName = Text.unwords firstNames
|
userFirstName = Text.unwords firstNames
|
||||||
userTitle = Nothing
|
userTitle = Nothing
|
||||||
|
|||||||
@ -584,6 +584,8 @@ makeProfileData :: Entity User -> DB Widget
|
|||||||
makeProfileData (Entity uid User{..}) = do
|
makeProfileData (Entity uid User{..}) = do
|
||||||
now <- liftIO getCurrentTime
|
now <- liftIO getCurrentTime
|
||||||
avsId <- entityVal <<$>> getBy (UniqueUserAvsUser uid)
|
avsId <- entityVal <<$>> getBy (UniqueUserAvsUser uid)
|
||||||
|
externalUsers <- (\(Entity _ ExternalUser{..}) -> (externalUserUser, externalUserSource, externalUserLastSync)) <<$>> selectList [ ExternalUserUser ==. userIdent ] []
|
||||||
|
|
||||||
-- avsCards <- maybe (pure mempty) (\a -> selectList [UserAvsCardPersonId ==. userAvsPersonId a] []) avsId
|
-- avsCards <- maybe (pure mempty) (\a -> selectList [UserAvsCardPersonId ==. userAvsPersonId a] []) avsId
|
||||||
functions <- Map.fromListWith Set.union . map (\(Entity _ UserFunction{..}) -> (userFunctionFunction, Set.singleton userFunctionSchool)) <$> selectList [UserFunctionUser ==. uid] []
|
functions <- Map.fromListWith Set.union . map (\(Entity _ UserFunction{..}) -> (userFunctionFunction, Set.singleton userFunctionSchool)) <$> selectList [UserFunctionUser ==. uid] []
|
||||||
lecture_corrector <- E.select $ E.distinct $ E.from $ \(sheet `E.InnerJoin` corrector `E.InnerJoin` course) -> do
|
lecture_corrector <- E.select $ E.distinct $ E.from $ \(sheet `E.InnerJoin` corrector `E.InnerJoin` course) -> do
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -17,11 +17,9 @@ import Handler.Utils.Csv
|
|||||||
import Handler.Utils.Profile
|
import Handler.Utils.Profile
|
||||||
|
|
||||||
import qualified Data.Text as Text (intercalate)
|
import qualified Data.Text as Text (intercalate)
|
||||||
-- import qualified Data.CaseInsensitive as CI
|
|
||||||
import qualified Data.Csv as Csv
|
import qualified Data.Csv as Csv
|
||||||
import Database.Esqueleto.Experimental ((:&)(..))
|
import Database.Esqueleto.Experimental ((:&)(..))
|
||||||
import qualified Database.Esqueleto.Experimental as E -- needs TypeApplications Lang-Pragma
|
import qualified Database.Esqueleto.Experimental as E -- needs TypeApplications Lang-Pragma
|
||||||
-- import qualified Database.Esqueleto.Legacy as E
|
|
||||||
import qualified Database.Esqueleto.PostgreSQL as E
|
import qualified Database.Esqueleto.PostgreSQL as E
|
||||||
import qualified Database.Esqueleto.Utils as E
|
import qualified Database.Esqueleto.Utils as E
|
||||||
|
|
||||||
@ -97,7 +95,15 @@ getQualificationSAPDirectR :: Handler TypedContent
|
|||||||
getQualificationSAPDirectR = do
|
getQualificationSAPDirectR = do
|
||||||
now <- liftIO getCurrentTime
|
now <- liftIO getCurrentTime
|
||||||
fdate <- formatTime' "%Y%m%d_%H-%M" now
|
fdate <- formatTime' "%Y%m%d_%H-%M" now
|
||||||
let ldap_cutoff = addDiffDaysRollOver (fromMonths $ -3) now
|
userAuthConf <- getsYesod $ view _appUserAuthConf
|
||||||
|
|
||||||
|
let
|
||||||
|
ldapSources = case userAuthConf of
|
||||||
|
UserAuthConfSingleSource (AuthSourceConfLdap LdapConf{..})
|
||||||
|
-> singleton $ AuthSourceIdLdap ldapConfSourceId
|
||||||
|
_other -> mempty
|
||||||
|
ldapCutoff = addDiffDaysRollOver (fromMonths $ -3) now
|
||||||
|
|
||||||
qualUsers <- runDB $ E.select $ do
|
qualUsers <- runDB $ E.select $ do
|
||||||
(qual :& qualUser :& user :& qualBlock) <-
|
(qual :& qualUser :& user :& qualBlock) <-
|
||||||
E.from $ E.table @Qualification
|
E.from $ E.table @Qualification
|
||||||
@ -111,9 +117,12 @@ getQualificationSAPDirectR = do
|
|||||||
E.&&. E.val now E.>~. qualBlock E.?. QualificationUserBlockFrom
|
E.&&. E.val now E.>~. qualBlock E.?. QualificationUserBlockFrom
|
||||||
)
|
)
|
||||||
E.where_ $ E.isJust (qual E.^. QualificationSapId)
|
E.where_ $ E.isJust (qual E.^. QualificationSapId)
|
||||||
E.&&. E.isJust (user E.^. UserCompanyPersonalNumber)
|
E.&&. E.isJust (user E.^. UserCompanyPersonalNumber)
|
||||||
E.&&. E.isJust (user E.^. UserLastLdapSynchronisation)
|
E.where_ . E.exists $ do
|
||||||
E.&&. (E.justVal ldap_cutoff E.<=. user E.^. UserLastLdapSynchronisation)
|
externalUser <- E.from $ E.table @ExternalUser
|
||||||
|
E.where_ $ externalUser E.^. ExternalUserUser E.==. user E.^. UserIdent
|
||||||
|
E.&&. externalUser E.^. ExternalUserSource `E.in_` E.valList ldapSources
|
||||||
|
E.&&. externalUser E.^. ExternalUserLastSync E.>=. E.val ldapCutoff
|
||||||
E.groupBy ( user E.^. UserCompanyPersonalNumber
|
E.groupBy ( user E.^. UserCompanyPersonalNumber
|
||||||
, qualUser E.^. QualificationUserFirstHeld
|
, qualUser E.^. QualificationUserFirstHeld
|
||||||
, qualUser E.^. QualificationUserValidUntil
|
, qualUser E.^. QualificationUserValidUntil
|
||||||
|
|||||||
31
src/Handler/SingleSignOut.hs
Normal file
31
src/Handler/SingleSignOut.hs
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2024 David Mosbach <david.mosbach@uniworx.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
module Handler.SingleSignOut
|
||||||
|
( getSOutR
|
||||||
|
, getSSOutR
|
||||||
|
) where
|
||||||
|
|
||||||
|
import Import
|
||||||
|
import Auth.OAuth2 (singleSignOut)
|
||||||
|
import qualified Network.Wai as W
|
||||||
|
|
||||||
|
|
||||||
|
getSOutR :: Handler Html
|
||||||
|
getSOutR = do
|
||||||
|
$logDebugS "\27[31mSOut\27[0m" "Redirect to LogoutR"
|
||||||
|
redirect $ AuthR LogoutR
|
||||||
|
|
||||||
|
getSSOutR :: Handler Html
|
||||||
|
getSSOutR = do
|
||||||
|
app <- getYesod
|
||||||
|
let redir = intercalate "/" . fst . renderRoute $ SOutR
|
||||||
|
root = case approot of
|
||||||
|
ApprootRequest f -> f app W.defaultRequest
|
||||||
|
_ -> error "approt implementation changed"
|
||||||
|
url = decodeUtf8 . urlEncode True . encodeUtf8 $ root <> "/" <> redir
|
||||||
|
AppSettings{..} <- getsYesod appSettings'
|
||||||
|
$logDebugS "\27[31mSSOut\27[0m" "Redirect to auth server"
|
||||||
|
if appSingleSignOn then singleSignOut (Just url) else redirect (AuthR LogoutR)
|
||||||
|
|
||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022-23 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -11,14 +11,11 @@ module Handler.Users
|
|||||||
import Import
|
import Import
|
||||||
|
|
||||||
import Jobs
|
import Jobs
|
||||||
-- import Data.Text
|
|
||||||
import Handler.Utils
|
import Handler.Utils
|
||||||
import Handler.Utils.Users
|
import Handler.Utils.Users
|
||||||
import Handler.Utils.Invitations
|
import Handler.Utils.Invitations
|
||||||
import Handler.Utils.Avs
|
import Handler.Utils.Avs
|
||||||
|
|
||||||
import qualified Auth.LDAP as Auth
|
|
||||||
|
|
||||||
import qualified Data.CaseInsensitive as CI
|
import qualified Data.CaseInsensitive as CI
|
||||||
|
|
||||||
import qualified Data.Set as Set
|
import qualified Data.Set as Set
|
||||||
@ -35,8 +32,6 @@ import qualified Data.ByteString.Base64 as Base64
|
|||||||
|
|
||||||
import Data.Aeson hiding (Result(..))
|
import Data.Aeson hiding (Result(..))
|
||||||
|
|
||||||
-- import Handler.Users.Add as Handler.Users
|
|
||||||
|
|
||||||
import qualified Data.Conduit.List as C
|
import qualified Data.Conduit.List as C
|
||||||
|
|
||||||
import qualified Data.HashSet as HashSet
|
import qualified Data.HashSet as HashSet
|
||||||
@ -130,8 +125,8 @@ postUsersR = do
|
|||||||
icnReroute = text2widget " " <> toWgt (icon IconLetter)
|
icnReroute = text2widget " " <> toWgt (icon IconLetter)
|
||||||
pure $ mconcat supervisors
|
pure $ mconcat supervisors
|
||||||
, sortable (Just "last-login") (i18nCell MsgLastLogin) $ \DBRow{ dbrOutput = Entity _ User{..} } -> maybe mempty dateTimeCell userLastAuthentication
|
, sortable (Just "last-login") (i18nCell MsgLastLogin) $ \DBRow{ dbrOutput = Entity _ User{..} } -> maybe mempty dateTimeCell userLastAuthentication
|
||||||
, sortable (Just "auth-ldap") (i18nCell MsgAuthMode) $ \DBRow{ dbrOutput = Entity _ User{..} } -> i18nCell userAuthentication
|
-- , sortable (Just "auth-ldap") (i18nCell MsgAuthMode) $ \DBRow{ dbrOutput = Entity _ User{..} } -> i18nCell userAuthentication -- TODO: reintroduce via ExternalUser
|
||||||
, sortable (Just "ldap-sync") (i18nCell MsgLdapSynced) $ \DBRow{ dbrOutput = Entity _ User{..} } -> maybe mempty dateTimeCell userLastLdapSynchronisation
|
-- , sortable (Just "ldap-sync") (i18nCell MsgLdapSynced) $ \DBRow{ dbrOutput = Entity _ User{..} } -> maybe mempty dateTimeCell userLastLdapSynchronisation -- TODO: reintroduce via ExternalUser
|
||||||
, flip foldMap universeF $ \function ->
|
, flip foldMap universeF $ \function ->
|
||||||
sortable (Just $ SortingKey $ CI.mk $ toPathPiece function) (i18nCell function) $ \DBRow{ dbrOutput = Entity uid _ } -> flip (set' cellContents) mempty $ do
|
sortable (Just $ SortingKey $ CI.mk $ toPathPiece function) (i18nCell function) $ \DBRow{ dbrOutput = Entity uid _ } -> flip (set' cellContents) mempty $ do
|
||||||
schools <- liftHandler . runDB . E.select . E.from $ \(school `E.InnerJoin` userFunction) -> do
|
schools <- liftHandler . runDB . E.select . E.from $ \(school `E.InnerJoin` userFunction) -> do
|
||||||
@ -226,15 +221,15 @@ postUsersR = do
|
|||||||
, ( "company-department"
|
, ( "company-department"
|
||||||
, SortColumn $ \user -> user E.^. UserCompanyDepartment
|
, SortColumn $ \user -> user E.^. UserCompanyDepartment
|
||||||
)
|
)
|
||||||
, ( "auth-ldap"
|
-- , ( "auth-ldap"
|
||||||
, SortColumn $ \user -> user E.^. UserAuthentication E.!=. E.val AuthLDAP
|
-- , SortColumn $ \user -> user E.^. UserAuthentication E.!=. E.val AuthLDAP
|
||||||
)
|
-- ) -- TODO: reintroduce via ExternalUser
|
||||||
, ( "last-login"
|
, ( "last-login"
|
||||||
, SortColumn $ \user -> user E.^. UserLastAuthentication
|
, SortColumn $ \user -> user E.^. UserLastAuthentication
|
||||||
)
|
)
|
||||||
, ( "ldap-sync"
|
-- , ( "ldap-sync"
|
||||||
, SortColumn $ \user -> user E.^. UserLastLdapSynchronisation
|
-- , SortColumn $ \user -> user E.^. UserLastLdapSynchronisation
|
||||||
)
|
-- ) -- TODO: reintroduce via ExternalUser
|
||||||
, ( "user-company"
|
, ( "user-company"
|
||||||
, SortColumn $ \user -> E.subSelect $ E.from $ \(usrComp `E.InnerJoin` comp) -> do
|
, SortColumn $ \user -> E.subSelect $ E.from $ \(usrComp `E.InnerJoin` comp) -> do
|
||||||
E.on $ usrComp E.^. UserCompanyCompany E.==. comp E.^. CompanyId
|
E.on $ usrComp E.^. UserCompanyCompany E.==. comp E.^. CompanyId
|
||||||
@ -276,24 +271,24 @@ postUsersR = do
|
|||||||
| Set.null criteria -> E.true -- TODO: why can this be eFalse and work still?
|
| Set.null criteria -> E.true -- TODO: why can this be eFalse and work still?
|
||||||
| otherwise -> E.any (\c -> user E.^. UserCompanyDepartment `E.hasInfix` E.val c) criteria
|
| otherwise -> E.any (\c -> user E.^. UserCompanyDepartment `E.hasInfix` E.val c) criteria
|
||||||
)
|
)
|
||||||
, ( "auth-ldap", FilterColumn $ \user (criterion :: Last Bool) -> if
|
-- , ( "auth-ldap", FilterColumn $ \user (criterion :: Last Bool) -> if
|
||||||
| Just crit <- getLast criterion
|
-- | Just crit <- getLast criterion
|
||||||
-> (user E.^. UserAuthentication E.==. E.val AuthLDAP) E.==. E.val crit
|
-- -> (user E.^. UserAuthentication E.==. E.val AuthLDAP) E.==. E.val crit
|
||||||
| otherwise
|
-- | otherwise
|
||||||
-> E.true
|
-- -> E.true
|
||||||
)
|
-- ) -- TODO: reintroduce via ExternalUser
|
||||||
, ( "school", FilterColumn $ \user criterion -> if
|
, ( "school", FilterColumn $ \user criterion -> if
|
||||||
| Set.null criterion -> E.val True :: E.SqlExpr (E.Value Bool)
|
| Set.null criterion -> E.val True :: E.SqlExpr (E.Value Bool)
|
||||||
| otherwise -> let schools = E.valList (Set.toList criterion) in
|
| otherwise -> let schools = E.valList (Set.toList criterion) in
|
||||||
E.exists . E.from $ \ufunc -> E.where_ $ ufunc E.^. UserFunctionUser E.==. user E.^. UserId
|
E.exists . E.from $ \ufunc -> E.where_ $ ufunc E.^. UserFunctionUser E.==. user E.^. UserId
|
||||||
E.&&. ufunc E.^. UserFunctionFunction `E.in_` schools
|
E.&&. ufunc E.^. UserFunctionFunction `E.in_` schools
|
||||||
)
|
)
|
||||||
, ( "ldap-sync", FilterColumn $ \user criteria -> if
|
-- , ( "ldap-sync", FilterColumn $ \user criteria -> if
|
||||||
| Just criteria' <- fromNullable criteria
|
-- | Just criteria' <- fromNullable criteria
|
||||||
-> let minTime = minimum (criteria' :: NonNull (Set UTCTime))
|
-- -> let minTime = minimum (criteria' :: NonNull (Set UTCTime))
|
||||||
in E.maybe E.true (E.<=. E.val minTime) $ user E.^. UserLastLdapSynchronisation
|
-- in E.maybe E.true (E.<=. E.val minTime) $ user E.^. UserLastLdapSynchronisation
|
||||||
| otherwise -> E.val True :: E.SqlExpr (E.Value Bool)
|
-- | otherwise -> E.val True :: E.SqlExpr (E.Value Bool)
|
||||||
)
|
-- ) -- TODO: reintroduce via ExternalUser
|
||||||
, ( "user-company", FilterColumn . E.mkExistsFilter $ \user criterion ->
|
, ( "user-company", FilterColumn . E.mkExistsFilter $ \user criterion ->
|
||||||
E.from $ \(usrComp `E.InnerJoin` comp) -> do
|
E.from $ \(usrComp `E.InnerJoin` comp) -> do
|
||||||
let testname = (E.val criterion :: E.SqlExpr (E.Value (CI Text))) `E.isInfixOf`
|
let testname = (E.val criterion :: E.SqlExpr (E.Value (CI Text))) `E.isInfixOf`
|
||||||
@ -335,8 +330,8 @@ postUsersR = do
|
|||||||
, prismAForm (singletonFilter "user-supervisor") mPrev $ aopt textField (fslI MsgTableSupervisor)
|
, prismAForm (singletonFilter "user-supervisor") mPrev $ aopt textField (fslI MsgTableSupervisor)
|
||||||
, prismAForm (singletonFilter "school") mPrev $ aopt (lift `hoistField` selectFieldList schoolOptions) (fslI MsgCourseSchool)
|
, prismAForm (singletonFilter "school") mPrev $ aopt (lift `hoistField` selectFieldList schoolOptions) (fslI MsgCourseSchool)
|
||||||
, prismAForm (singletonFilter "is-supervisor" . maybePrism _PathPiece) mPrev $ aopt (boolField . Just $ SomeMessage MsgBoolIrrelevant) (fslI MsgUserIsSupervisor)
|
, prismAForm (singletonFilter "is-supervisor" . maybePrism _PathPiece) mPrev $ aopt (boolField . Just $ SomeMessage MsgBoolIrrelevant) (fslI MsgUserIsSupervisor)
|
||||||
, prismAForm (singletonFilter "auth-ldap" . maybePrism _PathPiece) mPrev $ aopt (lift `hoistField` selectFieldList [(MsgAuthPWHash "", False), (MsgAuthLDAP, True)]) (fslI MsgAuthMode)
|
-- , prismAForm (singletonFilter "auth-ldap" . maybePrism _PathPiece) mPrev $ aopt (lift `hoistField` selectFieldList [(MsgAuthPWHash "", False), (MsgAuthLDAP, True)]) (fslI MsgAuthMode) -- TODO: reintroduce via ExternalUser
|
||||||
, prismAForm (singletonFilter "ldap-sync" . maybePrism _PathPiece) mPrev $ aopt utcTimeField (fslI MsgLdapSyncedBefore)
|
-- , prismAForm (singletonFilter "ldap-sync" . maybePrism _PathPiece) mPrev $ aopt utcTimeField (fslI MsgLdapSyncedBefore) -- TODO: reintroduce via ExternalUser
|
||||||
]
|
]
|
||||||
, dbtStyle = def { dbsFilterLayout = defaultDBSFilterLayout }
|
, dbtStyle = def { dbsFilterLayout = defaultDBSFilterLayout }
|
||||||
, dbtParams = DBParamsForm
|
, dbtParams = DBParamsForm
|
||||||
@ -364,8 +359,8 @@ postUsersR = do
|
|||||||
| Set.null usersSet && isNotSetSupervisor act ->
|
| Set.null usersSet && isNotSetSupervisor act ->
|
||||||
addMessageI Info MsgActionNoUsersSelected
|
addMessageI Info MsgActionNoUsersSelected
|
||||||
(UserLdapSyncData, userSet) -> do
|
(UserLdapSyncData, userSet) -> do
|
||||||
forM_ userSet $ \uid -> queueJob' $ JobSynchroniseLdapUser uid
|
forM_ userSet $ queueJob' . JobSynchroniseUser
|
||||||
addMessageI Success . MsgSynchroniseLdapUserQueued $ Set.size userSet
|
addMessageI Success . MsgSynchroniseUserdbUserQueued $ Set.size userSet
|
||||||
redirectKeepGetParams UsersR
|
redirectKeepGetParams UsersR
|
||||||
(UserAvsSyncData, userSet) -> do
|
(UserAvsSyncData, userSet) -> do
|
||||||
forM_ userSet $ \uid -> queueJob' $ JobSynchroniseAvsUser uid Nothing
|
forM_ userSet $ \uid -> queueJob' $ JobSynchroniseAvsUser uid Nothing
|
||||||
@ -400,8 +395,8 @@ postUsersR = do
|
|||||||
|
|
||||||
formResult allUsersRes $ \case
|
formResult allUsersRes $ \case
|
||||||
AllUsersLdapSync -> do
|
AllUsersLdapSync -> do
|
||||||
runDBJobs . runConduit $ selectSource [] [] .| C.mapM_ (queueDBJob . JobSynchroniseLdapUser . entityKey)
|
runDBJobs . runConduit $ selectSource [] [] .| C.mapM_ (queueDBJob . JobSynchroniseUser . entityKey)
|
||||||
addMessageI Success MsgSynchroniseLdapAllUsersQueued
|
addMessageI Success MsgSynchroniseUserdbAllUsersQueued
|
||||||
redirect UsersR
|
redirect UsersR
|
||||||
let allUsersWgt' = wrapForm allUsersWgt def
|
let allUsersWgt' = wrapForm allUsersWgt def
|
||||||
{ formSubmit = FormNoSubmit
|
{ formSubmit = FormNoSubmit
|
||||||
@ -506,7 +501,7 @@ postAdminUserR uuid = do
|
|||||||
return (result, $(widgetFile "widgets/user-rights-form/user-rights-form"))
|
return (result, $(widgetFile "widgets/user-rights-form/user-rights-form"))
|
||||||
userAuthenticationForm :: Form ButtonAuthMode
|
userAuthenticationForm :: Form ButtonAuthMode
|
||||||
userAuthenticationForm = buttonForm' $ if
|
userAuthenticationForm = buttonForm' $ if
|
||||||
| userAuthentication == AuthLDAP -> [BtnAuthPWHash]
|
| is _Nothing userPasswordHash -> [BtnAuthPWHash]
|
||||||
| otherwise -> [BtnAuthLDAP, BtnPasswordReset]
|
| otherwise -> [BtnAuthLDAP, BtnPasswordReset]
|
||||||
systemFunctionsForm' = funcForm systemFuncForm (fslI MsgUserSystemFunctions) False
|
systemFunctionsForm' = funcForm systemFuncForm (fslI MsgUserSystemFunctions) False
|
||||||
where systemFuncForm func = apopt checkBoxField (fslI func) . Just $ systemFunctions func
|
where systemFuncForm func = apopt checkBoxField (fslI func) . Just $ systemFunctions func
|
||||||
@ -532,33 +527,41 @@ postAdminUserR uuid = do
|
|||||||
redirect $ AdminUserR uuid
|
redirect $ AdminUserR uuid
|
||||||
|
|
||||||
userAuthenticationAction = \case
|
userAuthenticationAction = \case
|
||||||
BtnAuthLDAP -> do
|
BtnAuthLDAP -> do -- TODO: Reformulate messages and constructors to "remove pw hash" or "external login only"
|
||||||
let
|
-- let
|
||||||
campusHandler :: MonadPlus m => Auth.CampusUserException -> m a
|
-- ldapHandler :: MonadPlus m => Auth.LdapUserException -> m a
|
||||||
campusHandler _ = mzero
|
-- ldapHandler _ = mzero
|
||||||
campusResult <- runMaybeT . handle campusHandler $ do
|
-- ldapResult <- runMaybeT . handle ldapHandler $ do
|
||||||
Just pool <- getsYesod $ view _appLdapPool
|
-- Just pool <- getsYesod $ view _appLdapPool
|
||||||
void . lift . Auth.campusUser pool FailoverUnlimited $ Creds Auth.apLdap (CI.original userIdent) []
|
-- void . lift . Auth.ldapUser pool $ Creds Auth.apLdap (CI.original userIdent) []
|
||||||
case campusResult of
|
-- case ldapResult of
|
||||||
Nothing -> addMessageI Error MsgAuthLDAPInvalidLookup
|
-- Nothing -> addMessageI Error MsgAuthLDAPInvalidLookup
|
||||||
_other
|
-- _other
|
||||||
| is _AuthLDAP userAuthentication
|
-- | is _AuthLDAP userAuthentication
|
||||||
-> addMessageI Info MsgAuthLDAPAlreadyConfigured
|
-- -> addMessageI Info MsgAuthLDAPAlreadyConfigured
|
||||||
Just () -> do
|
-- Just () -> do
|
||||||
runDBJobs $ do
|
-- runDBJobs $ do
|
||||||
update uid [ UserAuthentication =. AuthLDAP ]
|
-- update uid [ UserAuthentication =. AuthLDAP ]
|
||||||
queueDBJob . JobQueueNotification $ NotificationUserAuthModeUpdate uid
|
-- queueDBJob . JobQueueNotification $ NotificationUserAuthModeUpdate uid
|
||||||
|
|
||||||
|
-- addMessageI Success MsgAuthLDAPConfigured
|
||||||
|
-- TODO: check current auth sources and warn if user cannot login using any source
|
||||||
|
case userPasswordHash of
|
||||||
|
Nothing -> addMessageI Error MsgAuthLDAPAlreadyConfigured
|
||||||
|
Just _ -> do
|
||||||
|
runDBJobs $ do
|
||||||
|
update uid [ UserPasswordHash =. Nothing ]
|
||||||
|
queueDBJob . JobQueueNotification $ NotificationUserAuthModeUpdate uid
|
||||||
addMessageI Success MsgAuthLDAPConfigured
|
addMessageI Success MsgAuthLDAPConfigured
|
||||||
redirect $ AdminUserR uuid
|
redirect $ AdminUserR uuid
|
||||||
BtnAuthPWHash -> do
|
BtnAuthPWHash -> do
|
||||||
if
|
if
|
||||||
| is _AuthPWHash userAuthentication
|
| is _Just userPasswordHash
|
||||||
-> addMessageI Info MsgAuthPWHashAlreadyConfigured
|
-> addMessageI Info MsgAuthPWHashAlreadyConfigured
|
||||||
| otherwise
|
| otherwise
|
||||||
-> do
|
-> do
|
||||||
runDBJobs $ do
|
runDBJobs $ do
|
||||||
update uid [ UserAuthentication =. AuthPWHash "" ]
|
update uid [ UserPasswordHash =. Just "" ]
|
||||||
queueDBJob . JobQueueNotification $ NotificationUserAuthModeUpdate uid
|
queueDBJob . JobQueueNotification $ NotificationUserAuthModeUpdate uid
|
||||||
queueDBJob $ JobSendPasswordReset uid
|
queueDBJob $ JobSendPasswordReset uid
|
||||||
|
|
||||||
@ -718,18 +721,18 @@ postUserPasswordR cID = do
|
|||||||
isAdmin <- hasWriteAccessTo $ AdminUserR cID
|
isAdmin <- hasWriteAccessTo $ AdminUserR cID
|
||||||
|
|
||||||
requireCurrent <- maybeT (return True) $ asum
|
requireCurrent <- maybeT (return True) $ asum
|
||||||
[ False <$ guard (isn't _AuthPWHash userAuthentication)
|
[ False <$ guard (isn't _Just userPasswordHash)
|
||||||
, False <$ guard isAdmin
|
, False <$ guard isAdmin
|
||||||
, do
|
, do
|
||||||
authMode <- Base64.decodeLenient . encodeUtf8 <$> MaybeT maybeCurrentBearerRestrictions
|
authMode <- Base64.decodeLenient . encodeUtf8 <$> MaybeT maybeCurrentBearerRestrictions
|
||||||
unless (authMode `constEq` computeUserAuthenticationDigest userAuthentication) . lift $
|
unless (authMode `constEq` computeUserAuthenticationDigest userPasswordHash) . lift $
|
||||||
invalidArgsI [MsgUnauthorizedPasswordResetToken]
|
invalidArgsI [MsgUnauthorizedPasswordResetToken]
|
||||||
return False
|
return False
|
||||||
]
|
]
|
||||||
|
|
||||||
((passResult, passFormWidget), passEnctype) <- runFormPost . formEmbedBearerPost . renderAForm FormStandard . wFormToAForm $ do
|
((passResult, passFormWidget), passEnctype) <- runFormPost . formEmbedBearerPost . renderAForm FormStandard . wFormToAForm $ do
|
||||||
currentResult <- if
|
currentResult <- if
|
||||||
| AuthPWHash (encodeUtf8 -> pwHash) <- userAuthentication
|
| Just (encodeUtf8 -> pwHash) <- userPasswordHash
|
||||||
, requireCurrent
|
, requireCurrent
|
||||||
-> wreq
|
-> wreq
|
||||||
(checkMap (bool (Left MsgCurrentPasswordInvalid) (Right ()) . flip (PWStore.verifyPasswordWith pwHashAlgorithm (2^)) pwHash . encodeUtf8) (const "") passwordField)
|
(checkMap (bool (Left MsgCurrentPasswordInvalid) (Right ()) . flip (PWStore.verifyPasswordWith pwHashAlgorithm (2^)) pwHash . encodeUtf8) (const "") passwordField)
|
||||||
@ -746,7 +749,7 @@ postUserPasswordR cID = do
|
|||||||
|
|
||||||
formResultModal passResult (bool ProfileR (UserPasswordR cID) isAdmin) $ \newPass -> do
|
formResultModal passResult (bool ProfileR (UserPasswordR cID) isAdmin) $ \newPass -> do
|
||||||
newHash <- fmap decodeUtf8 . liftIO $ PWStore.makePasswordWith pwHashAlgorithm newPass pwHashStrength
|
newHash <- fmap decodeUtf8 . liftIO $ PWStore.makePasswordWith pwHashAlgorithm newPass pwHashStrength
|
||||||
liftHandler . runDB $ update tUid [ UserAuthentication =. AuthPWHash newHash ]
|
liftHandler . runDB $ update tUid [ UserPasswordHash =. Just newHash ]
|
||||||
tell . pure =<< messageI Success MsgPasswordChangedSuccess
|
tell . pure =<< messageI Success MsgPasswordChangedSuccess
|
||||||
|
|
||||||
siteLayout [whamlet|_{MsgUserPasswordHeadingFor} ^{userEmailWidget usr}|] $
|
siteLayout [whamlet|_{MsgUserPasswordHeadingFor} ^{userEmailWidget usr}|] $
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022-2023 Gregor Kleen <gregor@kleen.consulting>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor@kleen.consulting>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -35,20 +35,18 @@ adminUserForm template = renderAForm FormStandard
|
|||||||
<*> aopt (textField & cfStrip) (fslI MsgAdminUserPinPassword) (audPinPassword <$> template)
|
<*> aopt (textField & cfStrip) (fslI MsgAdminUserPinPassword) (audPinPassword <$> template)
|
||||||
<*> areq (emailField & cfCI) (fslI MsgAdminUserEmail) (audEmail <$> template)
|
<*> areq (emailField & cfCI) (fslI MsgAdminUserEmail) (audEmail <$> template)
|
||||||
<*> areq (textField & cfStrip & cfCI) (fslI MsgAdminUserIdent) (audIdent <$> template)
|
<*> areq (textField & cfStrip & cfCI) (fslI MsgAdminUserIdent) (audIdent <$> template)
|
||||||
<*> areq (selectField optionsFinite) (fslI MsgAdminUserAuth & setTooltip MsgAdminUserAuthTooltip) (audAuth <$> template <|> Just AuthKindLDAP)
|
<*> aopt passwordField (fslI MsgAdminUserPassword) (audPassword <$> template)
|
||||||
|
|
||||||
-- | Like `addNewUser`, but starts background jobs and tries to notify users, if applicable (i.e. /= AuthNoLogin )
|
-- | Like `addNewUser`, but starts background jobs and tries to notify users
|
||||||
addNewUserNotify :: AddUserData -> Handler (Maybe UserId)
|
addNewUserNotify :: AddUserData -> Handler (Maybe UserId)
|
||||||
addNewUserNotify aud = do
|
addNewUserNotify aud = do
|
||||||
mbUid <- addNewUser aud
|
mbUid <- addNewUser aud
|
||||||
case mbUid of
|
case mbUid of
|
||||||
Nothing -> return Nothing
|
Nothing -> return Nothing
|
||||||
Just uid -> runDBJobs $ do
|
Just uid -> runDBJobs $ do
|
||||||
queueDBJob $ JobSynchroniseLdapUser uid
|
queueDBJob $ JobSynchroniseUser uid
|
||||||
let authKind = audAuth aud
|
when (is _Just $ audPassword aud) $ do
|
||||||
when (authKind /= AuthKindNoLogin) $
|
|
||||||
queueDBJob . JobQueueNotification $ NotificationUserAuthModeUpdate uid
|
queueDBJob . JobQueueNotification $ NotificationUserAuthModeUpdate uid
|
||||||
when (authKind == AuthKindPWHash) $
|
|
||||||
queueDBJob $ JobSendPasswordReset uid
|
queueDBJob $ JobSendPasswordReset uid
|
||||||
return $ Just uid
|
return $ Just uid
|
||||||
|
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022-23 Steffen Jost <s.jost@fraport.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Steffen Jost <s.jost@fraport.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -35,8 +35,7 @@ import qualified Data.Set as Set
|
|||||||
import qualified Data.Map as Map
|
import qualified Data.Map as Map
|
||||||
import qualified Data.Text as Text
|
import qualified Data.Text as Text
|
||||||
import qualified Data.CaseInsensitive as CI
|
import qualified Data.CaseInsensitive as CI
|
||||||
-- import Auth.LDAP (ldapUserPrincipalName)
|
import Foundation.Yesod.Auth (userLookupAndUpsert)
|
||||||
import Foundation.Yesod.Auth (ldapLookupAndUpsert) -- , CampusUserConversionException())
|
|
||||||
|
|
||||||
import Handler.Utils.Company
|
import Handler.Utils.Company
|
||||||
import Handler.Utils.Qualification
|
import Handler.Utils.Qualification
|
||||||
@ -79,7 +78,7 @@ instance Exception AvsException
|
|||||||
Connect AVS query to LDAP queries for automatic synchronisation:
|
Connect AVS query to LDAP queries for automatic synchronisation:
|
||||||
- add query to Auth.LDAP.campusUserMatr
|
- add query to Auth.LDAP.campusUserMatr
|
||||||
- add query to Auth.LDAP.campusLogin
|
- add query to Auth.LDAP.campusLogin
|
||||||
- jobs.Handler.dispatchJobSynchroniseLdap
|
- jobs.Handler.dispatchJobSynchroniseUserdb
|
||||||
|
|
||||||
-}
|
-}
|
||||||
|
|
||||||
@ -355,12 +354,12 @@ guessAvsUser someid = do
|
|||||||
[Entity uid _] -> return $ Just uid
|
[Entity uid _] -> return $ Just uid
|
||||||
_ -> return Nothing
|
_ -> return Nothing
|
||||||
uid -> return uid
|
uid -> return uid
|
||||||
Nothing -> try (runDB $ ldapLookupAndUpsert someid) >>= \case
|
Nothing -> try (runDB $ userLookupAndUpsert someid UpsertUserGuessUser) >>= \case
|
||||||
Right Entity{entityKey=uid, entityVal=User{userCompanyPersonalNumber=Just persNo}} ->
|
Right (Just Entity{entityKey=uid, entityVal=User{userCompanyPersonalNumber=Just persNo}}) ->
|
||||||
maybeM (return $ Just uid) (return . Just) (maybeUpsertAvsUserByCard (Right $ mkAvsInternalPersonalNo persNo))
|
maybeM (return $ Just uid) (return . Just) (maybeUpsertAvsUserByCard (Right $ mkAvsInternalPersonalNo persNo))
|
||||||
Right Entity{entityKey=uid} -> return $ Just uid
|
Right (Just Entity{entityKey=uid}) -> return $ Just uid
|
||||||
other -> do -- attempt to recover by trying other ids
|
other -> do -- attempt to recover by trying other ids
|
||||||
whenIsLeft other (\(err::SomeException) -> $logInfoS "AVS" $ "upsertAvsUser LDAP error " <> tshow err) -- this line primarily forces exception type to catch-all
|
whenIsLeft other (\(err::SomeException) -> $logInfoS "AVS" $ "upsertAvsUser external error " <> tshow err) -- this line primarily forces exception type to catch-all
|
||||||
runDB . runMaybeT $
|
runDB . runMaybeT $
|
||||||
let someIdent = stripCI someid
|
let someIdent = stripCI someid
|
||||||
in MaybeT (getKeyBy $ UniqueEmail someIdent)
|
in MaybeT (getKeyBy $ UniqueEmail someIdent)
|
||||||
@ -370,8 +369,8 @@ guessAvsUser someid = do
|
|||||||
upsertAvsUser :: Text -> Handler (Maybe UserId) -- TODO: change to Entity
|
upsertAvsUser :: Text -> Handler (Maybe UserId) -- TODO: change to Entity
|
||||||
upsertAvsUser (discernAvsCardPersonalNo -> Just someid) = maybeCatchAll $ upsertAvsUserByCard someid -- Note: Right case is any number; it could be AvsCardNumber or AvsInternalPersonalNumber; we cannot know, but the latter is much more likely and useful to users!
|
upsertAvsUser (discernAvsCardPersonalNo -> Just someid) = maybeCatchAll $ upsertAvsUserByCard someid -- Note: Right case is any number; it could be AvsCardNumber or AvsInternalPersonalNumber; we cannot know, but the latter is much more likely and useful to users!
|
||||||
upsertAvsUser otherId = -- attempt LDAP lookup to find by eMail
|
upsertAvsUser otherId = -- attempt LDAP lookup to find by eMail
|
||||||
try (runDB $ ldapLookupAndUpsert otherId) >>= \case
|
try (runDB $ userLookupAndUpsert otherId UpsertUserGuessUser) >>= \case
|
||||||
Right Entity{entityVal=User{userCompanyPersonalNumber=Just persNo}} -> maybeCatchAll $ upsertAvsUserByCard (Right $ mkAvsInternalPersonalNo persNo)
|
Right (Just Entity{entityVal=User{userCompanyPersonalNumber=Just persNo}}) -> maybeCatchAll $ upsertAvsUserByCard (Right $ mkAvsInternalPersonalNo persNo)
|
||||||
other -> do -- attempt to recover by trying other ids
|
other -> do -- attempt to recover by trying other ids
|
||||||
whenIsLeft other (\(err::SomeException) -> $logInfoS "AVS" $ "upsertAvsUser LDAP error " <> tshow err) -- this line primarily forces exception type to catch-all
|
whenIsLeft other (\(err::SomeException) -> $logInfoS "AVS" $ "upsertAvsUser LDAP error " <> tshow err) -- this line primarily forces exception type to catch-all
|
||||||
apid <- runDB . runMaybeT $ do
|
apid <- runDB . runMaybeT $ do
|
||||||
@ -420,13 +419,16 @@ upsertAvsUserById api = do
|
|||||||
[uid] -> $logInfoS "AVS" "Matching user found, linking." >> insertUniqueEntity (UserAvs api uid avsPersonPersonNo now Nothing)
|
[uid] -> $logInfoS "AVS" "Matching user found, linking." >> insertUniqueEntity (UserAvs api uid avsPersonPersonNo now Nothing)
|
||||||
(_:_) -> throwM $ AvsUserAmbiguous api
|
(_:_) -> throwM $ AvsUserAmbiguous api
|
||||||
[] -> do
|
[] -> do
|
||||||
upsRes :: Either SomeException (Entity User)
|
upsRes :: Either SomeException (Maybe (Entity User))
|
||||||
<- try $ ldapLookupAndUpsert persNo
|
<- try $ userLookupAndUpsert persNo UpsertUserGuessUser -- TODO: do azure lookup and upsert if appropriate
|
||||||
$logInfoS "AVS" $ "No matching existing user found. Attempted LDAP upsert returned: " <> tshow upsRes
|
$logInfoS "AVS" $ "No matching existing user found. Attempted LDAP upsert returned: " <> tshow upsRes
|
||||||
case upsRes of
|
case upsRes of
|
||||||
Right Entity{entityKey=uid} -> insertUniqueEntity $ UserAvs api uid avsPersonPersonNo now Nothing -- pin/addr are updated in next step anyway
|
Right (Just Entity{entityKey=uid}) -> insertUniqueEntity $ UserAvs api uid avsPersonPersonNo now Nothing -- pin/addr are updated in next step anyway
|
||||||
|
Right Nothing -> do
|
||||||
|
$logWarnS "AVS" $ "AVS user with avsInternalPersonalNo " <> tshow persNo <> " not found in external databases"
|
||||||
|
return mbuid -- == Nothing -- user could not be created somehow
|
||||||
Left err -> do
|
Left err -> do
|
||||||
$logWarnS "AVS" $ "AVS user with avsInternalPersonalNo " <> tshow persNo <> " not found in LDAP: " <> tshow err
|
$logWarnS "AVS" $ "AVS user with avsInternalPersonalNo " <> tshow persNo <> " not found in external databases: " <> tshow err
|
||||||
return mbuid -- == Nothing -- user could not be created somehow
|
return mbuid -- == Nothing -- user could not be created somehow
|
||||||
(Just Entity{ entityKey = uaid }, _) -> do
|
(Just Entity{ entityKey = uaid }, _) -> do
|
||||||
update uaid [ UserAvsLastSynch =. now, UserAvsLastSynchError =. Nothing ] -- mark as updated early, to prevent failed users to clog the synch
|
update uaid [ UserAvsLastSynch =. now, UserAvsLastSynchError =. Nothing ] -- mark as updated early, to prevent failed users to clog the synch
|
||||||
@ -460,9 +462,10 @@ upsertAvsUserById api = do
|
|||||||
, audPinPassword = userPin
|
, audPinPassword = userPin
|
||||||
, audEmail = fakeNo -- Email is unknown in this version of the avs query, to be updated later (FUTURE TODO)
|
, audEmail = fakeNo -- Email is unknown in this version of the avs query, to be updated later (FUTURE TODO)
|
||||||
, audIdent = fakeIdent -- use AvsPersonId instead
|
, audIdent = fakeIdent -- use AvsPersonId instead
|
||||||
, audAuth = maybe AuthKindNoLogin (const AuthKindLDAP) avsPersonInternalPersonalNo -- FUTURE TODO: if email is known, use AuthKinfPWHash for email invite, if no internal personnel number is known
|
, audPassword = Nothing
|
||||||
|
--, audAuth = maybe AuthKindNoLogin (const AuthKindAzure) avsPersonInternalPersonalNo -- FUTURE TODO: if email is known, use AuthKinfPWHash for email invite, if no internal personnel number is known
|
||||||
}
|
}
|
||||||
mbUid <- addNewUser newUsr -- triggers JobSynchroniseLdapUser, JobSendPasswordReset and NotificationUserAutoModeUpdate -- TODO: check if these are failsafe
|
mbUid <- addNewUser newUsr -- triggers JobSynchroniseUserdbUser, JobSendPasswordReset and NotificationUserAutoModeUpdate -- TODO: check if these are failsafe
|
||||||
whenIsJust mbUid $ \uid -> runDB $ do
|
whenIsJust mbUid $ \uid -> runDB $ do
|
||||||
insert_ $ UserAvs avsPersonPersonID uid avsPersonPersonNo now Nothing
|
insert_ $ UserAvs avsPersonPersonID uid avsPersonPersonNo now Nothing
|
||||||
forM_ avsPersonPersonCards $ -- save all cards for later comparisons whether an update occurred
|
forM_ avsPersonPersonCards $ -- save all cards for later comparisons whether an update occurred
|
||||||
|
|||||||
@ -115,7 +115,7 @@ csvFilenameLmsReport = makeLmsFilename "report"
|
|||||||
makeLmsFilename :: MonadHandler m => Text -> QualificationShorthand -> m Text
|
makeLmsFilename :: MonadHandler m => Text -> QualificationShorthand -> m Text
|
||||||
makeLmsFilename ftag (citext2lower -> qsh) = do
|
makeLmsFilename ftag (citext2lower -> qsh) = do
|
||||||
ymth <- getYMTH
|
ymth <- getYMTH
|
||||||
return $ "fradrive_" <> qsh <> "_" <> ftag <> "_" <> ymth <> ".csv"
|
return $ "fradrive_" <> "test" <> "_" <> qsh <> "_" <> ftag <> "_" <> ymth <> ".csv"
|
||||||
|
|
||||||
-- | Return current datetime in YYYYMMDDHH format
|
-- | Return current datetime in YYYYMMDDHH format
|
||||||
getYMTH :: MonadHandler m => m Text
|
getYMTH :: MonadHandler m => m Text
|
||||||
@ -203,8 +203,8 @@ randomText extra n = fmap pack . evalRandTIO . replicateM n $ uniform range
|
|||||||
-- eopt = Elo.genOptions -- { genCapitals = False, genSpecials = False, genDigitis = True }
|
-- eopt = Elo.genOptions -- { genCapitals = False, genSpecials = False, genDigitis = True }
|
||||||
|
|
||||||
randomLMSIdent :: MonadIO m => Maybe Char -> m LmsIdent
|
randomLMSIdent :: MonadIO m => Maybe Char -> m LmsIdent
|
||||||
randomLMSIdent Nothing = LmsIdent . Text.cons 'j' <$> randomText [] (pred lengthIdent) -- idents must not contain '_' nor '-'
|
randomLMSIdent Nothing = LmsIdent . Text.cons 't' . Text.cons 'j' <$> randomText [] (pred $ pred lengthIdent) -- idents must not contain '_' nor '-'
|
||||||
randomLMSIdent (Just c) = LmsIdent . Text.cons c <$> randomText [] (pred lengthIdent)
|
randomLMSIdent (Just c) = LmsIdent . Text.cons 't' . Text.cons c <$> randomText [] (pred $ pred lengthIdent)
|
||||||
|
|
||||||
randomLMSIdentBut :: MonadIO m => Maybe Char -> Set LmsIdent -> m (Maybe LmsIdent)
|
randomLMSIdentBut :: MonadIO m => Maybe Char -> Set LmsIdent -> m (Maybe LmsIdent)
|
||||||
randomLMSIdentBut prefix banList = untilJustMaxM maxLmsUserIdentRetries getIdentOk
|
randomLMSIdentBut prefix banList = untilJustMaxM maxLmsUserIdentRetries getIdentOk
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022-23 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Steffen Jost <s.jost@fraport.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Steffen Jost <s.jost@fraport.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -24,8 +24,7 @@ module Handler.Utils.Users
|
|||||||
) where
|
) where
|
||||||
|
|
||||||
import Import
|
import Import
|
||||||
import Auth.LDAP (campusUserMatr')
|
import Foundation.Yesod.Auth (userLookupAndUpsert)
|
||||||
import Foundation.Yesod.Auth (upsertCampusUser)
|
|
||||||
|
|
||||||
import Crypto.Hash (hashlazy)
|
import Crypto.Hash (hashlazy)
|
||||||
|
|
||||||
@ -37,7 +36,6 @@ import qualified Data.Aeson as JSON
|
|||||||
import qualified Data.Aeson.Types as JSON
|
import qualified Data.Aeson.Types as JSON
|
||||||
|
|
||||||
import qualified Data.Set as Set
|
import qualified Data.Set as Set
|
||||||
-- import qualified Data.List as List
|
|
||||||
import qualified Data.CaseInsensitive as CI
|
import qualified Data.CaseInsensitive as CI
|
||||||
|
|
||||||
import Database.Esqueleto.Experimental ((:&)(..))
|
import Database.Esqueleto.Experimental ((:&)(..))
|
||||||
@ -131,15 +129,13 @@ getSupervisees = do
|
|||||||
return $ Set.insert uid $ Set.fromAscList svs
|
return $ Set.insert uid $ Set.fromAscList svs
|
||||||
|
|
||||||
|
|
||||||
computeUserAuthenticationDigest :: AuthenticationMode -> Digest SHA3_256
|
computeUserAuthenticationDigest :: Maybe Text -> Digest SHA3_256
|
||||||
computeUserAuthenticationDigest = hashlazy . JSON.encode
|
computeUserAuthenticationDigest = hashlazy . JSON.encode
|
||||||
|
|
||||||
|
|
||||||
data GuessUserInfo
|
data GuessUserInfo
|
||||||
= GuessUserMatrikelnummer
|
= GuessUserMatrikelnummer
|
||||||
{ guessUserMatrikelnummer :: UserMatriculation }
|
{ guessUserMatrikelnummer :: UserMatriculation }
|
||||||
| GuessUserEduPersonPrincipalName
|
|
||||||
{ guessUserEduPersonPrincipalName :: UserEduPersonPrincipalName }
|
|
||||||
| GuessUserDisplayName
|
| GuessUserDisplayName
|
||||||
{ guessUserDisplayName :: UserDisplayName }
|
{ guessUserDisplayName :: UserDisplayName }
|
||||||
| GuessUserSurname
|
| GuessUserSurname
|
||||||
@ -191,12 +187,11 @@ guessUser (((Set.toList . toNullable) <$>) . Set.toList . dnfTerms -> criteria)
|
|||||||
|
|
||||||
toSql user pl = bool id E.not__ (is _PLNegated pl) $ case pl ^. _plVar of
|
toSql user pl = bool id E.not__ (is _PLNegated pl) $ case pl ^. _plVar of
|
||||||
GuessUserMatrikelnummer userMatriculation' -> user E.^. UserMatrikelnummer E.==. E.val (Just userMatriculation')
|
GuessUserMatrikelnummer userMatriculation' -> user E.^. UserMatrikelnummer E.==. E.val (Just userMatriculation')
|
||||||
GuessUserEduPersonPrincipalName userEPPN' -> user E.^. UserLdapPrimaryKey E.==. E.val (Just userEPPN')
|
|
||||||
GuessUserDisplayName userDisplayName' -> user E.^. UserDisplayName `containsAsSet` userDisplayName'
|
GuessUserDisplayName userDisplayName' -> user E.^. UserDisplayName `containsAsSet` userDisplayName'
|
||||||
GuessUserSurname userSurname' -> user E.^. UserSurname `containsAsSet` userSurname'
|
GuessUserSurname userSurname' -> user E.^. UserSurname `containsAsSet` userSurname'
|
||||||
GuessUserFirstName userFirstName' -> user E.^. UserFirstName `containsAsSet` userFirstName'
|
GuessUserFirstName userFirstName' -> user E.^. UserFirstName `containsAsSet` userFirstName'
|
||||||
|
|
||||||
go didLdap = do
|
go didUpsert = do
|
||||||
let retrieveUsers = E.select . EL.from $ \user -> do
|
let retrieveUsers = E.select . EL.from $ \user -> do
|
||||||
E.where_ . E.or $ map (E.and . map (toSql user)) criteria
|
E.where_ . E.or $ map (E.and . map (toSql user)) criteria
|
||||||
when (is _Just mQueryLimit) $ (E.limit . fromJust) mQueryLimit
|
when (is _Just mQueryLimit) $ (E.limit . fromJust) mQueryLimit
|
||||||
@ -238,11 +233,7 @@ guessUser (((Set.toList . toNullable) <$>) . Set.toList . dnfTerms -> criteria)
|
|||||||
| EQ <- x `closeness` x' = x : takeClosest (x':xs)
|
| EQ <- x `closeness` x' = x : takeClosest (x':xs)
|
||||||
| otherwise = [x]
|
| otherwise = [x]
|
||||||
|
|
||||||
doLdap userMatr = do
|
doUpsert = flip userLookupAndUpsert UpsertUserGuessUser
|
||||||
ldapPool' <- getsYesod $ view _appLdapPool
|
|
||||||
fmap join . for ldapPool' $ \ldapPool -> do
|
|
||||||
ldapData <- campusUserMatr' ldapPool FailoverUnlimited userMatr
|
|
||||||
for ldapData $ upsertCampusUser UpsertCampusUserGuessUser
|
|
||||||
|
|
||||||
let
|
let
|
||||||
getTermMatr :: [PredLiteral GuessUserInfo] -> Maybe UserMatriculation
|
getTermMatr :: [PredLiteral GuessUserInfo] -> Maybe UserMatriculation
|
||||||
@ -258,25 +249,25 @@ guessUser (((Set.toList . toNullable) <$>) . Set.toList . dnfTerms -> criteria)
|
|||||||
| otherwise = Nothing
|
| otherwise = Nothing
|
||||||
getTermMatrAux acc (_:xs) = getTermMatrAux acc xs
|
getTermMatrAux acc (_:xs) = getTermMatrAux acc xs
|
||||||
|
|
||||||
convertLdapResults :: [Entity User] -> Maybe (Either (NonEmpty (Entity User)) (Entity User))
|
convertUpsertResults :: [Entity User] -> Maybe (Either (NonEmpty (Entity User)) (Entity User))
|
||||||
convertLdapResults [] = Nothing
|
convertUpsertResults [] = Nothing
|
||||||
convertLdapResults [x] = Just $ Right x
|
convertUpsertResults [x] = Just $ Right x
|
||||||
convertLdapResults xs = Just $ Left $ NonEmpty.fromList xs
|
convertUpsertResults xs = Just $ Left $ NonEmpty.fromList xs
|
||||||
|
|
||||||
if
|
if
|
||||||
| [x] <- users'
|
| [x] <- users'
|
||||||
, Just True == matchesMatriculation x || didLdap
|
, Just True == matchesMatriculation x || didUpsert
|
||||||
-> return $ Just $ Right x
|
-> return $ Just $ Right x
|
||||||
| x : x' : _ <- users'
|
| x : x' : _ <- users'
|
||||||
, Just True == matchesMatriculation x || didLdap
|
, Just True == matchesMatriculation x || didUpsert
|
||||||
, GT <- x `closeness` x'
|
, GT <- x `closeness` x'
|
||||||
-> return $ Just $ Right x
|
-> return $ Just $ Right x
|
||||||
| xs@(x:_:_) <- takeClosest users'
|
| xs@(x:_:_) <- takeClosest users'
|
||||||
, Just True == matchesMatriculation x || didLdap
|
, Just True == matchesMatriculation x || didUpsert
|
||||||
-> return $ Just $ Left $ NonEmpty.fromList xs
|
-> return $ Just $ Left $ NonEmpty.fromList xs
|
||||||
| not didLdap
|
| not didUpsert
|
||||||
, userMatrs <- (Set.toList . Set.fromList . catMaybes) $ getTermMatr <$> criteria
|
, userMatrs <- (Set.toList . Set.fromList . catMaybes) $ getTermMatr <$> criteria
|
||||||
-> mapM doLdap userMatrs >>= maybe (go True) (return . Just) . convertLdapResults . catMaybes
|
-> mapM doUpsert userMatrs >>= maybe (go True) (return . Just) . convertUpsertResults . catMaybes
|
||||||
| otherwise
|
| otherwise
|
||||||
-> return Nothing
|
-> return Nothing
|
||||||
|
|
||||||
@ -912,8 +903,7 @@ assimilateUser newUserId oldUserId = mapReaderT execWriterT $ do
|
|||||||
mergeMaybe = mergeBy (\oldV newV -> isNothing newV && isJust oldV)
|
mergeMaybe = mergeBy (\oldV newV -> isNothing newV && isJust oldV)
|
||||||
|
|
||||||
update newUserId $ catMaybes -- NOTE: persist does shortcircuit null updates as expected
|
update newUserId $ catMaybes -- NOTE: persist does shortcircuit null updates as expected
|
||||||
[ mergeMaybe UserLdapPrimaryKey
|
[ mergeMaybe UserPasswordHash
|
||||||
, mergeBy (<) UserAuthentication
|
|
||||||
, mergeBy (>) UserLastAuthentication
|
, mergeBy (>) UserLastAuthentication
|
||||||
, mergeBy (<) UserCreated
|
, mergeBy (<) UserCreated
|
||||||
, toMaybe (not (validEmail' (newUser ^. _userEmail )) && validEmail' (oldUser ^. _userEmail))
|
, toMaybe (not (validEmail' (newUser ^. _userEmail )) && validEmail' (oldUser ^. _userEmail))
|
||||||
|
|||||||
@ -252,6 +252,7 @@ import Data.Encoding.UTF8 as Import (UTF8(UTF8))
|
|||||||
|
|
||||||
import GHC.TypeLits as Import (KnownSymbol)
|
import GHC.TypeLits as Import (KnownSymbol)
|
||||||
|
|
||||||
|
import Data.Word as Import (Word16)
|
||||||
import Data.Word.Word24 as Import
|
import Data.Word.Word24 as Import
|
||||||
|
|
||||||
import Data.Kind as Import (Type, Constraint)
|
import Data.Kind as Import (Type, Constraint)
|
||||||
|
|||||||
@ -71,7 +71,7 @@ import Jobs.Handler.SendCourseCommunication
|
|||||||
import Jobs.Handler.Invitation
|
import Jobs.Handler.Invitation
|
||||||
import Jobs.Handler.SendPasswordReset
|
import Jobs.Handler.SendPasswordReset
|
||||||
import Jobs.Handler.TransactionLog
|
import Jobs.Handler.TransactionLog
|
||||||
import Jobs.Handler.SynchroniseLdap
|
import Jobs.Handler.SynchroniseUser
|
||||||
import Jobs.Handler.SynchroniseAvs
|
import Jobs.Handler.SynchroniseAvs
|
||||||
import Jobs.Handler.PruneInvitations
|
import Jobs.Handler.PruneInvitations
|
||||||
import Jobs.Handler.ChangeUserDisplayEmail
|
import Jobs.Handler.ChangeUserDisplayEmail
|
||||||
@ -493,7 +493,7 @@ handleJobs' wNum = C.mapM_ $ \jctl -> hoist delimitInternalState . withJobWorker
|
|||||||
, Exc.Handler $ \case
|
, Exc.Handler $ \case
|
||||||
MailNotAvailable -> return $ Right ()
|
MailNotAvailable -> return $ Right ()
|
||||||
e -> return . Left $ SomeException e
|
e -> return . Left $ SomeException e
|
||||||
, Exc.Handler $ \SynchroniseLdapNoLdap -> return $ Right ()
|
, Exc.Handler $ \SynchroniseUserNoSource -> return $ Right ()
|
||||||
#endif
|
#endif
|
||||||
, Exc.Handler $ \(e :: SomeException) -> return $ Left e
|
, Exc.Handler $ \(e :: SomeException) -> return $ Left e
|
||||||
] . fmap Right
|
] . fmap Right
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022-2023 Sarah Vaupel <sarah.vaupel@uniworx.de>, David Mosbach <david.mosbach@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, David Mosbach <david.mosbach@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -310,15 +310,14 @@ determineCrontab = execWriterT $ do
|
|||||||
return (nextEpoch, nextInterval, nextIntervalTime, numIntervals)
|
return (nextEpoch, nextInterval, nextIntervalTime, numIntervals)
|
||||||
|
|
||||||
if
|
if
|
||||||
| is _Just appLdapConf
|
| Just syncWithin <- appUserSyncWithin
|
||||||
, Just syncWithin <- appSynchroniseLdapUsersWithin
|
, Just cInterval <- appJobCronInterval
|
||||||
, Just cInterval <- appJobCronInterval
|
|
||||||
-> do
|
-> do
|
||||||
nextIntervals <- getNextIntervals syncWithin appSynchroniseLdapUsersInterval cInterval
|
nextIntervals <- getNextIntervals syncWithin appUserSyncInterval cInterval
|
||||||
|
|
||||||
forM_ nextIntervals $ \(nextEpoch, nextInterval, nextIntervalTime, numIntervals) -> do
|
forM_ nextIntervals $ \(nextEpoch, nextInterval, nextIntervalTime, numIntervals) -> do
|
||||||
tell $ HashMap.singleton
|
tell $ HashMap.singleton
|
||||||
(JobCtlQueue JobSynchroniseLdap
|
(JobCtlQueue JobSynchroniseUsers
|
||||||
{ jEpoch = fromInteger nextEpoch
|
{ jEpoch = fromInteger nextEpoch
|
||||||
, jNumIterations = fromInteger numIntervals
|
, jNumIterations = fromInteger numIntervals
|
||||||
, jIteration = fromInteger nextInterval
|
, jIteration = fromInteger nextInterval
|
||||||
@ -326,8 +325,8 @@ determineCrontab = execWriterT $ do
|
|||||||
Cron
|
Cron
|
||||||
{ cronInitial = CronTimestamp $ utcToLocalTimeTZ appTZ $ toTimeOfDay 23 30 0 $ utctDay nextIntervalTime
|
{ cronInitial = CronTimestamp $ utcToLocalTimeTZ appTZ $ toTimeOfDay 23 30 0 $ utctDay nextIntervalTime
|
||||||
, cronRepeat = CronRepeatNever
|
, cronRepeat = CronRepeatNever
|
||||||
, cronRateLimit = appSynchroniseLdapUsersInterval
|
, cronRateLimit = appUserSyncInterval
|
||||||
, cronNotAfter = Right . CronTimestamp . utcToLocalTimeTZ appTZ $ addUTCTime appSynchroniseLdapUsersInterval nextIntervalTime
|
, cronNotAfter = Right . CronTimestamp . utcToLocalTimeTZ appTZ $ addUTCTime appUserSyncInterval nextIntervalTime
|
||||||
}
|
}
|
||||||
| otherwise
|
| otherwise
|
||||||
-> return ()
|
-> return ()
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -36,7 +36,7 @@ dispatchJobSendPasswordReset jRecipient = JobHandlerException . userMailT jRecip
|
|||||||
|
|
||||||
resetBearer' <- bearerToken (HashSet.singleton $ Right jRecipient) Nothing (HashMap.singleton BearerTokenRouteEval . HashSet.singleton $ UserPasswordR cID) Nothing (Just $ Just tomorrowEndOfDay) Nothing
|
resetBearer' <- bearerToken (HashSet.singleton $ Right jRecipient) Nothing (HashMap.singleton BearerTokenRouteEval . HashSet.singleton $ UserPasswordR cID) Nothing (Just $ Just tomorrowEndOfDay) Nothing
|
||||||
let resetBearer = resetBearer'
|
let resetBearer = resetBearer'
|
||||||
& bearerRestrict (UserPasswordR cID) (decodeUtf8 . Base64.encode . BA.convert $ computeUserAuthenticationDigest userAuthentication)
|
& bearerRestrict (UserPasswordR cID) (decodeUtf8 . Base64.encode . BA.convert $ computeUserAuthenticationDigest userPasswordHash)
|
||||||
encodedBearer <- encodeBearer resetBearer
|
encodedBearer <- encodeBearer resetBearer
|
||||||
|
|
||||||
resetUrl <- toTextUrl (UserPasswordR cID, [(toPathPiece GetBearer, toPathPiece encodedBearer)])
|
resetUrl <- toTextUrl (UserPasswordR cID, [(toPathPiece GetBearer, toPathPiece encodedBearer)])
|
||||||
|
|||||||
@ -1,64 +0,0 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
|
||||||
--
|
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
|
||||||
|
|
||||||
module Jobs.Handler.SynchroniseLdap
|
|
||||||
( dispatchJobSynchroniseLdap, dispatchJobSynchroniseLdapUser
|
|
||||||
, SynchroniseLdapException(..)
|
|
||||||
) where
|
|
||||||
|
|
||||||
import Import
|
|
||||||
|
|
||||||
import qualified Data.CaseInsensitive as CI
|
|
||||||
import qualified Data.Conduit.List as C
|
|
||||||
|
|
||||||
import Auth.LDAP
|
|
||||||
import Foundation.Yesod.Auth (CampusUserConversionException, upsertCampusUser)
|
|
||||||
|
|
||||||
import Jobs.Queue
|
|
||||||
|
|
||||||
|
|
||||||
data SynchroniseLdapException
|
|
||||||
= SynchroniseLdapNoLdap
|
|
||||||
deriving (Eq, Ord, Enum, Bounded, Read, Show, Generic)
|
|
||||||
instance Exception SynchroniseLdapException
|
|
||||||
|
|
||||||
dispatchJobSynchroniseLdap :: Natural -> Natural -> Natural -> JobHandler UniWorX
|
|
||||||
dispatchJobSynchroniseLdap numIterations epoch iteration
|
|
||||||
= JobHandlerAtomic . runConduit $
|
|
||||||
readUsers .| filterIteration .| sinkDBJobs
|
|
||||||
where
|
|
||||||
readUsers :: ConduitT () UserId (YesodJobDB UniWorX) ()
|
|
||||||
readUsers = selectKeys [] []
|
|
||||||
|
|
||||||
filterIteration :: ConduitT UserId Job (YesodJobDB UniWorX) ()
|
|
||||||
filterIteration = C.mapMaybeM $ \userId -> runMaybeT $ do
|
|
||||||
let
|
|
||||||
userIteration, currentIteration :: Integer
|
|
||||||
userIteration = toInteger (hash epoch `hashWithSalt` userId) `mod` toInteger numIterations
|
|
||||||
currentIteration = toInteger iteration `mod` toInteger numIterations
|
|
||||||
$logDebugS "SynchroniseLdap" [st|User ##{tshow (fromSqlKey userId)}: sync on #{tshow userIteration}/#{tshow numIterations}, now #{tshow currentIteration}|]
|
|
||||||
guard $ userIteration == currentIteration
|
|
||||||
|
|
||||||
return $ JobSynchroniseLdapUser userId
|
|
||||||
|
|
||||||
dispatchJobSynchroniseLdapUser :: UserId -> JobHandler UniWorX
|
|
||||||
dispatchJobSynchroniseLdapUser jUser = JobHandlerException $ do
|
|
||||||
UniWorX{..} <- getYesod
|
|
||||||
case appLdapPool of
|
|
||||||
Just ldapPool ->
|
|
||||||
runDB . void . runMaybeT . handleExc $ do
|
|
||||||
user@User{userIdent,userLdapPrimaryKey} <- MaybeT $ get jUser
|
|
||||||
let upsertIdent = maybe userIdent CI.mk userLdapPrimaryKey
|
|
||||||
$logInfoS "SynchroniseLdap" [st|Synchronising #{upsertIdent}|]
|
|
||||||
|
|
||||||
reTestAfter <- getsYesod $ view _appLdapReTestFailover
|
|
||||||
ldapAttrs <- MaybeT $ campusUserReTest' ldapPool ((>= reTestAfter) . realToFrac) FailoverUnlimited user
|
|
||||||
void . lift $ upsertCampusUser (UpsertCampusUserLdapSync upsertIdent) ldapAttrs
|
|
||||||
Nothing ->
|
|
||||||
throwM SynchroniseLdapNoLdap
|
|
||||||
where
|
|
||||||
handleExc :: MaybeT DB a -> MaybeT DB a
|
|
||||||
handleExc
|
|
||||||
= catchMPlus (Proxy @CampusUserException)
|
|
||||||
. catchMPlus (Proxy @CampusUserConversionException)
|
|
||||||
48
src/Jobs/Handler/SynchroniseUser.hs
Normal file
48
src/Jobs/Handler/SynchroniseUser.hs
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
module Jobs.Handler.SynchroniseUser
|
||||||
|
( dispatchJobSynchroniseUsers, dispatchJobSynchroniseUser
|
||||||
|
, SynchroniseUserException(..)
|
||||||
|
) where
|
||||||
|
|
||||||
|
import Import
|
||||||
|
|
||||||
|
import Foundation.Yesod.Auth (userLookupAndUpsert)
|
||||||
|
|
||||||
|
import qualified Data.CaseInsensitive as CI
|
||||||
|
import qualified Data.Conduit.List as C
|
||||||
|
|
||||||
|
import Jobs.Queue
|
||||||
|
|
||||||
|
|
||||||
|
data SynchroniseUserException
|
||||||
|
= SynchroniseUserNoSource
|
||||||
|
deriving (Eq, Ord, Enum, Bounded, Read, Show, Generic)
|
||||||
|
instance Exception SynchroniseUserException
|
||||||
|
|
||||||
|
dispatchJobSynchroniseUsers :: Natural -> Natural -> Natural -> JobHandler UniWorX
|
||||||
|
dispatchJobSynchroniseUsers numIterations epoch iteration
|
||||||
|
= JobHandlerAtomic . runConduit $
|
||||||
|
readUsers .| filterIteration .| sinkDBJobs
|
||||||
|
where
|
||||||
|
readUsers :: ConduitT () UserId (YesodJobDB UniWorX) ()
|
||||||
|
readUsers = selectKeys [] []
|
||||||
|
|
||||||
|
filterIteration :: ConduitT UserId Job (YesodJobDB UniWorX) ()
|
||||||
|
filterIteration = C.mapMaybeM $ \userId -> runMaybeT $ do
|
||||||
|
let
|
||||||
|
userIteration, currentIteration :: Integer
|
||||||
|
userIteration = toInteger (hash epoch `hashWithSalt` userId) `mod` toInteger numIterations
|
||||||
|
currentIteration = toInteger iteration `mod` toInteger numIterations
|
||||||
|
$logDebugS "SynchroniseUsers" [st|User ##{tshow (fromSqlKey userId)}: sync on #{tshow userIteration}/#{tshow numIterations}, now #{tshow currentIteration}|]
|
||||||
|
guard $ userIteration == currentIteration
|
||||||
|
|
||||||
|
return $ JobSynchroniseUser userId
|
||||||
|
|
||||||
|
dispatchJobSynchroniseUser :: UserId -> JobHandler UniWorX
|
||||||
|
dispatchJobSynchroniseUser jUser = JobHandlerException . runDB $ do
|
||||||
|
User{userIdent = upsertUserIdent} <- getJust jUser
|
||||||
|
$logInfoS "SynchroniseUser" [st|Synchronising #{upsertUserIdent} with external sources|]
|
||||||
|
void $ userLookupAndUpsert (CI.original upsertUserIdent) UpsertUserSync{..}
|
||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -107,23 +107,31 @@ dispatchHealthCheckHTTPReachable = fmap HealthHTTPReachable . yesodTimeout (^. _
|
|||||||
getsYesod $ (== clusterId) . appClusterID
|
getsYesod $ (== clusterId) . appClusterID
|
||||||
|
|
||||||
|
|
||||||
|
-- TODO: generalize health check
|
||||||
dispatchHealthCheckLDAPAdmins :: Handler HealthReport
|
dispatchHealthCheckLDAPAdmins :: Handler HealthReport
|
||||||
dispatchHealthCheckLDAPAdmins = fmap HealthLDAPAdmins . yesodTimeout (^. _appHealthCheckLDAPAdminsTimeout) (Just 0) $ do
|
dispatchHealthCheckLDAPAdmins = fmap HealthLDAPAdmins . yesodTimeout (^. _appHealthCheckLDAPAdminsTimeout) (Just 0) $ do
|
||||||
ldapPool' <- getsYesod appLdapPool
|
ldapPool' <- getsYesod appLdapPool
|
||||||
reTestAfter <- getsYesod $ view _appLdapReTestFailover
|
userAuthConf <- getsYesod $ view _appUserAuthConf
|
||||||
case ldapPool' of
|
case ldapPool' of
|
||||||
Just ldapPool -> do
|
Just ldapPool -> do
|
||||||
|
let currentLdapSources = case userAuthConf of
|
||||||
|
UserAuthConfSingleSource (AuthSourceConfLdap LdapConf{..})
|
||||||
|
-> singleton $ AuthSourceIdLdap ldapConfSourceId
|
||||||
|
_other -> mempty
|
||||||
ldapAdminUsers' <- fmap (map E.unValue) . runDB . E.select . E.from $ \(user `E.InnerJoin` userFunction) -> E.distinctOnOrderBy [E.asc $ user E.^. UserId] $ do
|
ldapAdminUsers' <- fmap (map E.unValue) . runDB . E.select . E.from $ \(user `E.InnerJoin` userFunction) -> E.distinctOnOrderBy [E.asc $ user E.^. UserId] $ do
|
||||||
E.on $ user E.^. UserId E.==. userFunction E.^. UserFunctionUser
|
E.on $ user E.^. UserId E.==. userFunction E.^. UserFunctionUser
|
||||||
E.where_ $ userFunction E.^. UserFunctionFunction E.==. E.val SchoolAdmin
|
E.where_ $ userFunction E.^. UserFunctionFunction E.==. E.val SchoolAdmin
|
||||||
E.where_ $ user E.^. UserAuthentication E.==. E.val AuthLDAP
|
E.where_ . E.exists . E.from $ \externalUser -> E.where_ $
|
||||||
|
externalUser E.^. ExternalUserUser E.==. user E.^. UserIdent
|
||||||
|
E.&&. externalUser E.^. ExternalUserSource `E.in_` E.valList currentLdapSources
|
||||||
return $ user E.^. UserIdent
|
return $ user E.^. UserIdent
|
||||||
for (assertM' (not . null) ldapAdminUsers') $ \ldapAdminUsers -> do
|
for (assertM' (not . null) ldapAdminUsers') $ \ldapAdminUsers -> do
|
||||||
let numAdmins = genericLength ldapAdminUsers
|
let numAdmins = genericLength ldapAdminUsers
|
||||||
Sum numResolved <- fmap fold . forM ldapAdminUsers $ \(CI.original -> adminIdent) ->
|
Sum numResolved <- fmap fold . forM ldapAdminUsers $ \(CI.original -> adminIdent) ->
|
||||||
let hCampusExc :: CampusUserException -> Handler (Sum Integer)
|
let hLdapExc :: LdapUserException -> Handler (Sum Integer)
|
||||||
hCampusExc err = mempty <$ $logErrorS "healthCheckLDAPAdmins" (adminIdent <> ": " <> tshow err)
|
hLdapExc err = mempty <$ $logErrorS "healthCheckLDAPAdmins" (adminIdent <> ": " <> tshow err)
|
||||||
in handle hCampusExc $ Sum 1 <$ campusUserReTest ldapPool ((>= reTestAfter) . realToFrac) FailoverUnlimited (Creds apLdap adminIdent [])
|
in handle hLdapExc $ Sum 1 <$ ldapUser ldapPool (Creds apLdap adminIdent [])
|
||||||
|
--in handle hLdapExc $ Sum 1 <$ ldapUserReTest ldapPool (const True) FailoverUnlimited (Creds apLdap adminIdent [])
|
||||||
if
|
if
|
||||||
| numAdmins >= 1 -> return $ numResolved % numAdmins
|
| numAdmins >= 1 -> return $ numResolved % numAdmins
|
||||||
| otherwise -> return 0
|
| otherwise -> return 0
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022-24 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <s.jost@fraport.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <s.jost@fraport.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -92,11 +92,11 @@ data Job
|
|||||||
| JobTruncateTransactionLog
|
| JobTruncateTransactionLog
|
||||||
| JobPruneInvitations
|
| JobPruneInvitations
|
||||||
| JobDeleteTransactionLogIPs
|
| JobDeleteTransactionLogIPs
|
||||||
| JobSynchroniseLdap { jNumIterations
|
| JobSynchroniseUsers { jNumIterations
|
||||||
, jEpoch
|
, jEpoch
|
||||||
, jIteration :: Natural
|
, jIteration :: Natural
|
||||||
}
|
}
|
||||||
| JobSynchroniseLdapUser { jUser :: UserId }
|
| JobSynchroniseUser { jUser :: UserId }
|
||||||
| JobSynchroniseAvs { jNumIterations
|
| JobSynchroniseAvs { jNumIterations
|
||||||
, jEpoch
|
, jEpoch
|
||||||
, jIteration :: Natural
|
, jIteration :: Natural
|
||||||
@ -348,8 +348,8 @@ jobNoQueueSame = \case
|
|||||||
JobTruncateTransactionLog{} -> Just JobNoQueueSame
|
JobTruncateTransactionLog{} -> Just JobNoQueueSame
|
||||||
JobPruneInvitations{} -> Just JobNoQueueSame
|
JobPruneInvitations{} -> Just JobNoQueueSame
|
||||||
JobDeleteTransactionLogIPs{} -> Just JobNoQueueSame
|
JobDeleteTransactionLogIPs{} -> Just JobNoQueueSame
|
||||||
JobSynchroniseLdap{} -> Just JobNoQueueSame
|
JobSynchroniseUsers{} -> Just JobNoQueueSame
|
||||||
JobSynchroniseLdapUser{} -> Just JobNoQueueSame
|
JobSynchroniseUser{} -> Just JobNoQueueSame
|
||||||
JobSynchroniseAvs{} -> Just JobNoQueueSame
|
JobSynchroniseAvs{} -> Just JobNoQueueSame
|
||||||
JobSynchroniseAvsUser{} -> Just JobNoQueueSame
|
JobSynchroniseAvsUser{} -> Just JobNoQueueSame
|
||||||
JobSynchroniseAvsId{} -> Just JobNoQueueSame
|
JobSynchroniseAvsId{} -> Just JobNoQueueSame
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -9,7 +9,53 @@ module Ldap.Client.Instances
|
|||||||
) where
|
) where
|
||||||
|
|
||||||
import ClassyPrelude
|
import ClassyPrelude
|
||||||
|
|
||||||
|
import Data.Aeson.TH
|
||||||
|
import Data.Data (Data)
|
||||||
|
|
||||||
|
import Database.Persist.TH (derivePersistField)
|
||||||
|
|
||||||
|
import Utils.PathPiece (derivePathPiece)
|
||||||
|
|
||||||
import Ldap.Client
|
import Ldap.Client
|
||||||
|
|
||||||
|
import Network.HTTP.Types.Method.Instances () -- for FromJSON instance for ByteString
|
||||||
|
|
||||||
|
|
||||||
|
deriving instance Ord Attr
|
||||||
|
deriving instance Ord Dn
|
||||||
|
deriving instance Ord Password
|
||||||
deriving instance Ord ResultCode
|
deriving instance Ord ResultCode
|
||||||
|
deriving instance Ord Scope
|
||||||
|
|
||||||
|
deriving instance Read Attr
|
||||||
|
deriving instance Read Dn
|
||||||
|
deriving instance Read Password
|
||||||
|
deriving instance Read Scope
|
||||||
|
|
||||||
|
deriving instance Data Attr
|
||||||
|
deriving instance Data Dn
|
||||||
|
deriving instance Data Password
|
||||||
|
deriving instance Data Scope
|
||||||
|
|
||||||
|
deriving instance Generic Attr
|
||||||
|
deriving instance Generic Dn
|
||||||
|
deriving instance Generic Password
|
||||||
|
deriving instance Generic Scope
|
||||||
|
|
||||||
|
deriving anyclass instance NFData Attr
|
||||||
|
deriving anyclass instance NFData Dn
|
||||||
|
deriving anyclass instance NFData Password
|
||||||
|
deriving instance NFData Scope
|
||||||
|
|
||||||
|
derivePathPiece ''Dn id "--"
|
||||||
|
derivePathPiece ''Scope id "--"
|
||||||
|
|
||||||
|
derivePersistField "Dn"
|
||||||
|
derivePersistField "Password"
|
||||||
|
derivePersistField "Scope"
|
||||||
|
|
||||||
|
deriveJSON defaultOptions ''Attr
|
||||||
|
deriveJSON defaultOptions ''Dn
|
||||||
|
deriveJSON defaultOptions ''Scope
|
||||||
|
deriveJSON defaultOptions ''SearchEntry
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
|||||||
100
src/Middleware.hs
Normal file
100
src/Middleware.hs
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
module Middleware
|
||||||
|
( makeMiddleware
|
||||||
|
) where
|
||||||
|
|
||||||
|
import Import
|
||||||
|
|
||||||
|
import Handler.Utils.Routes (classifyHandler)
|
||||||
|
|
||||||
|
import qualified Data.HashMap.Strict as HashMap
|
||||||
|
|
||||||
|
import Network.HTTP.Types.Header (hSetCookie)
|
||||||
|
import Network.Wai (Middleware)
|
||||||
|
import qualified Network.Wai as Wai
|
||||||
|
import Network.Wai.Middleware.Cors (CorsResourcePolicy(..), cors)
|
||||||
|
import Network.Wai.Middleware.RequestLogger ( Destination(Logger)
|
||||||
|
, IPAddrSource(..)
|
||||||
|
, OutputFormat(..)
|
||||||
|
, mkRequestLogger, outputFormat, destination
|
||||||
|
)
|
||||||
|
|
||||||
|
import Web.Cookie
|
||||||
|
|
||||||
|
|
||||||
|
makeMiddleware :: MonadIO m => UniWorX -> m Middleware
|
||||||
|
makeMiddleware app = do
|
||||||
|
logWare <- makeLogWare app
|
||||||
|
return $ observeHTTPRequestLatency classifyHandler . logWare . normalizeCookiesWare . corsWare . defaultMiddlewaresNoLogging
|
||||||
|
|
||||||
|
|
||||||
|
makeLogWare :: MonadIO m => UniWorX -> m Middleware
|
||||||
|
makeLogWare app = do
|
||||||
|
logWareMap <- liftIO $ newTVarIO HashMap.empty
|
||||||
|
|
||||||
|
let
|
||||||
|
mkLogWare ls@LogSettings{..} = do
|
||||||
|
logger <- readTVarIO . snd $ appLogger app
|
||||||
|
logWare <- mkRequestLogger def
|
||||||
|
{ outputFormat = bool
|
||||||
|
(Apache . bool FromSocket FromHeader $ app ^. _appIpFromHeader)
|
||||||
|
(Detailed True)
|
||||||
|
logDetailed
|
||||||
|
, destination = Logger $ loggerSet logger
|
||||||
|
}
|
||||||
|
atomically . modifyTVar' logWareMap $ HashMap.insert ls logWare
|
||||||
|
return logWare
|
||||||
|
|
||||||
|
void. liftIO $
|
||||||
|
mkLogWare =<< readTVarIO (appLogSettings app)
|
||||||
|
|
||||||
|
return $ \wai req fin -> do
|
||||||
|
lookupRes <- atomically $ do
|
||||||
|
ls <- readTVar $ appLogSettings app
|
||||||
|
existing <- HashMap.lookup ls <$> readTVar logWareMap
|
||||||
|
return $ maybe (Left ls) Right existing
|
||||||
|
logWare <- either mkLogWare return lookupRes
|
||||||
|
logWare wai req fin
|
||||||
|
|
||||||
|
|
||||||
|
normalizeCookiesWare :: Middleware
|
||||||
|
normalizeCookiesWare waiApp req res = waiApp req $ \res' -> do
|
||||||
|
resHdrs' <- go $ Wai.responseHeaders res'
|
||||||
|
res $ Wai.mapResponseHeaders (const resHdrs') res'
|
||||||
|
where parseSetCookie' :: ByteString -> IO (Maybe SetCookie)
|
||||||
|
parseSetCookie' = fmap (either (\(_ :: SomeException) -> Nothing) Just) . try . evaluate . force . parseSetCookie
|
||||||
|
|
||||||
|
go [] = return []
|
||||||
|
go (hdr@(hdrName, hdrValue) : hdrs)
|
||||||
|
| hdrName == hSetCookie = do
|
||||||
|
mcookieHdr <- parseSetCookie' hdrValue
|
||||||
|
case mcookieHdr of
|
||||||
|
Nothing -> (hdr :) <$> go hdrs
|
||||||
|
Just cookieHdr -> do
|
||||||
|
let cookieHdrMatches hdrValue' = maybeT (return False) $ do
|
||||||
|
cookieHdr' <- MaybeT $ parseSetCookie' hdrValue'
|
||||||
|
-- See https://tools.ietf.org/html/rfc6265
|
||||||
|
guard $ setCookiePath cookieHdr' == setCookiePath cookieHdr
|
||||||
|
guard $ setCookieName cookieHdr' == setCookieName cookieHdr
|
||||||
|
guard $ setCookieDomain cookieHdr' == setCookieDomain cookieHdr
|
||||||
|
return True
|
||||||
|
others <- filterM (\(hdrName', hdrValue') -> and2M (pure $ hdrName' == hSetCookie) (cookieHdrMatches hdrValue')) hdrs
|
||||||
|
if | null others -> (hdr :) <$> go hdrs
|
||||||
|
| otherwise -> go hdrs
|
||||||
|
| otherwise = (hdr :) <$> go hdrs
|
||||||
|
|
||||||
|
|
||||||
|
corsWare :: Middleware
|
||||||
|
corsWare = cors . const $ Just CorsResourcePolicy
|
||||||
|
{ corsOrigins = Nothing
|
||||||
|
, corsMethods = [ "GET", "HEAD", "POST" ]
|
||||||
|
, corsRequestHeaders = []
|
||||||
|
, corsExposedHeaders = Nothing
|
||||||
|
, corsMaxAge = Just 600
|
||||||
|
, corsVaryOrigin = True
|
||||||
|
, corsRequireOrigin = False
|
||||||
|
, corsIgnoreFailures = False
|
||||||
|
}
|
||||||
@ -50,6 +50,7 @@ data ManualMigration
|
|||||||
= Migration20230524QualificationUserBlock
|
= Migration20230524QualificationUserBlock
|
||||||
| Migration20230703LmsUserStatus
|
| Migration20230703LmsUserStatus
|
||||||
| Migration20240212InitInterfaceHealth -- create table interface_health and fill with default values
|
| Migration20240212InitInterfaceHealth -- create table interface_health and fill with default values
|
||||||
|
| Migration20240312OAuth2
|
||||||
deriving (Eq, Ord, Read, Show, Enum, Bounded, Generic)
|
deriving (Eq, Ord, Read, Show, Enum, Bounded, Generic)
|
||||||
deriving anyclass (Universe, Finite)
|
deriving anyclass (Universe, Finite)
|
||||||
|
|
||||||
@ -81,7 +82,7 @@ migrateManual = do
|
|||||||
, ("user_lower_ident", "CREATE INDEX user_lower_ident ON \"user\" (lower(ident))" )
|
, ("user_lower_ident", "CREATE INDEX user_lower_ident ON \"user\" (lower(ident))" )
|
||||||
, ("submission_sheet", "CREATE INDEX submission_sheet ON submission (sheet)" )
|
, ("submission_sheet", "CREATE INDEX submission_sheet ON submission (sheet)" )
|
||||||
, ("submission_edit_submission", "CREATE INDEX submission_edit_submission ON submission_edit (submission)" )
|
, ("submission_edit_submission", "CREATE INDEX submission_edit_submission ON submission_edit (submission)" )
|
||||||
, ("user_ldap_primary_key", "CREATE INDEX user_ldap_primary_key ON \"user\" (ldap_primary_key)" )
|
-- , ("user_ldap_primary_key", "CREATE INDEX user_ldap_primary_key ON \"user\" (ldap_primary_key)" ) -- TODO: reintroduce
|
||||||
, ("file_content_entry_chunk_hash", "CREATE INDEX file_content_entry_chunk_hash ON \"file_content_entry\" (chunk_hash)" )
|
, ("file_content_entry_chunk_hash", "CREATE INDEX file_content_entry_chunk_hash ON \"file_content_entry\" (chunk_hash)" )
|
||||||
, ("sent_mail_bounce_secret", "CREATE INDEX sent_mail_bounce_secret ON \"sent_mail\" (bounce_secret) WHERE bounce_secret IS NOT NULL")
|
, ("sent_mail_bounce_secret", "CREATE INDEX sent_mail_bounce_secret ON \"sent_mail\" (bounce_secret) WHERE bounce_secret IS NOT NULL")
|
||||||
, ("sent_mail_recipient", "CREATE INDEX sent_mail_recipient ON \"sent_mail\" (recipient) WHERE recipient IS NOT NULL")
|
, ("sent_mail_recipient", "CREATE INDEX sent_mail_recipient ON \"sent_mail\" (recipient) WHERE recipient IS NOT NULL")
|
||||||
@ -197,6 +198,23 @@ customMigrations = mapF $ \case
|
|||||||
ON CONFLICT DO NOTHING;
|
ON CONFLICT DO NOTHING;
|
||||||
|]
|
|]
|
||||||
|
|
||||||
|
Migration20240312OAuth2 -> whenM (andM [ columnNotExists "user" "password_hash", columnExists "user" "authentication", columnExists "user" "last_ldap_synchronisation", columnNotExists "user" "last_sync", columnExists "user" "ldap_primary_key" ]) $ do
|
||||||
|
[executeQQ|
|
||||||
|
ALTER TABLE "user" ADD COLUMN "password_hash" VARCHAR NULL;
|
||||||
|
|]
|
||||||
|
let getPWHashes = [queryQQ| SELECT "id", "authentication"->'pw-hash' FROM "user" WHERE "authentication"->'pw-hash' IS NOT NULL; |]
|
||||||
|
migratePWHash [ fromPersistValue -> Right (uid :: UserId), fromPersistValue -> Right (pwHash :: Text) ] = [executeQQ| UPDATE "user" SET "password_hash" = #{pwHash} WHERE "id" = #{uid}; |]
|
||||||
|
migratePWHash _ = return ()
|
||||||
|
in runConduit $ getPWHashes .| C.mapM_ migratePWHash
|
||||||
|
[executeQQ|
|
||||||
|
ALTER TABLE "user" DROP COLUMN "authentication";
|
||||||
|
|]
|
||||||
|
|
||||||
|
[executeQQ|
|
||||||
|
ALTER TABLE "user" RENAME COLUMN "last_ldap_synchronisation" TO "last_sync";
|
||||||
|
ALTER TABLE "user" DROP COLUMN "ldap_primary_key";
|
||||||
|
|]
|
||||||
|
|
||||||
|
|
||||||
tableExists :: MonadIO m => Text -> ReaderT SqlBackend m Bool
|
tableExists :: MonadIO m => Text -> ReaderT SqlBackend m Bool
|
||||||
tableExists table = do
|
tableExists table = do
|
||||||
|
|||||||
@ -6,6 +6,7 @@ module Model.Types
|
|||||||
( module Types
|
( module Types
|
||||||
) where
|
) where
|
||||||
|
|
||||||
|
import Model.Types.Auth as Types
|
||||||
import Model.Types.Common as Types
|
import Model.Types.Common as Types
|
||||||
import Model.Types.Course as Types
|
import Model.Types.Course as Types
|
||||||
import Model.Types.DateTime as Types
|
import Model.Types.DateTime as Types
|
||||||
@ -13,7 +14,6 @@ import Model.Types.Exam as Types
|
|||||||
import Model.Types.ExamOffice as Types
|
import Model.Types.ExamOffice as Types
|
||||||
import Model.Types.Health as Types
|
import Model.Types.Health as Types
|
||||||
import Model.Types.Mail as Types
|
import Model.Types.Mail as Types
|
||||||
import Model.Types.Security as Types
|
|
||||||
import Model.Types.Sheet as Types
|
import Model.Types.Sheet as Types
|
||||||
import Model.Types.Submission as Types
|
import Model.Types.Submission as Types
|
||||||
import Model.Types.Misc as Types
|
import Model.Types.Misc as Types
|
||||||
|
|||||||
@ -1,75 +1,103 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Sarah Vaupel <vaupel.sarah@campus.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
{-# LANGUAGE GeneralizedNewtypeDeriving #-}
|
{-# LANGUAGE GeneralizedNewtypeDeriving #-}
|
||||||
|
|
||||||
{-|
|
{-|
|
||||||
Module: Model.Types.Security
|
Module: Model.Types.Auth
|
||||||
Description: Types for authentication and authorisation
|
Description: Types for authentication and authorisation
|
||||||
-}
|
-}
|
||||||
|
|
||||||
module Model.Types.Security
|
module Model.Types.Auth
|
||||||
( module Model.Types.Security
|
( module Model.Types.Auth
|
||||||
) where
|
) where
|
||||||
|
|
||||||
import ClassyPrelude.Yesod hiding (derivePersistFieldJSON, Proxy(..))
|
import ClassyPrelude.Yesod hiding (derivePersistFieldJSON, Proxy(..))
|
||||||
|
|
||||||
import Utils
|
|
||||||
|
|
||||||
import Data.Aeson
|
|
||||||
import Data.Aeson.TH
|
|
||||||
import Model.Types.TH.JSON
|
import Model.Types.TH.JSON
|
||||||
import Data.Universe
|
import Model.Types.TH.PathPiece
|
||||||
import Data.Universe.Instances.Reverse ()
|
|
||||||
import Data.Proxy
|
import Utils
|
||||||
import Data.Data (Data)
|
import Utils.Lens.TH
|
||||||
|
|
||||||
import Control.Lens
|
import Control.Lens
|
||||||
|
|
||||||
import qualified Data.Set as Set
|
import Data.Aeson
|
||||||
|
import Data.Aeson.TH
|
||||||
import qualified Data.Text as Text
|
|
||||||
|
|
||||||
import qualified Data.HashMap.Strict as HashMap
|
|
||||||
|
|
||||||
import qualified Data.Aeson.Types as Aeson
|
import qualified Data.Aeson.Types as Aeson
|
||||||
|
import qualified Data.Binary as Binary
|
||||||
import Data.CaseInsensitive (CI)
|
import Data.Binary (Binary)
|
||||||
|
import Data.Binary.Instances.UnorderedContainers ()
|
||||||
import qualified Data.CaseInsensitive as CI
|
import qualified Data.CaseInsensitive as CI
|
||||||
|
import Data.CaseInsensitive (CI)
|
||||||
import Data.CaseInsensitive.Instances ()
|
import Data.CaseInsensitive.Instances ()
|
||||||
|
import Data.Data (Data)
|
||||||
import Data.Set.Instances ()
|
import qualified Data.HashMap.Strict as HashMap
|
||||||
import Data.NonNull.Instances ()
|
import Data.NonNull.Instances ()
|
||||||
|
import Data.Proxy
|
||||||
|
import qualified Data.Set as Set
|
||||||
|
import Data.Set.Instances ()
|
||||||
|
import qualified Data.Text as Text
|
||||||
|
import Data.Universe
|
||||||
|
import Data.Universe.Instances.Reverse ()
|
||||||
import Data.Universe.Instances.Reverse.MonoTraversable ()
|
import Data.Universe.Instances.Reverse.MonoTraversable ()
|
||||||
|
import Data.UUID (UUID)
|
||||||
|
|
||||||
import Model.Types.TH.PathPiece
|
|
||||||
import Database.Persist.Sql
|
import Database.Persist.Sql
|
||||||
|
|
||||||
import Servant.Docs (ToSample(..), samples)
|
import Servant.Docs (ToSample(..), samples)
|
||||||
import Utils.Lens.TH
|
|
||||||
|
|
||||||
import Data.Binary (Binary)
|
|
||||||
import qualified Data.Binary as Binary
|
|
||||||
import Data.Binary.Instances.UnorderedContainers ()
|
|
||||||
|
|
||||||
|
|
||||||
data AuthenticationMode = AuthLDAP
|
----------------------------------
|
||||||
| AuthPWHash { authPWHash :: Text }
|
----- Authentication Sources -----
|
||||||
| AuthNoLogin
|
----------------------------------
|
||||||
deriving (Eq, Ord, Read, Show, Generic)
|
|
||||||
|
|
||||||
instance Hashable AuthenticationMode
|
type AzureScopes = Set Text
|
||||||
instance NFData AuthenticationMode
|
|
||||||
|
-- Note: Ldap.Host also stores TLS settings, which we will generate ad-hoc based on AuthSourceLdapTls field instead. We therefore use Text to store the hostname only
|
||||||
|
-- newtype LdapHost = LdapHost { ldapHost :: Text }
|
||||||
|
-- deriving (Eq, Ord, Read, Show, Generic, Data)
|
||||||
|
-- deriving newtype (NFData, PathPiece, PersistField, PersistFieldSql)
|
||||||
|
-- instance E.SqlString LdapHost
|
||||||
|
-- makeLenses_ ''LdapHost
|
||||||
|
|
||||||
|
-- Note: Ldap.PortNumber comes from Network.Socket, which does not export the constructor of the newtype. Hence, no Data and Generic instances can be derived. But PortNumber is a member of Num, so we will use Word16 instead (Word16 is also used for storing the port number inside PortNumber)
|
||||||
|
-- newtype LdapPort = LdapPort { ldapPort :: Word16 }
|
||||||
|
-- deriving (Eq, Ord, Read, Show, Generic, Data)
|
||||||
|
-- deriving newtype (NFData, PathPiece, PersistField, PersistFieldSql)
|
||||||
|
-- instance E.SqlString LdapPort
|
||||||
|
-- makeLenses_ ''LdapPort
|
||||||
|
|
||||||
|
type UserEduPersonPrincipalName = Text
|
||||||
|
|
||||||
|
-- | Subset of the configuration settings of an authentication source that uniquely identify a given source
|
||||||
|
-- | Used for uniquely storing ExternalUser entries per user and source
|
||||||
|
data AuthSourceIdent
|
||||||
|
= AuthSourceIdAzure
|
||||||
|
{ authSourceIdAzureClientId :: UUID -- FIXME: use tenant id instead
|
||||||
|
}
|
||||||
|
| AuthSourceIdLdap
|
||||||
|
{ authSourceIdLdapHost :: Text -- normally either just the hostname, or hostname and port
|
||||||
|
}
|
||||||
|
deriving (Eq, Ord, Read, Show, Data, Generic)
|
||||||
|
deriving anyclass (NFData)
|
||||||
|
|
||||||
deriveJSON defaultOptions
|
deriveJSON defaultOptions
|
||||||
{ constructorTagModifier = camelToPathPiece' 1
|
{ fieldLabelModifier = camelToPathPiece' 3
|
||||||
, fieldLabelModifier = camelToPathPiece' 1
|
, constructorTagModifier = camelToPathPiece' 3
|
||||||
, sumEncoding = UntaggedValue
|
, sumEncoding = UntaggedValue
|
||||||
} ''AuthenticationMode
|
} ''AuthSourceIdent
|
||||||
|
|
||||||
derivePersistFieldJSON ''AuthenticationMode
|
derivePersistFieldJSON ''AuthSourceIdent
|
||||||
|
|
||||||
|
makeLenses_ ''AuthSourceIdent
|
||||||
|
makePrisms ''AuthSourceIdent
|
||||||
|
|
||||||
|
|
||||||
|
-------------------
|
||||||
|
----- AuthTag -----
|
||||||
|
-------------------
|
||||||
|
|
||||||
data AuthTag -- sortiert nach gewünschter Reihenfolge auf /authpreds, d.h. Prädikate sind sortier nach Relevanz für Benutzer
|
data AuthTag -- sortiert nach gewünschter Reihenfolge auf /authpreds, d.h. Prädikate sind sortier nach Relevanz für Benutzer
|
||||||
= AuthAdmin
|
= AuthAdmin
|
||||||
@ -105,8 +133,8 @@ data AuthTag -- sortiert nach gewünschter Reihenfolge auf /authpreds, d.h. Prä
|
|||||||
| AuthRegisterGroup
|
| AuthRegisterGroup
|
||||||
| AuthEmpty
|
| AuthEmpty
|
||||||
| AuthSelf
|
| AuthSelf
|
||||||
| AuthIsLDAP
|
| AuthIsExternal -- TODO: maybe distinguish between AuthenticationProtocols
|
||||||
| AuthIsPWHash
|
| AuthIsInternal
|
||||||
| AuthAuthentication
|
| AuthAuthentication
|
||||||
| AuthNoEscalation
|
| AuthNoEscalation
|
||||||
| AuthRead
|
| AuthRead
|
||||||
@ -179,6 +207,11 @@ _ReducedActiveAuthTags = iso toReducedActiveAuthTags fromReducedActiveAuthTags
|
|||||||
fromReducedActiveAuthTags (ReducedActiveAuthTags hm) = AuthTagActive $ \n -> fromMaybe (authTagIsActive def n) $ HashMap.lookup n hm
|
fromReducedActiveAuthTags (ReducedActiveAuthTags hm) = AuthTagActive $ \n -> fromMaybe (authTagIsActive def n) $ HashMap.lookup n hm
|
||||||
|
|
||||||
|
|
||||||
|
-------------------
|
||||||
|
----- PredDNF -----
|
||||||
|
-------------------
|
||||||
|
-- TODO: Use external PredDNF instead: https://github.com/savau/haskell-nf
|
||||||
|
|
||||||
data PredLiteral a = PLVariable { plVar :: a } | PLNegated { plVar :: a }
|
data PredLiteral a = PLVariable { plVar :: a } | PLNegated { plVar :: a }
|
||||||
deriving (Eq, Ord, Read, Show, Data, Generic)
|
deriving (Eq, Ord, Read, Show, Data, Generic)
|
||||||
deriving anyclass (Hashable, Binary, NFData)
|
deriving anyclass (Hashable, Binary, NFData)
|
||||||
@ -220,7 +253,6 @@ parsePredDNF start = fmap (PredDNF . Set.mapMonotonic impureNonNull) . ofoldM pa
|
|||||||
| otherwise
|
| otherwise
|
||||||
= Left t
|
= Left t
|
||||||
|
|
||||||
|
|
||||||
$(return [])
|
$(return [])
|
||||||
|
|
||||||
instance ToJSON a => ToJSON (PredDNF a) where
|
instance ToJSON a => ToJSON (PredDNF a) where
|
||||||
@ -73,7 +73,7 @@ import qualified Data.Foldable
|
|||||||
|
|
||||||
import Data.Aeson (genericToJSON, genericParseJSON)
|
import Data.Aeson (genericToJSON, genericParseJSON)
|
||||||
|
|
||||||
import Model.Types.Security
|
import Model.Types.Auth
|
||||||
|
|
||||||
{-# ANN module ("HLint: ignore Use newtype instead of data" :: String) #-}
|
{-# ANN module ("HLint: ignore Use newtype instead of data" :: String) #-}
|
||||||
|
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -8,9 +8,6 @@ import Import.NoModel
|
|||||||
import Model.Types.TH.PathPiece
|
import Model.Types.TH.PathPiece
|
||||||
|
|
||||||
|
|
||||||
type UserEduPersonPrincipalName = Text
|
|
||||||
|
|
||||||
|
|
||||||
data SystemFunction
|
data SystemFunction
|
||||||
= SystemExamOffice
|
= SystemExamOffice
|
||||||
| SystemFaculty
|
| SystemFaculty
|
||||||
|
|||||||
838
src/Settings.hs
838
src/Settings.hs
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,David Mosbach <david.mosbach@uniworx.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -13,10 +13,13 @@
|
|||||||
module Settings
|
module Settings
|
||||||
( module Settings
|
( module Settings
|
||||||
, module Settings.Cluster
|
, module Settings.Cluster
|
||||||
, module Settings.Mime
|
|
||||||
, module Settings.Cookies
|
, module Settings.Cookies
|
||||||
|
, module Settings.Ldap
|
||||||
, module Settings.Log
|
, module Settings.Log
|
||||||
, module Settings.Locale
|
, module Settings.Locale
|
||||||
|
, module Settings.Mime
|
||||||
|
, module Settings.OAuth2
|
||||||
|
, module Settings.ResourcePool
|
||||||
) where
|
) where
|
||||||
|
|
||||||
import Import.NoModel
|
import Import.NoModel
|
||||||
@ -41,12 +44,8 @@ import Language.Haskell.TH.Syntax (Exp, Q)
|
|||||||
import qualified Yesod.Auth.Util.PasswordStore as PWStore
|
import qualified Yesod.Auth.Util.PasswordStore as PWStore
|
||||||
|
|
||||||
import qualified Data.Scientific as Scientific
|
import qualified Data.Scientific as Scientific
|
||||||
import Data.Word (Word16)
|
|
||||||
|
|
||||||
import qualified Data.Text as Text
|
import qualified Data.Text as Text
|
||||||
import qualified Data.Text.Encoding as Text
|
|
||||||
|
|
||||||
import qualified Ldap.Client as Ldap
|
|
||||||
|
|
||||||
import qualified Network.HaskellNet.Auth as HaskellNet (UserName, Password, AuthType(..))
|
import qualified Network.HaskellNet.Auth as HaskellNet (UserName, Password, AuthType(..))
|
||||||
import qualified Network.Socket as HaskellNet
|
import qualified Network.Socket as HaskellNet
|
||||||
@ -56,11 +55,15 @@ import Network.Mail.Mime.Instances ()
|
|||||||
import qualified Database.Memcached.Binary.Types as Memcached
|
import qualified Database.Memcached.Binary.Types as Memcached
|
||||||
|
|
||||||
import Model
|
import Model
|
||||||
|
|
||||||
import Settings.Cluster
|
import Settings.Cluster
|
||||||
import Settings.Mime
|
|
||||||
import Settings.Cookies
|
import Settings.Cookies
|
||||||
|
import Settings.Ldap
|
||||||
import Settings.Log
|
import Settings.Log
|
||||||
import Settings.Locale
|
import Settings.Locale
|
||||||
|
import Settings.Mime
|
||||||
|
import Settings.OAuth2
|
||||||
|
import Settings.ResourcePool
|
||||||
|
|
||||||
import qualified System.FilePath as FilePath
|
import qualified System.FilePath as FilePath
|
||||||
|
|
||||||
@ -73,8 +76,6 @@ import qualified Web.ServerSession.Core as ServerSession
|
|||||||
|
|
||||||
import Text.Show (showParen, showString)
|
import Text.Show (showParen, showString)
|
||||||
|
|
||||||
import qualified Data.List.PointedList as P
|
|
||||||
|
|
||||||
import qualified Network.Minio as Minio
|
import qualified Network.Minio as Minio
|
||||||
|
|
||||||
import Data.Conduit.Algorithms.FastCDC
|
import Data.Conduit.Algorithms.FastCDC
|
||||||
@ -84,6 +85,361 @@ import Utils.Lens.TH
|
|||||||
import qualified Data.Set as Set
|
import qualified Data.Set as Set
|
||||||
|
|
||||||
|
|
||||||
|
data JobMode = JobsLocal { jobsAcceptOffload :: Bool }
|
||||||
|
| JobsOffload
|
||||||
|
| JobsDrop
|
||||||
|
{ jobsAcceptOffload :: Bool
|
||||||
|
, jobsWriteFakeLastExec :: Bool
|
||||||
|
}
|
||||||
|
deriving (Eq, Ord, Read, Show, Generic)
|
||||||
|
deriving anyclass (Hashable)
|
||||||
|
|
||||||
|
data ApprootScope = ApprootUserGenerated | ApprootDefault
|
||||||
|
deriving (Eq, Ord, Read, Show, Enum, Bounded, Generic)
|
||||||
|
deriving anyclass (Universe, Finite, Hashable)
|
||||||
|
|
||||||
|
|
||||||
|
newtype ServerSessionSettings
|
||||||
|
= ServerSessionSettings { applyServerSessionSettings :: forall a. ServerSession.State a -> ServerSession.State a }
|
||||||
|
|
||||||
|
instance Show ServerSessionSettings where
|
||||||
|
showsPrec d _ = showParen (d > 10) $ showString "ServerSessionSettings _"
|
||||||
|
|
||||||
|
data UserDefaultConf = UserDefaultConf
|
||||||
|
{ userDefaultTheme :: Theme
|
||||||
|
, userDefaultMaxFavourites, userDefaultMaxFavouriteTerms :: Int
|
||||||
|
, userDefaultDateTimeFormat, userDefaultDateFormat, userDefaultTimeFormat :: DateTimeFormat
|
||||||
|
, userDefaultDownloadFiles :: Bool
|
||||||
|
, userDefaultWarningDays :: NominalDiffTime
|
||||||
|
, userDefaultShowSex :: Bool
|
||||||
|
, userDefaultExamOfficeGetSynced :: Bool
|
||||||
|
, userDefaultExamOfficeGetLabels :: Bool
|
||||||
|
, userDefaultPrefersPostal :: Bool
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
data PWHashConf = PWHashConf
|
||||||
|
{ pwHashAlgorithm :: PWHashAlgorithm
|
||||||
|
, pwHashStrength :: Int
|
||||||
|
}
|
||||||
|
|
||||||
|
instance Show PWHashConf where
|
||||||
|
show PWHashConf{..} = "PWHashConf { pwHashStrength = " <> show pwHashStrength <> ", .. }"
|
||||||
|
|
||||||
|
instance FromJSON PWHashConf where
|
||||||
|
parseJSON = withObject "PWHashConf" $ \o -> do
|
||||||
|
pwHashAlgorithm' <- o .: "algorithm" :: Aeson.Parser Text
|
||||||
|
pwHashAlgorithm <- if
|
||||||
|
| pwHashAlgorithm' == "pbkdf1" -> return PWStore.pbkdf1
|
||||||
|
| pwHashAlgorithm' == "pbkdf2" -> return PWStore.pbkdf2
|
||||||
|
| otherwise -> fail "Unsupported hash algorithm"
|
||||||
|
pwHashStrength <- o .: "strength"
|
||||||
|
|
||||||
|
return PWHashConf{..}
|
||||||
|
|
||||||
|
|
||||||
|
data AuthSourceConf = AuthSourceConfLdap LdapConf | AuthSourceConfAzureAdV2 AzureConf
|
||||||
|
deriving (Show)
|
||||||
|
|
||||||
|
newtype UserAuthConf =
|
||||||
|
UserAuthConfSingleSource -- ^ use only one specific source
|
||||||
|
{ userAuthConfSingleSource :: AuthSourceConf
|
||||||
|
}
|
||||||
|
-- TODO: other modes yet to be implemented
|
||||||
|
-- | UserAuthConfFailover -- ^ use only one user source at a time, but failover to the next-best database if the current source is unavailable
|
||||||
|
-- { userAuthConfFailoverSources :: PointedList UserSource
|
||||||
|
-- , userAuthConfFailoverRetest :: NominalDiffTime
|
||||||
|
-- }
|
||||||
|
-- | UserAuthConfMultiSource -- ^ Multiple coequal user sources
|
||||||
|
-- { userAuthConfMultiSources :: Set UserSource
|
||||||
|
-- }
|
||||||
|
-- | UserAuthConfNoSource -- ^ allow no external sources at all -- TODO: either this, or make user-auth in settings.yml optional
|
||||||
|
deriving (Show)
|
||||||
|
|
||||||
|
mkAuthSourceIdent :: AuthSourceConf -> AuthSourceIdent
|
||||||
|
mkAuthSourceIdent = \case
|
||||||
|
AuthSourceConfAzureAdV2 AzureConf{..} -> AuthSourceIdAzure azureConfClientId
|
||||||
|
AuthSourceConfLdap LdapConf{..} -> AuthSourceIdLdap ldapConfSourceId
|
||||||
|
|
||||||
|
data LmsConf = LmsConf
|
||||||
|
{ lmsUploadHeader :: Bool
|
||||||
|
, lmsUploadDelimiter :: Maybe Char
|
||||||
|
, lmsDownloadHeader :: Bool
|
||||||
|
, lmsDownloadDelimiter :: Char
|
||||||
|
, lmsDownloadCrLf :: Bool
|
||||||
|
, lmsDeletionDays :: Int
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
data AvsConf = AvsConf
|
||||||
|
{ avsHost :: String
|
||||||
|
, avsPort :: Int
|
||||||
|
, avsUser :: ByteString
|
||||||
|
, avsPass :: ByteString
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
data LprConf = LprConf
|
||||||
|
{ lprHost :: String
|
||||||
|
, lprPort :: Int
|
||||||
|
, lprQueue:: String
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
data SmtpConf = SmtpConf
|
||||||
|
{ smtpHost :: HaskellNet.HostName
|
||||||
|
, smtpPort :: HaskellNet.PortNumber
|
||||||
|
, smtpAuth :: Maybe SmtpAuthConf
|
||||||
|
, smtpSsl :: SmtpSslMode
|
||||||
|
, smtpPool :: ResourcePoolConf
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
data WidgetMemcachedConf = WidgetMemcachedConf
|
||||||
|
{ widgetMemcachedConf :: MemcachedConf
|
||||||
|
, widgetMemcachedBaseUrl :: Text
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
data MemcachedConf = MemcachedConf
|
||||||
|
{ memcachedConnectInfo :: Memcached.ConnectInfo
|
||||||
|
, memcachedExpiry :: Maybe NominalDiffTime
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
instance FromJSON Memcached.Auth where
|
||||||
|
parseJSON = Aeson.withText "Auth" $ \(Text.breakOn "@" -> (encodeUtf8 -> user, encodeUtf8 -> pw)) -> return $ Memcached.Plain user pw
|
||||||
|
|
||||||
|
instance FromJSON MemcachedConf where
|
||||||
|
parseJSON = withObject "MemcachedConf" $ \o -> do
|
||||||
|
connectHost <- o .:? "host" .!= ""
|
||||||
|
connectPort <- o .: "port"
|
||||||
|
connectAuth <- o .: "auth"
|
||||||
|
numConnection <- o .: "limit"
|
||||||
|
connectionIdleTime <- o .: "timeout"
|
||||||
|
memcachedExpiry <- assertM (maybe True $ \t -> 0 < t && t <= 30 * nominalDay) $ o .:? "expiration"
|
||||||
|
|
||||||
|
return MemcachedConf{ memcachedConnectInfo = Memcached.ConnectInfo{..}, .. }
|
||||||
|
|
||||||
|
instance FromJSON WidgetMemcachedConf where
|
||||||
|
parseJSON v = flip (withObject "WidgetMemcachedConf") v $ \o -> do
|
||||||
|
widgetMemcachedConf <- parseJSON v
|
||||||
|
widgetMemcachedBaseUrl <- o .:? "base-url" .!= ""
|
||||||
|
return WidgetMemcachedConf{..}
|
||||||
|
|
||||||
|
data SmtpSslMode = SmtpSslNone | SmtpSslSmtps | SmtpSslStarttls
|
||||||
|
deriving (Show)
|
||||||
|
|
||||||
|
data SmtpAuthConf = SmtpAuthConf
|
||||||
|
{ smtpAuthType :: HaskellNet.AuthType
|
||||||
|
, smtpAuthUsername :: HaskellNet.UserName
|
||||||
|
, smtpAuthPassword :: HaskellNet.Password
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
data TokenBucketConf = TokenBucketConf
|
||||||
|
{ tokenBucketDepth :: Word64
|
||||||
|
, tokenBucketInvRate :: NominalDiffTime
|
||||||
|
, tokenBucketInitialValue :: Int64
|
||||||
|
} deriving (Eq, Ord, Show, Generic)
|
||||||
|
|
||||||
|
data VerpMode = VerpNone
|
||||||
|
| Verp { verpPrefix :: Text, verpSeparator :: Char }
|
||||||
|
deriving (Eq, Show, Read, Generic)
|
||||||
|
|
||||||
|
data ARCConf w = ARCConf
|
||||||
|
{ arccMaximumGhost :: Int
|
||||||
|
, arccMaximumWeight :: w
|
||||||
|
} deriving (Eq, Ord, Read, Show, Generic)
|
||||||
|
|
||||||
|
data PrewarmCacheConf = PrewarmCacheConf
|
||||||
|
{ precMaximumWeight :: Int
|
||||||
|
, precStart, precEnd, precInhibit :: NominalDiffTime -- ^ Prewarming cache starts at @t - precStart@ and should be finished by @t - precEnd@; injecting from minio to database is inhibited from @t - precStart@ until @t - precStart + precInhibit@
|
||||||
|
, precSteps :: Natural
|
||||||
|
, precMaxSpeedup :: Rational
|
||||||
|
} deriving (Eq, Ord, Read, Show, Generic)
|
||||||
|
|
||||||
|
data SettingBotMitigation
|
||||||
|
= SettingBotMitigationOnlyLoggedInTableSorting
|
||||||
|
| SettingBotMitigationUnauthorizedFormHoneypots
|
||||||
|
deriving (Eq, Ord, Read, Show, Enum, Bounded, Generic)
|
||||||
|
deriving anyclass (Universe, Finite)
|
||||||
|
|
||||||
|
data LegalExternal = LegalExternal
|
||||||
|
{ externalLanguage :: Lang
|
||||||
|
, externalImprint :: Text
|
||||||
|
, externalDataProtection :: Text
|
||||||
|
, externalTermsOfUse :: Text
|
||||||
|
, externalPayments :: Text
|
||||||
|
}
|
||||||
|
deriving (Eq, Ord, Read, Show, Generic)
|
||||||
|
makeLenses_ ''LegalExternal
|
||||||
|
|
||||||
|
|
||||||
|
nullaryPathPiece ''ApprootScope $ camelToPathPiece' 1
|
||||||
|
pathPieceJSON ''ApprootScope
|
||||||
|
pathPieceJSONKey ''ApprootScope
|
||||||
|
pathPieceBinary ''ApprootScope
|
||||||
|
pathPieceHttpApiData ''ApprootScope
|
||||||
|
|
||||||
|
deriveJSON defaultOptions
|
||||||
|
{ constructorTagModifier = camelToPathPiece' 1
|
||||||
|
, fieldLabelModifier = camelToPathPiece' 1
|
||||||
|
, sumEncoding = UntaggedValue
|
||||||
|
} ''VerpMode
|
||||||
|
|
||||||
|
deriveJSON defaultOptions
|
||||||
|
{ fieldLabelModifier = camelToPathPiece' 2
|
||||||
|
} ''TokenBucketConf
|
||||||
|
|
||||||
|
deriveFromJSON defaultOptions
|
||||||
|
{ fieldLabelModifier = camelToPathPiece' 2
|
||||||
|
} ''UserDefaultConf
|
||||||
|
|
||||||
|
deriveJSON defaultOptions
|
||||||
|
{ fieldLabelModifier = camelToPathPiece' 1
|
||||||
|
, constructorTagModifier = camelToPathPiece' 1
|
||||||
|
} ''JobMode
|
||||||
|
|
||||||
|
deriveJSON defaultOptions
|
||||||
|
{ fieldLabelModifier = camelToPathPiece' 1
|
||||||
|
} ''ARCConf
|
||||||
|
|
||||||
|
deriveJSON defaultOptions
|
||||||
|
{ fieldLabelModifier = camelToPathPiece' 1
|
||||||
|
} ''PrewarmCacheConf
|
||||||
|
|
||||||
|
makeLenses_ ''PrewarmCacheConf
|
||||||
|
|
||||||
|
nullaryPathPiece ''SettingBotMitigation $ camelToPathPiece' 3
|
||||||
|
pathPieceJSON ''SettingBotMitigation
|
||||||
|
pathPieceJSONKey ''SettingBotMitigation
|
||||||
|
|
||||||
|
makePrisms ''JobMode
|
||||||
|
makeLenses_ ''JobMode
|
||||||
|
|
||||||
|
makePrisms ''AuthSourceConf
|
||||||
|
makeLenses_ ''UserAuthConf
|
||||||
|
makePrisms ''UserAuthConf
|
||||||
|
|
||||||
|
deriveFromJSON defaultOptions
|
||||||
|
{ constructorTagModifier = toLower . dropPrefix "AuthSourceConf"
|
||||||
|
, sumEncoding = TaggedObject "protocol" "config"
|
||||||
|
} ''AuthSourceConf
|
||||||
|
|
||||||
|
deriveFromJSON defaultOptions
|
||||||
|
{ constructorTagModifier = camelToPathPiece' 3
|
||||||
|
, fieldLabelModifier = camelToPathPiece' 3
|
||||||
|
, sumEncoding = UntaggedValue -- TaggedObject "mode" "config"
|
||||||
|
, unwrapUnaryRecords = True
|
||||||
|
} ''UserAuthConf
|
||||||
|
|
||||||
|
instance FromJSON HaskellNet.PortNumber where
|
||||||
|
parseJSON = withScientific "PortNumber" $ \sciNum -> case Scientific.toBoundedInteger sciNum of
|
||||||
|
Just int -> return $ fromIntegral (int :: Word16)
|
||||||
|
Nothing -> fail "Expected whole number of plausible size to denote port"
|
||||||
|
|
||||||
|
deriveFromJSON defaultOptions
|
||||||
|
{ constructorTagModifier = unpack . intercalate "-" . Text.splitOn "_" . toLower . pack
|
||||||
|
, allNullaryToStringTag = True
|
||||||
|
} ''HaskellNet.AuthType
|
||||||
|
|
||||||
|
instance FromJSON LmsConf where
|
||||||
|
parseJSON = withObject "LmsConf" $ \o -> do
|
||||||
|
lmsUploadHeader <- o .: "upload-header"
|
||||||
|
lmsUploadDelimiter <- o .:? "upload-delimiter"
|
||||||
|
lmsDownloadHeader <- o .: "download-header"
|
||||||
|
lmsDownloadDelimiter <- o .: "download-delimiter"
|
||||||
|
lmsDownloadCrLf <- o .: "download-cr-lf"
|
||||||
|
lmsDeletionDays <- o .: "deletion-days"
|
||||||
|
return LmsConf{..}
|
||||||
|
|
||||||
|
makeLenses_ ''LmsConf
|
||||||
|
|
||||||
|
instance FromJSON AvsConf where
|
||||||
|
parseJSON = withObject "AvsConf" $ \o -> do
|
||||||
|
avsHost <- o .: "host"
|
||||||
|
avsPort <- o .: "port"
|
||||||
|
avsUser <- o .: "user"
|
||||||
|
avsPass <- o .:? "pass" .!= ""
|
||||||
|
return AvsConf{..}
|
||||||
|
|
||||||
|
instance FromJSON LprConf where
|
||||||
|
parseJSON = withObject "LprConf" $ \o -> do
|
||||||
|
lprHost <- o .: "host"
|
||||||
|
lprPort <- o .: "port"
|
||||||
|
lprQueue <- o .: "queue"
|
||||||
|
return LprConf{..}
|
||||||
|
|
||||||
|
instance FromJSON SmtpConf where
|
||||||
|
parseJSON = withObject "SmtpConf" $ \o -> do
|
||||||
|
smtpHost <- o .:? "host" .!= ""
|
||||||
|
smtpPort <- o .: "port"
|
||||||
|
smtpAuth <- assertM (not . null . smtpAuthUsername) <$> o .:? "auth"
|
||||||
|
smtpSsl <- o .: "ssl"
|
||||||
|
smtpPool <- o .: "pool"
|
||||||
|
return SmtpConf{..}
|
||||||
|
|
||||||
|
deriveFromJSON
|
||||||
|
defaultOptions
|
||||||
|
{ constructorTagModifier = intercalate "-" . map toLower . drop 2 . splitCamel
|
||||||
|
, allNullaryToStringTag = True
|
||||||
|
}
|
||||||
|
''SmtpSslMode
|
||||||
|
|
||||||
|
instance FromJSON SmtpAuthConf where
|
||||||
|
parseJSON = withObject "SmtpAuthConf" $ \o -> do
|
||||||
|
smtpAuthType <- o .: "type"
|
||||||
|
smtpAuthUsername <- o .:? "user" .!= ""
|
||||||
|
smtpAuthPassword <- o .:? "pass" .!= ""
|
||||||
|
return SmtpAuthConf{..}
|
||||||
|
|
||||||
|
instance FromJSON JwtEncoding where
|
||||||
|
parseJSON v@(String _) = JwsEncoding <$> parseJSON v
|
||||||
|
parseJSON v = flip (withObject "JwtEncoding") v $ \obj -> asum
|
||||||
|
[ do
|
||||||
|
alg <- obj .: "alg"
|
||||||
|
return $ JwsEncoding alg
|
||||||
|
, do
|
||||||
|
alg <- obj .: "alg"
|
||||||
|
enc <- obj .: "enc"
|
||||||
|
return $ JweEncoding alg enc
|
||||||
|
]
|
||||||
|
|
||||||
|
instance FromJSON Minio.ConnectInfo where
|
||||||
|
parseJSON v@(String _) = fromString <$> parseJSON v
|
||||||
|
parseJSON v = flip (withObject "ConnectInfo") v $ \o -> do
|
||||||
|
connectHost <- o .:? "host" .!= ""
|
||||||
|
connectPort <- o .: "port"
|
||||||
|
connectAccessKey <- o .:? "access-key" .!= ""
|
||||||
|
connectSecretKey <- o .:? "secret-key" .!= ""
|
||||||
|
connectIsSecure <- o .: "is-secure"
|
||||||
|
connectRegion <- o .:? "region" .!= ""
|
||||||
|
connectAutoDiscoverRegion <- o .:? "auto-discover-region" .!= True
|
||||||
|
connectDisableTLSCertValidation <- o .:? "disable-cert-validation" .!= False
|
||||||
|
return Minio.ConnectInfo{..}
|
||||||
|
|
||||||
|
instance FromJSON ServerSessionSettings where
|
||||||
|
parseJSON = withObject "ServerSession.State" $ \o -> do
|
||||||
|
idleTimeout <- o .:? "idle-timeout"
|
||||||
|
absoluteTimeout <- o .:? "absolute-timeout"
|
||||||
|
timeoutResolution <- o .:? "timeout-resolution"
|
||||||
|
persistentCookies <- o .:? "persistent-cookies"
|
||||||
|
return $ ServerSessionSettings (appEndo . foldMap Endo $ catMaybes
|
||||||
|
[ pure $ ServerSession.setIdleTimeout idleTimeout
|
||||||
|
, pure $ ServerSession.setAbsoluteTimeout absoluteTimeout
|
||||||
|
, pure $ ServerSession.setTimeoutResolution timeoutResolution
|
||||||
|
, ServerSession.setPersistentCookies <$> persistentCookies
|
||||||
|
])
|
||||||
|
|
||||||
|
instance FromJSON LegalExternal where
|
||||||
|
parseJSON = withObject "LegalExternal" $ \o -> do
|
||||||
|
externalLanguage <- o .: "language"
|
||||||
|
externalImprint <- o .: "imprint"
|
||||||
|
externalDataProtection <- o .: "data-protection"
|
||||||
|
externalTermsOfUse<- o .: "terms-of-use"
|
||||||
|
externalPayments <- o .: "payments"
|
||||||
|
return LegalExternal{..}
|
||||||
|
|
||||||
|
submissionBlacklist :: [Pattern]
|
||||||
|
submissionBlacklist = $$(patternFile compDefault "config/submission-blacklist")
|
||||||
|
|
||||||
|
personalisedSheetFilesCollatable :: Map Text Pattern
|
||||||
|
personalisedSheetFilesCollatable = $$(patternFile' compDefault "config/personalised-sheet-files-collate")
|
||||||
|
|
||||||
|
|
||||||
-- | Runtime settings to configure this application. These settings can be
|
-- | Runtime settings to configure this application. These settings can be
|
||||||
-- loaded from various sources: defaults, environment variables, config files,
|
-- loaded from various sources: defaults, environment variables, config files,
|
||||||
-- theoretically even a database.
|
-- theoretically even a database.
|
||||||
@ -96,12 +452,16 @@ data AppSettings = AppSettings
|
|||||||
, appDatabaseConf :: PostgresConf
|
, appDatabaseConf :: PostgresConf
|
||||||
-- ^ Configuration settings for accessing the database.
|
-- ^ Configuration settings for accessing the database.
|
||||||
, appAutoDbMigrate :: Bool
|
, appAutoDbMigrate :: Bool
|
||||||
, appLdapConf :: Maybe (PointedList LdapConf)
|
, appUserAuthConf :: UserAuthConf
|
||||||
-- ^ Configuration settings for CSV export/import to LMS (= Learn Management System)
|
, appSingleSignOn :: Bool
|
||||||
|
-- ^ Enable OIDC single sign-on
|
||||||
|
, appAutoSignOn :: Bool
|
||||||
|
-- ^ Automatically redirect to SSO route when not signed on
|
||||||
|
-- ^ Note: This will force authentication, thus the site will be inaccessible without external credentials. Only use this option when it is ensured that every user that should be able to access the site has valid external credentials!
|
||||||
, appLmsConf :: LmsConf
|
, appLmsConf :: LmsConf
|
||||||
-- ^ Configuration settings for accessing the LDAP-directory
|
-- ^ Configuration settings for CSV export/import to LMS (= Learn Management System) -- TODO, TODISCUSS: reimplement as user-auth source?
|
||||||
, appAvsConf :: Maybe AvsConf
|
, appAvsConf :: Maybe AvsConf
|
||||||
-- ^ Configuration settings for accessing AVS Server (= Ausweis Verwaltungs System)
|
-- ^ Configuration settings for accessing AVS Server (= Ausweis Verwaltungs System) -- TODO, TODISCUSS: reimplement as user-auth source?
|
||||||
, appLprConf :: LprConf
|
, appLprConf :: LprConf
|
||||||
-- ^ Configuration settings for accessing a printer queue via lpr for letter mailing
|
-- ^ Configuration settings for accessing a printer queue via lpr for letter mailing
|
||||||
, appSmtpConf :: Maybe SmtpConf
|
, appSmtpConf :: Maybe SmtpConf
|
||||||
@ -109,15 +469,13 @@ data AppSettings = AppSettings
|
|||||||
, appWidgetMemcachedConf :: Maybe WidgetMemcachedConf
|
, appWidgetMemcachedConf :: Maybe WidgetMemcachedConf
|
||||||
-- ^ Configuration settings for accessing a Memcached instance for use with `addStaticContent`
|
-- ^ Configuration settings for accessing a Memcached instance for use with `addStaticContent`
|
||||||
, appRoot :: ApprootScope -> Maybe Text
|
, appRoot :: ApprootScope -> Maybe Text
|
||||||
-- ^ Base for all generated URLs. If @Nothing@, determined
|
-- ^ Base for all generated URLs. If @Nothing@, determined from the request headers.
|
||||||
-- from the request headers.
|
|
||||||
, appHost :: HostPreference
|
, appHost :: HostPreference
|
||||||
-- ^ Host/interface the server should bind to.
|
-- ^ Host/interface the server should bind to.
|
||||||
, appPort :: Int
|
, appPort :: Int
|
||||||
-- ^ Port to listen on
|
-- ^ Port to listen on
|
||||||
, appIpFromHeader :: Bool
|
, appIpFromHeader :: Bool
|
||||||
-- ^ Get the IP address from the header when logging. Useful when sitting
|
-- ^ Get the IP address from the header when logging. Useful when sitting behind a reverse proxy.
|
||||||
-- behind a reverse proxy.
|
|
||||||
|
|
||||||
, appServerSessionConfig :: ServerSessionSettings
|
, appServerSessionConfig :: ServerSessionSettings
|
||||||
, appServerSessionAcidFallback :: Bool
|
, appServerSessionAcidFallback :: Bool
|
||||||
@ -158,18 +516,21 @@ data AppSettings = AppSettings
|
|||||||
, appHealthCheckActiveJobExecutorsTimeout :: NominalDiffTime
|
, appHealthCheckActiveJobExecutorsTimeout :: NominalDiffTime
|
||||||
, appHealthCheckActiveWidgetMemcachedTimeout :: NominalDiffTime
|
, appHealthCheckActiveWidgetMemcachedTimeout :: NominalDiffTime
|
||||||
, appHealthCheckSMTPConnectTimeout :: NominalDiffTime
|
, appHealthCheckSMTPConnectTimeout :: NominalDiffTime
|
||||||
, appHealthCheckLDAPAdminsTimeout :: NominalDiffTime
|
, appHealthCheckLDAPAdminsTimeout :: NominalDiffTime -- TODO: either generalize over every external auth sources, or otherwise reimplement for different semantics
|
||||||
, appHealthCheckHTTPReachableTimeout :: NominalDiffTime
|
, appHealthCheckHTTPReachableTimeout :: NominalDiffTime
|
||||||
, appHealthCheckMatchingClusterConfigTimeout :: NominalDiffTime
|
, appHealthCheckMatchingClusterConfigTimeout :: NominalDiffTime
|
||||||
|
|
||||||
, appSynchroniseLdapUsersWithin :: Maybe NominalDiffTime
|
-- , appUserRetestFailover :: DiffTime -- TODO: reintroduce and move into failover settings once failover mode has been reimplemented
|
||||||
, appSynchroniseLdapUsersInterval :: NominalDiffTime
|
-- TODO; maybe implement syncWithin and syncInterval per auth source
|
||||||
|
, appUserSyncWithin :: Maybe NominalDiffTime
|
||||||
|
, appUserSyncInterval :: NominalDiffTime
|
||||||
|
|
||||||
, appSynchroniseAvsUsersWithin :: Maybe NominalDiffTime
|
, appLdapPoolConf :: Maybe ResourcePoolConf -- TODO: generalize for arbitrary auth protocols
|
||||||
|
-- TODO: maybe use separate pools for external databases?
|
||||||
|
|
||||||
|
, appSynchroniseAvsUsersWithin :: Maybe NominalDiffTime
|
||||||
, appSynchroniseAvsUsersInterval :: NominalDiffTime
|
, appSynchroniseAvsUsersInterval :: NominalDiffTime
|
||||||
|
|
||||||
, appLdapReTestFailover :: DiffTime
|
|
||||||
|
|
||||||
, appSessionFilesExpire :: NominalDiffTime
|
, appSessionFilesExpire :: NominalDiffTime
|
||||||
, appKeepUnreferencedFiles :: NominalDiffTime
|
, appKeepUnreferencedFiles :: NominalDiffTime
|
||||||
|
|
||||||
@ -254,365 +615,6 @@ data AppSettings = AppSettings
|
|||||||
|
|
||||||
} deriving Show
|
} deriving Show
|
||||||
|
|
||||||
|
|
||||||
data JobMode = JobsLocal { jobsAcceptOffload :: Bool }
|
|
||||||
| JobsOffload
|
|
||||||
| JobsDrop
|
|
||||||
{ jobsAcceptOffload :: Bool
|
|
||||||
, jobsWriteFakeLastExec :: Bool
|
|
||||||
}
|
|
||||||
deriving (Eq, Ord, Read, Show, Generic)
|
|
||||||
deriving anyclass (Hashable)
|
|
||||||
|
|
||||||
data ApprootScope = ApprootUserGenerated | ApprootDefault
|
|
||||||
deriving (Eq, Ord, Read, Show, Enum, Bounded, Generic)
|
|
||||||
deriving anyclass (Universe, Finite, Hashable)
|
|
||||||
|
|
||||||
|
|
||||||
newtype ServerSessionSettings
|
|
||||||
= ServerSessionSettings { applyServerSessionSettings :: forall a. ServerSession.State a -> ServerSession.State a }
|
|
||||||
|
|
||||||
instance Show ServerSessionSettings where
|
|
||||||
showsPrec d _ = showParen (d > 10) $ showString "ServerSessionSettings _"
|
|
||||||
|
|
||||||
data UserDefaultConf = UserDefaultConf
|
|
||||||
{ userDefaultTheme :: Theme
|
|
||||||
, userDefaultMaxFavourites, userDefaultMaxFavouriteTerms :: Int
|
|
||||||
, userDefaultDateTimeFormat, userDefaultDateFormat, userDefaultTimeFormat :: DateTimeFormat
|
|
||||||
, userDefaultDownloadFiles :: Bool
|
|
||||||
, userDefaultWarningDays :: NominalDiffTime
|
|
||||||
, userDefaultShowSex :: Bool
|
|
||||||
, userDefaultExamOfficeGetSynced :: Bool
|
|
||||||
, userDefaultExamOfficeGetLabels :: Bool
|
|
||||||
, userDefaultPrefersPostal :: Bool
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data PWHashConf = PWHashConf
|
|
||||||
{ pwHashAlgorithm :: PWHashAlgorithm
|
|
||||||
, pwHashStrength :: Int
|
|
||||||
}
|
|
||||||
|
|
||||||
instance Show PWHashConf where
|
|
||||||
show PWHashConf{..} = "PWHashConf { pwHashStrength = " <> show pwHashStrength <> ", .. }"
|
|
||||||
|
|
||||||
instance FromJSON PWHashConf where
|
|
||||||
parseJSON = withObject "PWHashConf" $ \o -> do
|
|
||||||
pwHashAlgorithm' <- o .: "algorithm" :: Aeson.Parser Text
|
|
||||||
pwHashAlgorithm <- if
|
|
||||||
| pwHashAlgorithm' == "pbkdf1" -> return PWStore.pbkdf1
|
|
||||||
| pwHashAlgorithm' == "pbkdf2" -> return PWStore.pbkdf2
|
|
||||||
| otherwise -> fail "Unsupported hash algorithm"
|
|
||||||
pwHashStrength <- o .: "strength"
|
|
||||||
|
|
||||||
return PWHashConf{..}
|
|
||||||
|
|
||||||
data LdapConf = LdapConf
|
|
||||||
{ ldapHost :: Ldap.Host, ldapPort :: Ldap.PortNumber
|
|
||||||
, ldapDn :: Ldap.Dn, ldapPassword :: Ldap.Password
|
|
||||||
, ldapBase :: Ldap.Dn
|
|
||||||
, ldapScope :: Ldap.Scope
|
|
||||||
, ldapTimeout :: NominalDiffTime
|
|
||||||
, ldapSearchTimeout :: Int32
|
|
||||||
, ldapPool :: ResourcePoolConf
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data LmsConf = LmsConf
|
|
||||||
{ lmsUploadHeader :: Bool
|
|
||||||
, lmsUploadDelimiter :: Maybe Char
|
|
||||||
, lmsDownloadHeader :: Bool
|
|
||||||
, lmsDownloadDelimiter :: Char
|
|
||||||
, lmsDownloadCrLf :: Bool
|
|
||||||
, lmsDeletionDays :: Int
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data AvsConf = AvsConf
|
|
||||||
{ avsHost :: String
|
|
||||||
, avsPort :: Int
|
|
||||||
, avsUser :: ByteString
|
|
||||||
, avsPass :: ByteString
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data LprConf = LprConf
|
|
||||||
{ lprHost :: String
|
|
||||||
, lprPort :: Int
|
|
||||||
, lprQueue:: String
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data SmtpConf = SmtpConf
|
|
||||||
{ smtpHost :: HaskellNet.HostName
|
|
||||||
, smtpPort :: HaskellNet.PortNumber
|
|
||||||
, smtpAuth :: Maybe SmtpAuthConf
|
|
||||||
, smtpSsl :: SmtpSslMode
|
|
||||||
, smtpPool :: ResourcePoolConf
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data WidgetMemcachedConf = WidgetMemcachedConf
|
|
||||||
{ widgetMemcachedConf :: MemcachedConf
|
|
||||||
, widgetMemcachedBaseUrl :: Text
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data MemcachedConf = MemcachedConf
|
|
||||||
{ memcachedConnectInfo :: Memcached.ConnectInfo
|
|
||||||
, memcachedExpiry :: Maybe NominalDiffTime
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
instance FromJSON Memcached.Auth where
|
|
||||||
parseJSON = Aeson.withText "Auth" $ \(Text.breakOn "@" -> (encodeUtf8 -> user, encodeUtf8 -> pw)) -> return $ Memcached.Plain user pw
|
|
||||||
|
|
||||||
instance FromJSON MemcachedConf where
|
|
||||||
parseJSON = withObject "MemcachedConf" $ \o -> do
|
|
||||||
connectHost <- o .:? "host" .!= ""
|
|
||||||
connectPort <- o .: "port"
|
|
||||||
connectAuth <- o .: "auth"
|
|
||||||
numConnection <- o .: "limit"
|
|
||||||
connectionIdleTime <- o .: "timeout"
|
|
||||||
memcachedExpiry <- assertM (maybe True $ \t -> 0 < t && t <= 30 * nominalDay) $ o .:? "expiration"
|
|
||||||
|
|
||||||
return MemcachedConf{ memcachedConnectInfo = Memcached.ConnectInfo{..}, .. }
|
|
||||||
|
|
||||||
instance FromJSON WidgetMemcachedConf where
|
|
||||||
parseJSON v = flip (withObject "WidgetMemcachedConf") v $ \o -> do
|
|
||||||
widgetMemcachedConf <- parseJSON v
|
|
||||||
widgetMemcachedBaseUrl <- o .:? "base-url" .!= ""
|
|
||||||
return WidgetMemcachedConf{..}
|
|
||||||
|
|
||||||
data ResourcePoolConf = ResourcePoolConf
|
|
||||||
{ poolStripes :: Int
|
|
||||||
, poolTimeout :: NominalDiffTime
|
|
||||||
, poolLimit :: Int
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data SmtpSslMode = SmtpSslNone | SmtpSslSmtps | SmtpSslStarttls
|
|
||||||
deriving (Show)
|
|
||||||
|
|
||||||
data SmtpAuthConf = SmtpAuthConf
|
|
||||||
{ smtpAuthType :: HaskellNet.AuthType
|
|
||||||
, smtpAuthUsername :: HaskellNet.UserName
|
|
||||||
, smtpAuthPassword :: HaskellNet.Password
|
|
||||||
} deriving (Show)
|
|
||||||
|
|
||||||
data TokenBucketConf = TokenBucketConf
|
|
||||||
{ tokenBucketDepth :: Word64
|
|
||||||
, tokenBucketInvRate :: NominalDiffTime
|
|
||||||
, tokenBucketInitialValue :: Int64
|
|
||||||
} deriving (Eq, Ord, Show, Generic)
|
|
||||||
|
|
||||||
data VerpMode = VerpNone
|
|
||||||
| Verp { verpPrefix :: Text, verpSeparator :: Char }
|
|
||||||
deriving (Eq, Show, Read, Generic)
|
|
||||||
|
|
||||||
data ARCConf w = ARCConf
|
|
||||||
{ arccMaximumGhost :: Int
|
|
||||||
, arccMaximumWeight :: w
|
|
||||||
} deriving (Eq, Ord, Read, Show, Generic)
|
|
||||||
|
|
||||||
data PrewarmCacheConf = PrewarmCacheConf
|
|
||||||
{ precMaximumWeight :: Int
|
|
||||||
, precStart, precEnd, precInhibit :: NominalDiffTime -- ^ Prewarming cache starts at @t - precStart@ and should be finished by @t - precEnd@; injecting from minio to database is inhibited from @t - precStart@ until @t - precStart + precInhibit@
|
|
||||||
, precSteps :: Natural
|
|
||||||
, precMaxSpeedup :: Rational
|
|
||||||
} deriving (Eq, Ord, Read, Show, Generic)
|
|
||||||
|
|
||||||
data SettingBotMitigation
|
|
||||||
= SettingBotMitigationOnlyLoggedInTableSorting
|
|
||||||
| SettingBotMitigationUnauthorizedFormHoneypots
|
|
||||||
deriving (Eq, Ord, Read, Show, Enum, Bounded, Generic)
|
|
||||||
deriving anyclass (Universe, Finite)
|
|
||||||
|
|
||||||
data LegalExternal = LegalExternal
|
|
||||||
{ externalLanguage :: Lang
|
|
||||||
, externalImprint :: Text
|
|
||||||
, externalDataProtection :: Text
|
|
||||||
, externalTermsOfUse :: Text
|
|
||||||
, externalPayments :: Text
|
|
||||||
}
|
|
||||||
deriving (Eq, Ord, Read, Show, Generic)
|
|
||||||
makeLenses_ ''LegalExternal
|
|
||||||
|
|
||||||
|
|
||||||
nullaryPathPiece ''ApprootScope $ camelToPathPiece' 1
|
|
||||||
pathPieceJSON ''ApprootScope
|
|
||||||
pathPieceJSONKey ''ApprootScope
|
|
||||||
pathPieceBinary ''ApprootScope
|
|
||||||
pathPieceHttpApiData ''ApprootScope
|
|
||||||
|
|
||||||
deriveJSON defaultOptions
|
|
||||||
{ constructorTagModifier = camelToPathPiece' 1
|
|
||||||
, fieldLabelModifier = camelToPathPiece' 1
|
|
||||||
, sumEncoding = UntaggedValue
|
|
||||||
} ''VerpMode
|
|
||||||
|
|
||||||
deriveJSON defaultOptions
|
|
||||||
{ fieldLabelModifier = camelToPathPiece' 2
|
|
||||||
} ''TokenBucketConf
|
|
||||||
|
|
||||||
deriveFromJSON defaultOptions ''Ldap.Scope
|
|
||||||
deriveFromJSON defaultOptions
|
|
||||||
{ fieldLabelModifier = camelToPathPiece' 2
|
|
||||||
} ''UserDefaultConf
|
|
||||||
|
|
||||||
deriveJSON defaultOptions
|
|
||||||
{ fieldLabelModifier = camelToPathPiece' 1
|
|
||||||
, constructorTagModifier = camelToPathPiece' 1
|
|
||||||
} ''JobMode
|
|
||||||
|
|
||||||
deriveJSON defaultOptions
|
|
||||||
{ fieldLabelModifier = camelToPathPiece' 1
|
|
||||||
} ''ARCConf
|
|
||||||
|
|
||||||
deriveJSON defaultOptions
|
|
||||||
{ fieldLabelModifier = camelToPathPiece' 1
|
|
||||||
} ''PrewarmCacheConf
|
|
||||||
|
|
||||||
makeLenses_ ''PrewarmCacheConf
|
|
||||||
|
|
||||||
nullaryPathPiece ''SettingBotMitigation $ camelToPathPiece' 3
|
|
||||||
pathPieceJSON ''SettingBotMitigation
|
|
||||||
pathPieceJSONKey ''SettingBotMitigation
|
|
||||||
|
|
||||||
makePrisms ''JobMode
|
|
||||||
makeLenses_ ''JobMode
|
|
||||||
|
|
||||||
|
|
||||||
instance FromJSON LdapConf where
|
|
||||||
parseJSON = withObject "LdapConf" $ \o -> do
|
|
||||||
ldapTls <- o .:? "tls"
|
|
||||||
tlsSettings <- case ldapTls :: Maybe String of
|
|
||||||
Just spec
|
|
||||||
| spec == "insecure" -> return $ Just Ldap.insecureTlsSettings
|
|
||||||
| spec == "default" -> return $ Just Ldap.defaultTlsSettings
|
|
||||||
| spec == "none" -> return Nothing
|
|
||||||
| spec == "notls" -> return Nothing
|
|
||||||
| null spec -> return Nothing
|
|
||||||
Nothing -> return Nothing
|
|
||||||
_otherwise -> fail "Could not parse LDAP TLSSettings"
|
|
||||||
ldapHost <- maybe Ldap.Plain (flip Ldap.Tls) tlsSettings <$> o .:? "host" .!= ""
|
|
||||||
ldapPort <- (fromIntegral :: Int -> Ldap.PortNumber) <$> o .: "port"
|
|
||||||
ldapDn <- Ldap.Dn <$> o .:? "user" .!= ""
|
|
||||||
ldapPassword <- Ldap.Password . Text.encodeUtf8 <$> o .:? "pass" .!= ""
|
|
||||||
ldapBase <- Ldap.Dn <$> o .:? "baseDN" .!= ""
|
|
||||||
ldapScope <- o .: "scope"
|
|
||||||
ldapTimeout <- o .: "timeout"
|
|
||||||
ldapSearchTimeout <- o .: "search-timeout"
|
|
||||||
ldapPool <- o .: "pool"
|
|
||||||
return LdapConf{..}
|
|
||||||
|
|
||||||
deriveFromJSON
|
|
||||||
defaultOptions
|
|
||||||
{ fieldLabelModifier = intercalate "-" . map toLower . drop 1 . splitCamel
|
|
||||||
}
|
|
||||||
''ResourcePoolConf
|
|
||||||
|
|
||||||
instance FromJSON HaskellNet.PortNumber where
|
|
||||||
parseJSON = withScientific "PortNumber" $ \sciNum -> case Scientific.toBoundedInteger sciNum of
|
|
||||||
Just int -> return $ fromIntegral (int :: Word16)
|
|
||||||
Nothing -> fail "Expected whole number of plausible size to denote port"
|
|
||||||
|
|
||||||
deriveFromJSON
|
|
||||||
defaultOptions
|
|
||||||
{ constructorTagModifier = unpack . intercalate "-" . Text.splitOn "_" . toLower . pack
|
|
||||||
, allNullaryToStringTag = True
|
|
||||||
}
|
|
||||||
''HaskellNet.AuthType
|
|
||||||
|
|
||||||
instance FromJSON LmsConf where
|
|
||||||
parseJSON = withObject "LmsConf" $ \o -> do
|
|
||||||
lmsUploadHeader <- o .: "upload-header"
|
|
||||||
lmsUploadDelimiter <- o .:? "upload-delimiter"
|
|
||||||
lmsDownloadHeader <- o .: "download-header"
|
|
||||||
lmsDownloadDelimiter <- o .: "download-delimiter"
|
|
||||||
lmsDownloadCrLf <- o .: "download-cr-lf"
|
|
||||||
lmsDeletionDays <- o .: "deletion-days"
|
|
||||||
return LmsConf{..}
|
|
||||||
|
|
||||||
makeLenses_ ''LmsConf
|
|
||||||
|
|
||||||
instance FromJSON AvsConf where
|
|
||||||
parseJSON = withObject "AvsConf" $ \o -> do
|
|
||||||
avsHost <- o .: "host"
|
|
||||||
avsPort <- o .: "port"
|
|
||||||
avsUser <- o .: "user"
|
|
||||||
avsPass <- o .:? "pass" .!= ""
|
|
||||||
return AvsConf{..}
|
|
||||||
|
|
||||||
instance FromJSON LprConf where
|
|
||||||
parseJSON = withObject "LprConf" $ \o -> do
|
|
||||||
lprHost <- o .: "host"
|
|
||||||
lprPort <- o .: "port"
|
|
||||||
lprQueue <- o .: "queue"
|
|
||||||
return LprConf{..}
|
|
||||||
|
|
||||||
instance FromJSON SmtpConf where
|
|
||||||
parseJSON = withObject "SmtpConf" $ \o -> do
|
|
||||||
smtpHost <- o .:? "host" .!= ""
|
|
||||||
smtpPort <- o .: "port"
|
|
||||||
smtpAuth <- assertM (not . null . smtpAuthUsername) <$> o .:? "auth"
|
|
||||||
smtpSsl <- o .: "ssl"
|
|
||||||
smtpPool <- o .: "pool"
|
|
||||||
return SmtpConf{..}
|
|
||||||
|
|
||||||
deriveFromJSON
|
|
||||||
defaultOptions
|
|
||||||
{ constructorTagModifier = intercalate "-" . map toLower . drop 2 . splitCamel
|
|
||||||
, allNullaryToStringTag = True
|
|
||||||
}
|
|
||||||
''SmtpSslMode
|
|
||||||
|
|
||||||
instance FromJSON SmtpAuthConf where
|
|
||||||
parseJSON = withObject "SmtpAuthConf" $ \o -> do
|
|
||||||
smtpAuthType <- o .: "type"
|
|
||||||
smtpAuthUsername <- o .:? "user" .!= ""
|
|
||||||
smtpAuthPassword <- o .:? "pass" .!= ""
|
|
||||||
return SmtpAuthConf{..}
|
|
||||||
|
|
||||||
instance FromJSON JwtEncoding where
|
|
||||||
parseJSON v@(String _) = JwsEncoding <$> parseJSON v
|
|
||||||
parseJSON v = flip (withObject "JwtEncoding") v $ \obj -> asum
|
|
||||||
[ do
|
|
||||||
alg <- obj .: "alg"
|
|
||||||
return $ JwsEncoding alg
|
|
||||||
, do
|
|
||||||
alg <- obj .: "alg"
|
|
||||||
enc <- obj .: "enc"
|
|
||||||
return $ JweEncoding alg enc
|
|
||||||
]
|
|
||||||
|
|
||||||
instance FromJSON Minio.ConnectInfo where
|
|
||||||
parseJSON v@(String _) = fromString <$> parseJSON v
|
|
||||||
parseJSON v = flip (withObject "ConnectInfo") v $ \o -> do
|
|
||||||
connectHost <- o .:? "host" .!= ""
|
|
||||||
connectPort <- o .: "port"
|
|
||||||
connectAccessKey <- o .:? "access-key" .!= ""
|
|
||||||
connectSecretKey <- o .:? "secret-key" .!= ""
|
|
||||||
connectIsSecure <- o .: "is-secure"
|
|
||||||
connectRegion <- o .:? "region" .!= ""
|
|
||||||
connectAutoDiscoverRegion <- o .:? "auto-discover-region" .!= True
|
|
||||||
connectDisableTLSCertValidation <- o .:? "disable-cert-validation" .!= False
|
|
||||||
return Minio.ConnectInfo{..}
|
|
||||||
|
|
||||||
|
|
||||||
instance FromJSON ServerSessionSettings where
|
|
||||||
parseJSON = withObject "ServerSession.State" $ \o -> do
|
|
||||||
idleTimeout <- o .:? "idle-timeout"
|
|
||||||
absoluteTimeout <- o .:? "absolute-timeout"
|
|
||||||
timeoutResolution <- o .:? "timeout-resolution"
|
|
||||||
persistentCookies <- o .:? "persistent-cookies"
|
|
||||||
return $ ServerSessionSettings (appEndo . foldMap Endo $ catMaybes
|
|
||||||
[ pure $ ServerSession.setIdleTimeout idleTimeout
|
|
||||||
, pure $ ServerSession.setAbsoluteTimeout absoluteTimeout
|
|
||||||
, pure $ ServerSession.setTimeoutResolution timeoutResolution
|
|
||||||
, ServerSession.setPersistentCookies <$> persistentCookies
|
|
||||||
])
|
|
||||||
|
|
||||||
instance FromJSON LegalExternal where
|
|
||||||
parseJSON = withObject "LegalExternal" $ \o -> do
|
|
||||||
externalLanguage <- o .: "language"
|
|
||||||
externalImprint <- o .: "imprint"
|
|
||||||
externalDataProtection <- o .: "data-protection"
|
|
||||||
externalTermsOfUse<- o .: "terms-of-use"
|
|
||||||
externalPayments <- o .: "payments"
|
|
||||||
return LegalExternal{..}
|
|
||||||
|
|
||||||
instance FromJSON AppSettings where
|
instance FromJSON AppSettings where
|
||||||
parseJSON = withObject "AppSettings" $ \o -> do
|
parseJSON = withObject "AppSettings" $ \o -> do
|
||||||
let defaultDev =
|
let defaultDev =
|
||||||
@ -627,10 +629,16 @@ instance FromJSON AppSettings where
|
|||||||
appWebpackEntrypoints <- o .: "webpack-manifest"
|
appWebpackEntrypoints <- o .: "webpack-manifest"
|
||||||
appDatabaseConf <- o .: "database"
|
appDatabaseConf <- o .: "database"
|
||||||
appAutoDbMigrate <- o .: "auto-db-migrate"
|
appAutoDbMigrate <- o .: "auto-db-migrate"
|
||||||
let nonEmptyHost LdapConf{..} = case ldapHost of
|
-- TODO: reintroduce non-emptyness check for ldap hosts
|
||||||
Ldap.Tls host _ -> not $ null host
|
-- let nonEmptyHost (UserDbLdap LdapConf{..}) = case ldapHost of
|
||||||
Ldap.Plain host -> not $ null host
|
-- Ldap.Tls host _ -> not $ null host
|
||||||
appLdapConf <- P.fromList . mapMaybe (assertM nonEmptyHost) <$> o .:? "ldap" .!= []
|
-- Ldap.Plain host -> not $ null host
|
||||||
|
-- nonEmptyHost (UserDbOAuth2 OAuth2Conf{..}) = not $ or [ null oauth2TenantId, null oauth2ClientId, null oauth2ClientSecret ]
|
||||||
|
appUserAuthConf <- o .: "user-auth"
|
||||||
|
-- P.fromList . mapMaybe (assertM nonEmptyHost) <$> o .:? "user-database" .!= []
|
||||||
|
appLdapPoolConf <- o .:? "ldap-pool"
|
||||||
|
appSingleSignOn <- o .:? "single-sign-on" .!= False
|
||||||
|
appAutoSignOn <- o .:? "auto-sign-on" .!= False
|
||||||
appLmsConf <- o .: "lms-direct"
|
appLmsConf <- o .: "lms-direct"
|
||||||
appAvsConf <- assertM (not . null . avsPass) <$> o .:? "avs"
|
appAvsConf <- assertM (not . null . avsPass) <$> o .:? "avs"
|
||||||
appLprConf <- o .: "lpr"
|
appLprConf <- o .: "lpr"
|
||||||
@ -695,14 +703,13 @@ instance FromJSON AppSettings where
|
|||||||
|
|
||||||
appSessionTimeout <- o .: "session-timeout"
|
appSessionTimeout <- o .: "session-timeout"
|
||||||
|
|
||||||
appSynchroniseLdapUsersWithin <- o .:? "synchronise-ldap-users-within"
|
-- appUserRetestFailover <- o .: "userdb-retest-failover"
|
||||||
appSynchroniseLdapUsersInterval <- o .: "synchronise-ldap-users-interval"
|
appUserSyncWithin <- o .:? "user-sync-within"
|
||||||
|
appUserSyncInterval <- o .: "user-sync-interval"
|
||||||
|
|
||||||
appSynchroniseAvsUsersWithin <- o .:? "synchronise-avs-users-within"
|
appSynchroniseAvsUsersWithin <- o .:? "synchronise-avs-users-within"
|
||||||
appSynchroniseAvsUsersInterval <- o .: "synchronise-avs-users-interval"
|
appSynchroniseAvsUsersInterval <- o .: "synchronise-avs-users-interval"
|
||||||
|
|
||||||
appLdapReTestFailover <- o .: "ldap-re-test-failover"
|
|
||||||
|
|
||||||
appSessionFilesExpire <- o .: "session-files-expire"
|
appSessionFilesExpire <- o .: "session-files-expire"
|
||||||
appKeepUnreferencedFiles <- o .:? "keep-unreferenced-files" .!= 0
|
appKeepUnreferencedFiles <- o .:? "keep-unreferenced-files" .!= 0
|
||||||
appInjectFiles <- o .:? "inject-files"
|
appInjectFiles <- o .:? "inject-files"
|
||||||
@ -816,6 +823,26 @@ instance FromJSON AppSettings where
|
|||||||
|
|
||||||
makeClassy_ ''AppSettings
|
makeClassy_ ''AppSettings
|
||||||
|
|
||||||
|
-- | Raw bytes at compile time of @config/settings.yml@
|
||||||
|
configSettingsYmlBS :: ByteString
|
||||||
|
configSettingsYmlBS = $(embedFile configSettingsYml)
|
||||||
|
|
||||||
|
-- | @config/settings.yml@, parsed to a @Value@.
|
||||||
|
configSettingsYmlValue :: Value
|
||||||
|
configSettingsYmlValue = either Exception.throw id
|
||||||
|
$ decodeEither' configSettingsYmlBS
|
||||||
|
|
||||||
|
-- | A version of @AppSettings@ parsed at compile time from @config/settings.yml@.
|
||||||
|
compileTimeAppSettings :: AppSettings
|
||||||
|
compileTimeAppSettings =
|
||||||
|
case fromJSON $ applyEnvValue False mempty configSettingsYmlValue of
|
||||||
|
Aeson.Error e -> error e
|
||||||
|
Aeson.Success settings -> settings
|
||||||
|
|
||||||
|
-- Since widgetFile above also add "templates" directory, requires import Text.Hamlet (hamletFile)
|
||||||
|
-- hamletFile' :: FilePath -> Q Exp
|
||||||
|
-- hamletFile' nameBase = hamletFile $ "templates" </> nameBase
|
||||||
|
|
||||||
-- | Settings for 'widgetFile', such as which template languages to support and
|
-- | Settings for 'widgetFile', such as which template languages to support and
|
||||||
-- default Hamlet settings.
|
-- default Hamlet settings.
|
||||||
--
|
--
|
||||||
@ -825,16 +852,6 @@ makeClassy_ ''AppSettings
|
|||||||
widgetFileSettings :: WidgetFileSettings
|
widgetFileSettings :: WidgetFileSettings
|
||||||
widgetFileSettings = def
|
widgetFileSettings = def
|
||||||
|
|
||||||
|
|
||||||
submissionBlacklist :: [Pattern]
|
|
||||||
submissionBlacklist = $$(patternFile compDefault "config/submission-blacklist")
|
|
||||||
|
|
||||||
personalisedSheetFilesCollatable :: Map Text Pattern
|
|
||||||
personalisedSheetFilesCollatable = $$(patternFile' compDefault "config/personalised-sheet-files-collate")
|
|
||||||
|
|
||||||
-- The rest of this file contains settings which rarely need changing by a
|
|
||||||
-- user.
|
|
||||||
|
|
||||||
widgetFile :: String -> Q Exp
|
widgetFile :: String -> Q Exp
|
||||||
#ifdef DEVELOPMENT
|
#ifdef DEVELOPMENT
|
||||||
widgetFile nameBase = do
|
widgetFile nameBase = do
|
||||||
@ -855,24 +872,3 @@ widgetFile
|
|||||||
| otherwise
|
| otherwise
|
||||||
= widgetFileNoReload widgetFileSettings
|
= widgetFileNoReload widgetFileSettings
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
-- Since widgetFile above also add "templates" directory, requires import Text.Hamlet (hamletFile)
|
|
||||||
-- hamletFile' :: FilePath -> Q Exp
|
|
||||||
-- hamletFile' nameBase = hamletFile $ "templates" </> nameBase
|
|
||||||
|
|
||||||
|
|
||||||
-- | Raw bytes at compile time of @config/settings.yml@
|
|
||||||
configSettingsYmlBS :: ByteString
|
|
||||||
configSettingsYmlBS = $(embedFile configSettingsYml)
|
|
||||||
|
|
||||||
-- | @config/settings.yml@, parsed to a @Value@.
|
|
||||||
configSettingsYmlValue :: Value
|
|
||||||
configSettingsYmlValue = either Exception.throw id
|
|
||||||
$ decodeEither' configSettingsYmlBS
|
|
||||||
|
|
||||||
-- | A version of @AppSettings@ parsed at compile time from @config/settings.yml@.
|
|
||||||
compileTimeAppSettings :: AppSettings
|
|
||||||
compileTimeAppSettings =
|
|
||||||
case fromJSON $ applyEnvValue False mempty configSettingsYmlValue of
|
|
||||||
Aeson.Error e -> error e
|
|
||||||
Aeson.Success settings -> settings
|
|
||||||
|
|||||||
63
src/Settings/Ldap.hs
Normal file
63
src/Settings/Ldap.hs
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2024 Sarah Vaupel <sarah.vaupel@uniworx.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
module Settings.Ldap
|
||||||
|
( LdapConf(..)
|
||||||
|
, _ldapConfHost, _ldapConfPort, _ldapConfSourceId, _ldapConfDn, _ldapConfPassword, _ldapConfBase, _ldapConfScope, _ldapConfTimeout, _ldapConfSearchTimeout
|
||||||
|
) where
|
||||||
|
|
||||||
|
import ClassyPrelude
|
||||||
|
|
||||||
|
import Utils.Lens.TH
|
||||||
|
|
||||||
|
import Control.Monad.Fail (fail)
|
||||||
|
|
||||||
|
import Data.Aeson
|
||||||
|
import qualified Data.Text.Encoding as Text
|
||||||
|
import Data.Time.Clock
|
||||||
|
|
||||||
|
import qualified Ldap.Client as Ldap
|
||||||
|
import Ldap.Client.Instances ()
|
||||||
|
|
||||||
|
|
||||||
|
data LdapConf = LdapConf
|
||||||
|
{ ldapConfHost :: Ldap.Host
|
||||||
|
, ldapConfPort :: Ldap.PortNumber
|
||||||
|
, ldapConfSourceId :: Text
|
||||||
|
-- ^ Some unique identifier for this LDAP instance, e.g. hostname or hostname:port
|
||||||
|
, ldapConfDn :: Ldap.Dn
|
||||||
|
, ldapConfPassword :: Ldap.Password
|
||||||
|
, ldapConfBase :: Ldap.Dn
|
||||||
|
, ldapConfScope :: Ldap.Scope
|
||||||
|
, ldapConfTimeout :: NominalDiffTime
|
||||||
|
, ldapConfSearchTimeout :: Int32
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
makeLenses_ ''LdapConf
|
||||||
|
|
||||||
|
instance FromJSON LdapConf where
|
||||||
|
parseJSON = withObject "LdapConf" $ \o -> do
|
||||||
|
ldapConfTls <- o .:? "tls"
|
||||||
|
tlsSettings <- case ldapConfTls :: Maybe String of
|
||||||
|
Just spec
|
||||||
|
| spec == "insecure" -> return $ Just Ldap.insecureTlsSettings
|
||||||
|
| spec == "default" -> return $ Just Ldap.defaultTlsSettings
|
||||||
|
| spec == "none" -> return Nothing
|
||||||
|
| spec == "notls" -> return Nothing
|
||||||
|
| null spec -> return Nothing
|
||||||
|
Nothing -> return Nothing
|
||||||
|
_otherwise -> fail "Could not parse LDAP TLSSettings"
|
||||||
|
hostname :: Text <- o .: "host"
|
||||||
|
port :: Int <- o .: "port"
|
||||||
|
let
|
||||||
|
ldapConfHost = maybe Ldap.Plain (flip Ldap.Tls) tlsSettings $ show hostname
|
||||||
|
ldapConfPort = fromIntegral port
|
||||||
|
ldapConfSourceId <- o .:? "source-id" .!= hostname
|
||||||
|
ldapConfDn <- Ldap.Dn <$> o .:? "user" .!= ""
|
||||||
|
ldapConfPassword <- Ldap.Password . Text.encodeUtf8 <$> o .:? "pass" .!= ""
|
||||||
|
ldapConfBase <- Ldap.Dn <$> o .:? "baseDN" .!= ""
|
||||||
|
ldapConfScope <- o .: "scope"
|
||||||
|
ldapConfTimeout <- o .: "timeout"
|
||||||
|
ldapConfSearchTimeout <- o .: "search-timeout"
|
||||||
|
return LdapConf{..}
|
||||||
32
src/Settings/OAuth2.hs
Normal file
32
src/Settings/OAuth2.hs
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2024 Sarah Vaupel <sarah.vaupel@uniworx.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
module Settings.OAuth2
|
||||||
|
( AzureConf(..)
|
||||||
|
, _azureConfClientId, _azureConfClientSecret, _azureConfTenantId, _azureConfScopes
|
||||||
|
) where
|
||||||
|
|
||||||
|
import ClassyPrelude
|
||||||
|
|
||||||
|
import Data.Aeson
|
||||||
|
import Data.Aeson.TH
|
||||||
|
import Data.UUID
|
||||||
|
|
||||||
|
import Utils.Lens.TH
|
||||||
|
import Utils.PathPiece (camelToPathPiece')
|
||||||
|
|
||||||
|
|
||||||
|
data AzureConf = AzureConf
|
||||||
|
{ azureConfClientId :: UUID
|
||||||
|
, azureConfClientSecret :: Text
|
||||||
|
, azureConfTenantId :: UUID
|
||||||
|
, azureConfScopes :: Set Text -- TODO: use AzureScopes type?
|
||||||
|
}
|
||||||
|
deriving (Show)
|
||||||
|
|
||||||
|
makeLenses_ ''AzureConf
|
||||||
|
|
||||||
|
deriveFromJSON defaultOptions
|
||||||
|
{ fieldLabelModifier = camelToPathPiece' 2
|
||||||
|
} ''AzureConf
|
||||||
30
src/Settings/ResourcePool.hs
Normal file
30
src/Settings/ResourcePool.hs
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
-- SPDX-FileCopyrightText: 2024 Sarah Vaupel <sarah.vaupel@uniworx.de>
|
||||||
|
--
|
||||||
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
module Settings.ResourcePool
|
||||||
|
( ResourcePoolConf(..)
|
||||||
|
, _poolStripes, _poolTimeout, _poolLimit
|
||||||
|
) where
|
||||||
|
|
||||||
|
import ClassyPrelude
|
||||||
|
|
||||||
|
import Utils.Lens.TH
|
||||||
|
import Utils.PathPiece (camelToPathPiece')
|
||||||
|
|
||||||
|
import Data.Aeson
|
||||||
|
import Data.Aeson.TH
|
||||||
|
import Data.Time.Clock
|
||||||
|
|
||||||
|
|
||||||
|
data ResourcePoolConf = ResourcePoolConf
|
||||||
|
{ poolStripes :: Int
|
||||||
|
, poolTimeout :: NominalDiffTime
|
||||||
|
, poolLimit :: Int
|
||||||
|
} deriving (Show)
|
||||||
|
|
||||||
|
makeLenses_ ''ResourcePoolConf
|
||||||
|
|
||||||
|
deriveFromJSON defaultOptions
|
||||||
|
{ fieldLabelModifier = camelToPathPiece' 1
|
||||||
|
} ''ResourcePoolConf
|
||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2023 Felix Hamann <felix.hamann@campus.lmu.de>,Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>
|
-- SPDX-FileCopyrightText: 2023-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Felix Hamann <felix.hamann@campus.lmu.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Sarah Vaupel <sarah.vaupel@ifi.lmu.de>, Sarah Vaupel <vaupel.sarah@campus.lmu.de>, Steffen Jost <jost@cip.ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>, Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -19,7 +19,7 @@ import Settings
|
|||||||
import Utils.Parameters
|
import Utils.Parameters
|
||||||
import Utils.Lens
|
import Utils.Lens
|
||||||
|
|
||||||
import Text.Blaze (Markup)
|
import Text.Blaze (Markup, toMarkup)
|
||||||
import qualified Text.Blaze.Internal as Blaze (null)
|
import qualified Text.Blaze.Internal as Blaze (null)
|
||||||
import qualified Data.Text as T
|
import qualified Data.Text as T
|
||||||
import qualified Data.Char as C
|
import qualified Data.Char as C
|
||||||
@ -27,6 +27,7 @@ import qualified Data.Char as C
|
|||||||
import Data.CaseInsensitive (CI)
|
import Data.CaseInsensitive (CI)
|
||||||
import qualified Data.CaseInsensitive as CI
|
import qualified Data.CaseInsensitive as CI
|
||||||
import Data.Universe
|
import Data.Universe
|
||||||
|
import qualified Data.UUID as UUID
|
||||||
|
|
||||||
import Data.List (nub, (!!))
|
import Data.List (nub, (!!))
|
||||||
import Data.Map.Lazy ((!))
|
import Data.Map.Lazy ((!))
|
||||||
@ -81,6 +82,9 @@ import qualified Data.ByteString.Base64.URL as Base64 (encodeUnpadded)
|
|||||||
import qualified Data.ByteString as BS
|
import qualified Data.ByteString as BS
|
||||||
|
|
||||||
|
|
||||||
|
fvWidget :: FieldView site -> WidgetFor site ()
|
||||||
|
fvWidget FieldView{..} = $(widgetFile "widgets/field-view/field-view")
|
||||||
|
|
||||||
------------
|
------------
|
||||||
-- Fields --
|
-- Fields --
|
||||||
------------
|
------------
|
||||||
@ -116,6 +120,17 @@ commentField msg = Field {..}
|
|||||||
fieldView _ _ _ _ _ = msg2widget msg
|
fieldView _ _ _ _ _ = msg2widget msg
|
||||||
fieldEnctype = UrlEncoded
|
fieldEnctype = UrlEncoded
|
||||||
|
|
||||||
|
uuidField :: Monad m => Field m UUID
|
||||||
|
uuidField = Field{..}
|
||||||
|
where
|
||||||
|
fieldParse = parseHelperGen $ maybe (Left $ tshow "Invalid UUID!") Right . UUID.fromText
|
||||||
|
fieldView fvId (toMarkup -> fvLabel) fvAttrs fvInput' fvRequired = fvWidget FieldView{..}
|
||||||
|
where fvTooltip = Nothing
|
||||||
|
fvErrors = either (Just . toMarkup) (const Nothing) fvInput'
|
||||||
|
fvInput = [whamlet|<input type="text" *{fvAttrs} name=#{fvLabel} :fvRequired:required value=#{fvValue}>|]
|
||||||
|
fvValue = either id UUID.toText fvInput'
|
||||||
|
fieldEnctype = UrlEncoded
|
||||||
|
|
||||||
--------------------
|
--------------------
|
||||||
-- Field Settings --
|
-- Field Settings --
|
||||||
--------------------
|
--------------------
|
||||||
@ -1259,10 +1274,6 @@ formSection formSectionTitle = do
|
|||||||
, fvInput = mempty
|
, fvInput = mempty
|
||||||
})
|
})
|
||||||
|
|
||||||
fvWidget :: FieldView site -> WidgetFor site ()
|
|
||||||
fvWidget FieldView{..} = $(widgetFile "widgets/field-view/field-view")
|
|
||||||
|
|
||||||
|
|
||||||
doFormHoneypots :: ( MonadHandler m
|
doFormHoneypots :: ( MonadHandler m
|
||||||
, HasAppSettings (HandlerSite m)
|
, HasAppSettings (HandlerSite m)
|
||||||
, YesodAuth (HandlerSite m)
|
, YesodAuth (HandlerSite m)
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022-23 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>,Steffen Jost <s.jost@fraport.de>
|
-- SPDX-FileCopyrightText: 2022-24 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Wolfgang Witt <Wolfgang.Witt@campus.lmu.de>,Steffen Jost <s.jost@fraport.de>,David Mosbach <david.mosbach@uniworx.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -81,6 +81,7 @@ data Icon
|
|||||||
| IconNavContainerClose | IconPageActionChildrenClose
|
| IconNavContainerClose | IconPageActionChildrenClose
|
||||||
| IconMenuNews
|
| IconMenuNews
|
||||||
| IconMenuHelp
|
| IconMenuHelp
|
||||||
|
| IconMenuAccount
|
||||||
| IconMenuProfile
|
| IconMenuProfile
|
||||||
| IconMenuLogin | IconMenuLogout
|
| IconMenuLogin | IconMenuLogout
|
||||||
| IconBreadcrumbsHome
|
| IconBreadcrumbsHome
|
||||||
@ -173,6 +174,7 @@ iconText = \case
|
|||||||
IconPageActionChildrenClose -> "chevron-up"
|
IconPageActionChildrenClose -> "chevron-up"
|
||||||
IconMenuNews -> "megaphone"
|
IconMenuNews -> "megaphone"
|
||||||
IconMenuHelp -> "question"
|
IconMenuHelp -> "question"
|
||||||
|
IconMenuAccount -> "user"
|
||||||
IconMenuProfile -> "cogs"
|
IconMenuProfile -> "cogs"
|
||||||
IconMenuLogin -> "sign-in-alt"
|
IconMenuLogin -> "sign-in-alt"
|
||||||
IconMenuLogout -> "sign-out-alt"
|
IconMenuLogout -> "sign-out-alt"
|
||||||
|
|||||||
@ -260,8 +260,6 @@ makeLenses_ ''ExamOccurrence
|
|||||||
|
|
||||||
makeLenses_ ''ExamOfficeLabel
|
makeLenses_ ''ExamOfficeLabel
|
||||||
|
|
||||||
makePrisms ''AuthenticationMode
|
|
||||||
|
|
||||||
makeLenses_ ''CourseUserNote
|
makeLenses_ ''CourseUserNote
|
||||||
makeLenses_ ''CourseParticipant
|
makeLenses_ ''CourseParticipant
|
||||||
|
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Gregor Kleen <gregor.kleen@ifi.lmu.de>, David Mosbach <david.mosbach@uniworx.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -20,6 +20,7 @@ data SessionKey = SessionActiveAuthTags | SessionInactiveAuthTags
|
|||||||
| SessionLang
|
| SessionLang
|
||||||
| SessionError
|
| SessionError
|
||||||
| SessionFiles
|
| SessionFiles
|
||||||
|
| SessionOAuth2Token
|
||||||
deriving (Eq, Ord, Enum, Bounded, Read, Show, Generic)
|
deriving (Eq, Ord, Enum, Bounded, Read, Show, Generic)
|
||||||
deriving anyclass (Universe, Finite)
|
deriving anyclass (Universe, Finite)
|
||||||
|
|
||||||
|
|||||||
@ -1,35 +1,16 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
{-# OPTIONS_GHC -fno-warn-unused-top-binds #-}
|
{-# OPTIONS_GHC -fno-warn-unused-top-binds #-}
|
||||||
|
|
||||||
module Utils.Users
|
module Utils.Users
|
||||||
( AuthenticationKind(..)
|
( AddUserData(..)
|
||||||
, AddUserData(..)
|
|
||||||
, addNewUser
|
, addNewUser
|
||||||
) where
|
) where
|
||||||
|
|
||||||
import Import
|
import Import
|
||||||
|
|
||||||
data AuthenticationKind = AuthKindLDAP | AuthKindPWHash | AuthKindNoLogin
|
|
||||||
deriving (Eq, Ord, Read, Show, Enum, Bounded, Generic, Universe, Finite)
|
|
||||||
--instance Universe AuthenticationKind
|
|
||||||
--instance Finite AuthenticationKind
|
|
||||||
embedRenderMessage ''UniWorX ''AuthenticationKind id
|
|
||||||
nullaryPathPiece ''AuthenticationKind $ camelToPathPiece' 2
|
|
||||||
|
|
||||||
mkAuthMode :: AuthenticationKind -> AuthenticationMode
|
|
||||||
mkAuthMode AuthKindLDAP = AuthLDAP
|
|
||||||
mkAuthMode AuthKindPWHash = AuthPWHash ""
|
|
||||||
mkAuthMode AuthKindNoLogin = AuthNoLogin
|
|
||||||
|
|
||||||
{-
|
|
||||||
classifyAuth :: AuthenticationMode -> AuthenticationKind
|
|
||||||
classifyAuth AuthLDAP = AuthKindLDAP
|
|
||||||
classifyAuth AuthPWHash{} = AuthKindPWHash
|
|
||||||
classifyAuth AuthNoLogin = AuthKindNoLogin
|
|
||||||
-}
|
|
||||||
|
|
||||||
data AddUserData = AddUserData
|
data AddUserData = AddUserData
|
||||||
{ audTitle :: Maybe Text
|
{ audTitle :: Maybe Text
|
||||||
@ -49,10 +30,11 @@ data AddUserData = AddUserData
|
|||||||
, audPinPassword :: Maybe Text
|
, audPinPassword :: Maybe Text
|
||||||
, audEmail :: UserEmail
|
, audEmail :: UserEmail
|
||||||
, audIdent :: UserIdent
|
, audIdent :: UserIdent
|
||||||
, audAuth :: AuthenticationKind
|
, audPassword :: Maybe Text
|
||||||
}
|
}
|
||||||
|
|
||||||
-- | Adds a new user to database, no background jobs are scheduled, no notifications send
|
|
||||||
|
-- | Adds a new user to database; no background jobs are scheduled, no notifications sent
|
||||||
addNewUser :: AddUserData -> Handler (Maybe UserId)
|
addNewUser :: AddUserData -> Handler (Maybe UserId)
|
||||||
addNewUser AddUserData{..} = do
|
addNewUser AddUserData{..} = do
|
||||||
now <- liftIO getCurrentTime
|
now <- liftIO getCurrentTime
|
||||||
@ -60,6 +42,8 @@ addNewUser AddUserData{..} = do
|
|||||||
let
|
let
|
||||||
newUser = User
|
newUser = User
|
||||||
{ userIdent = audIdent
|
{ userIdent = audIdent
|
||||||
|
, userLastAuthentication = Nothing
|
||||||
|
, userPasswordHash = audPassword
|
||||||
, userMaxFavourites = userDefaultMaxFavourites
|
, userMaxFavourites = userDefaultMaxFavourites
|
||||||
, userMaxFavouriteTerms = userDefaultMaxFavouriteTerms
|
, userMaxFavouriteTerms = userDefaultMaxFavouriteTerms
|
||||||
, userTheme = userDefaultTheme
|
, userTheme = userDefaultTheme
|
||||||
@ -76,9 +60,6 @@ addNewUser AddUserData{..} = do
|
|||||||
, userCsvOptions = def { csvFormat = review csvPreset CsvPresetXlsx }
|
, userCsvOptions = def { csvFormat = review csvPreset CsvPresetXlsx }
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = audFPersonalNumber
|
|
||||||
, userLastAuthentication = Nothing
|
|
||||||
, userEmail = audEmail
|
, userEmail = audEmail
|
||||||
, userDisplayName = audDisplayName
|
, userDisplayName = audDisplayName
|
||||||
, userDisplayEmail = audDisplayEmail
|
, userDisplayEmail = audDisplayEmail
|
||||||
@ -96,6 +77,6 @@ addNewUser AddUserData{..} = do
|
|||||||
, userPrefersPostal = audPrefersPostal
|
, userPrefersPostal = audPrefersPostal
|
||||||
, userPinPassword = audPinPassword
|
, userPinPassword = audPinPassword
|
||||||
, userMatrikelnummer = audMatriculation
|
, userMatrikelnummer = audMatriculation
|
||||||
, userAuthentication = mkAuthMode audAuth
|
, userLastSync = Nothing -- TODO: combine add user with external sync?
|
||||||
}
|
}
|
||||||
runDB $ insertUnique newUser
|
runDB $ insertUnique newUser
|
||||||
@ -30,7 +30,7 @@ import Control.Lens.Extras
|
|||||||
import Foundation.Servant.Types
|
import Foundation.Servant.Types
|
||||||
|
|
||||||
import Utils hiding (HasRoute)
|
import Utils hiding (HasRoute)
|
||||||
import Model.Types.Security
|
import Model.Types.Auth
|
||||||
|
|
||||||
import Yesod.Core ( Yesod
|
import Yesod.Core ( Yesod
|
||||||
, RenderRoute(..), ParseRoute(..)
|
, RenderRoute(..), ParseRoute(..)
|
||||||
|
|||||||
33
stack.yaml
33
stack.yaml
@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -26,33 +26,33 @@ packages:
|
|||||||
- .
|
- .
|
||||||
|
|
||||||
extra-deps:
|
extra-deps:
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/encoding.git
|
- git: https://gitlab.uniworx.de/haskell/encoding.git
|
||||||
commit: 22fc3bb14841d8d50997aa47f1be3852e666f787
|
commit: 22fc3bb14841d8d50997aa47f1be3852e666f787
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/memcached-binary.git
|
- git: https://gitlab.uniworx.de/haskell/memcached-binary.git
|
||||||
commit: b7071df50bad3a251a544b984e4bf98fa09b8fae
|
commit: b7071df50bad3a251a544b984e4bf98fa09b8fae
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/conduit-resumablesink.git
|
- git: https://gitlab.uniworx.de/haskell/conduit-resumablesink.git
|
||||||
commit: cbea6159c2975d42f948525e03e12fc390da53c5
|
commit: cbea6159c2975d42f948525e03e12fc390da53c5
|
||||||
- git: https://github.com/jtdaugherty/HaskellNet.git
|
- git: https://github.com/jtdaugherty/HaskellNet.git
|
||||||
commit: 5aa1f3b009253b02c4822005ac59ee208a10a347
|
commit: 5aa1f3b009253b02c4822005ac59ee208a10a347
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/HaskellNet-SSL.git
|
- git: https://gitlab.uniworx.de/haskell/HaskellNet-SSL.git
|
||||||
commit: 40393c938111ac78232dc2c7eec5edb4a22d03e8
|
commit: 40393c938111ac78232dc2c7eec5edb4a22d03e8
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/ldap-client.git
|
- git: https://gitlab.uniworx.de/haskell/ldap-client.git
|
||||||
commit: 01afaf599ba6f8a9d804c269e91d3190b249d3f0
|
commit: 01afaf599ba6f8a9d804c269e91d3190b249d3f0
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/serversession.git
|
- git: https://gitlab.uniworx.de/haskell/serversession.git
|
||||||
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
||||||
subdirs:
|
subdirs:
|
||||||
- serversession
|
- serversession
|
||||||
- serversession-backend-acid-state
|
- serversession-backend-acid-state
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/xss-sanitize.git
|
- git: https://gitlab.uniworx.de/haskell/xss-sanitize.git
|
||||||
commit: dc928c3a456074b8777603bea20e81937321777f
|
commit: dc928c3a456074b8777603bea20e81937321777f
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/colonnade.git
|
- git: https://gitlab.uniworx.de/haskell/colonnade.git
|
||||||
commit: f8170266ab25b533576e96715bedffc5aa4f19fa
|
commit: f8170266ab25b533576e96715bedffc5aa4f19fa
|
||||||
subdirs:
|
subdirs:
|
||||||
- colonnade
|
- colonnade
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/minio-hs.git
|
- git: https://gitlab.uniworx.de/haskell/minio-hs.git
|
||||||
commit: 42103ab247057c04c8ce7a83d9d4c160713a3df1
|
commit: 42103ab247057c04c8ce7a83d9d4c160713a3df1
|
||||||
|
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
- git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
subdirs:
|
subdirs:
|
||||||
- cryptoids-class
|
- cryptoids-class
|
||||||
@ -67,10 +67,10 @@ extra-deps:
|
|||||||
- gearhash
|
- gearhash
|
||||||
- fastcdc
|
- fastcdc
|
||||||
|
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/zip-stream.git
|
- git: https://gitlab.uniworx.de/haskell/zip-stream.git
|
||||||
commit: 843683d024f767de236f74d24a3348f69181a720
|
commit: 843683d024f767de236f74d24a3348f69181a720
|
||||||
|
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
- git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7 # <- references debug with traceStack; master ref: cb75191e0c5490246ae2cbcc2a00e7985cf2aadb
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7 # <- references debug with traceStack; master ref: cb75191e0c5490246ae2cbcc2a00e7985cf2aadb
|
||||||
subdirs:
|
subdirs:
|
||||||
- yesod-core
|
- yesod-core
|
||||||
@ -88,10 +88,13 @@ extra-deps:
|
|||||||
- yesod-eventsource
|
- yesod-eventsource
|
||||||
- yesod-websockets
|
- yesod-websockets
|
||||||
|
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptonite.git
|
- git: https://github.com/freckle/yesod-auth-oauth2
|
||||||
|
commit: 342dac80e40b10f07694a7e9aa8bab6d03ed6d66
|
||||||
|
|
||||||
|
- git: https://gitlab.uniworx.de/haskell/cryptonite.git
|
||||||
commit: 71a630edaf5f22c464e24fac8d9d310f4055ea1f
|
commit: 71a630edaf5f22c464e24fac8d9d310f4055ea1f
|
||||||
|
|
||||||
- git: https://gitlab.ifi.lmu.de/uni2work/haskell/esqueleto.git
|
- git: https://gitlab.uniworx.de/haskell/esqueleto.git
|
||||||
commit: e18dd125c5ea26fa4e88bed079b61d8c1365ee37
|
commit: e18dd125c5ea26fa4e88bed079b61d8c1365ee37
|
||||||
|
|
||||||
- classy-prelude-yesod-1.5.0@sha256:8f7e183bdfd6d2ea9674284c4f285294ab086aff60d9be4e5d7d2f3c1a2b05b7,1330
|
- classy-prelude-yesod-1.5.0@sha256:8f7e183bdfd6d2ea9674284c4f285294ab086aff60d9be4e5d7d2f3c1a2b05b7,1330
|
||||||
|
|||||||
551
stack.yaml.lock
551
stack.yaml.lock
@ -5,539 +5,550 @@
|
|||||||
|
|
||||||
packages:
|
packages:
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: 22fc3bb14841d8d50997aa47f1be3852e666f787
|
||||||
|
git: https://gitlab.uniworx.de/haskell/encoding.git
|
||||||
name: encoding
|
name: encoding
|
||||||
version: 0.8.2
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/encoding.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 5723
|
|
||||||
sha256: fec12328951021bb4d9326ae0b35f0c459e65f28442366efd4366cd1e18abe19
|
sha256: fec12328951021bb4d9326ae0b35f0c459e65f28442366efd4366cd1e18abe19
|
||||||
commit: 22fc3bb14841d8d50997aa47f1be3852e666f787
|
size: 5723
|
||||||
|
version: 0.8.2
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/encoding.git
|
|
||||||
commit: 22fc3bb14841d8d50997aa47f1be3852e666f787
|
commit: 22fc3bb14841d8d50997aa47f1be3852e666f787
|
||||||
|
git: https://gitlab.uniworx.de/haskell/encoding.git
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: b7071df50bad3a251a544b984e4bf98fa09b8fae
|
||||||
|
git: https://gitlab.uniworx.de/haskell/memcached-binary.git
|
||||||
name: memcached-binary
|
name: memcached-binary
|
||||||
version: 0.2.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/memcached-binary.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 1277
|
|
||||||
sha256: 0da0539b7b9a56d03a116dcd666bc1bbbef085659910420849484d1418aa0857
|
sha256: 0da0539b7b9a56d03a116dcd666bc1bbbef085659910420849484d1418aa0857
|
||||||
commit: b7071df50bad3a251a544b984e4bf98fa09b8fae
|
size: 1277
|
||||||
|
version: 0.2.0
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/memcached-binary.git
|
|
||||||
commit: b7071df50bad3a251a544b984e4bf98fa09b8fae
|
commit: b7071df50bad3a251a544b984e4bf98fa09b8fae
|
||||||
|
git: https://gitlab.uniworx.de/haskell/memcached-binary.git
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: cbea6159c2975d42f948525e03e12fc390da53c5
|
||||||
|
git: https://gitlab.uniworx.de/haskell/conduit-resumablesink.git
|
||||||
name: conduit-resumablesink
|
name: conduit-resumablesink
|
||||||
version: '0.3'
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/conduit-resumablesink.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 394
|
|
||||||
sha256: 0cccf4684bbd84f81d2d3d53dd81c46cb103b5322f1d8e89e9b222211281e1b7
|
sha256: 0cccf4684bbd84f81d2d3d53dd81c46cb103b5322f1d8e89e9b222211281e1b7
|
||||||
commit: cbea6159c2975d42f948525e03e12fc390da53c5
|
size: 394
|
||||||
|
version: '0.3'
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/conduit-resumablesink.git
|
|
||||||
commit: cbea6159c2975d42f948525e03e12fc390da53c5
|
commit: cbea6159c2975d42f948525e03e12fc390da53c5
|
||||||
|
git: https://gitlab.uniworx.de/haskell/conduit-resumablesink.git
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: 5aa1f3b009253b02c4822005ac59ee208a10a347
|
||||||
|
git: https://github.com/jtdaugherty/HaskellNet.git
|
||||||
name: HaskellNet
|
name: HaskellNet
|
||||||
version: 0.5.1
|
|
||||||
git: https://github.com/jtdaugherty/HaskellNet.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 4011
|
|
||||||
sha256: 921b437ef18ccb04f889301c407263d6b5b72c5864803a000b1e61328988ce70
|
sha256: 921b437ef18ccb04f889301c407263d6b5b72c5864803a000b1e61328988ce70
|
||||||
commit: 5aa1f3b009253b02c4822005ac59ee208a10a347
|
size: 4011
|
||||||
|
version: 0.5.1
|
||||||
original:
|
original:
|
||||||
|
commit: 5aa1f3b009253b02c4822005ac59ee208a10a347
|
||||||
git: https://github.com/jtdaugherty/HaskellNet.git
|
git: https://github.com/jtdaugherty/HaskellNet.git
|
||||||
commit: 5aa1f3b009253b02c4822005ac59ee208a10a347
|
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: 40393c938111ac78232dc2c7eec5edb4a22d03e8
|
||||||
|
git: https://gitlab.uniworx.de/haskell/HaskellNet-SSL.git
|
||||||
name: HaskellNet-SSL
|
name: HaskellNet-SSL
|
||||||
version: 0.3.4.1
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/HaskellNet-SSL.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 841
|
|
||||||
sha256: 95dcec22fdb8af986e59f0f60aa76d4a48f34a546dca799bd571e1d183f773e0
|
sha256: 95dcec22fdb8af986e59f0f60aa76d4a48f34a546dca799bd571e1d183f773e0
|
||||||
commit: 40393c938111ac78232dc2c7eec5edb4a22d03e8
|
size: 841
|
||||||
|
version: 0.3.4.1
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/HaskellNet-SSL.git
|
|
||||||
commit: 40393c938111ac78232dc2c7eec5edb4a22d03e8
|
commit: 40393c938111ac78232dc2c7eec5edb4a22d03e8
|
||||||
|
git: https://gitlab.uniworx.de/haskell/HaskellNet-SSL.git
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: 01afaf599ba6f8a9d804c269e91d3190b249d3f0
|
||||||
|
git: https://gitlab.uniworx.de/haskell/ldap-client.git
|
||||||
name: ldap-client
|
name: ldap-client
|
||||||
version: 0.4.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/ldap-client.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 6176
|
|
||||||
sha256: 3fa8f102427b437b2baaec15cf884e88b47a1621b1c3fd4d8919f0263fde8656
|
sha256: 3fa8f102427b437b2baaec15cf884e88b47a1621b1c3fd4d8919f0263fde8656
|
||||||
commit: 01afaf599ba6f8a9d804c269e91d3190b249d3f0
|
size: 6176
|
||||||
|
version: 0.4.0
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/ldap-client.git
|
|
||||||
commit: 01afaf599ba6f8a9d804c269e91d3190b249d3f0
|
commit: 01afaf599ba6f8a9d804c269e91d3190b249d3f0
|
||||||
|
git: https://gitlab.uniworx.de/haskell/ldap-client.git
|
||||||
- completed:
|
- completed:
|
||||||
subdir: serversession
|
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
||||||
|
git: https://gitlab.uniworx.de/haskell/serversession.git
|
||||||
name: serversession
|
name: serversession
|
||||||
version: 1.0.2
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/serversession.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 545
|
|
||||||
sha256: 83ac78a987399db3da62f84bbd335fead11aadebd57251d0688127fca984db23
|
sha256: 83ac78a987399db3da62f84bbd335fead11aadebd57251d0688127fca984db23
|
||||||
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
size: 545
|
||||||
original:
|
|
||||||
subdir: serversession
|
subdir: serversession
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/serversession.git
|
version: 1.0.2
|
||||||
|
original:
|
||||||
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
||||||
|
git: https://gitlab.uniworx.de/haskell/serversession.git
|
||||||
|
subdir: serversession
|
||||||
- completed:
|
- completed:
|
||||||
subdir: serversession-backend-acid-state
|
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
||||||
|
git: https://gitlab.uniworx.de/haskell/serversession.git
|
||||||
name: serversession-backend-acid-state
|
name: serversession-backend-acid-state
|
||||||
version: 1.0.4
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/serversession.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 544
|
|
||||||
sha256: 4804260c6245c12e1728c78dd33bf16e95b7f2b69b38b6900a4e65b1ef3e04b7
|
sha256: 4804260c6245c12e1728c78dd33bf16e95b7f2b69b38b6900a4e65b1ef3e04b7
|
||||||
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
size: 544
|
||||||
original:
|
|
||||||
subdir: serversession-backend-acid-state
|
subdir: serversession-backend-acid-state
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/serversession.git
|
version: 1.0.4
|
||||||
|
original:
|
||||||
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
commit: fda3a000f9039e35e76e28f8e88c4942fac9fd69
|
||||||
|
git: https://gitlab.uniworx.de/haskell/serversession.git
|
||||||
|
subdir: serversession-backend-acid-state
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: dc928c3a456074b8777603bea20e81937321777f
|
||||||
|
git: https://gitlab.uniworx.de/haskell/xss-sanitize.git
|
||||||
name: xss-sanitize
|
name: xss-sanitize
|
||||||
version: 0.3.6
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/xss-sanitize.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 750
|
|
||||||
sha256: f567a1c834448daaa164f2029fad164e6c8df2d4c92b51f811bae19cc0c95975
|
sha256: f567a1c834448daaa164f2029fad164e6c8df2d4c92b51f811bae19cc0c95975
|
||||||
commit: dc928c3a456074b8777603bea20e81937321777f
|
size: 750
|
||||||
|
version: 0.3.6
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/xss-sanitize.git
|
|
||||||
commit: dc928c3a456074b8777603bea20e81937321777f
|
commit: dc928c3a456074b8777603bea20e81937321777f
|
||||||
|
git: https://gitlab.uniworx.de/haskell/xss-sanitize.git
|
||||||
- completed:
|
- completed:
|
||||||
subdir: colonnade
|
commit: f8170266ab25b533576e96715bedffc5aa4f19fa
|
||||||
|
git: https://gitlab.uniworx.de/haskell/colonnade.git
|
||||||
name: colonnade
|
name: colonnade
|
||||||
version: 1.2.0.2
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/colonnade.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 481
|
|
||||||
sha256: 392393652cc0f354d351482557b9385c8e6122e706359b030373656565f2e045
|
sha256: 392393652cc0f354d351482557b9385c8e6122e706359b030373656565f2e045
|
||||||
commit: f8170266ab25b533576e96715bedffc5aa4f19fa
|
size: 481
|
||||||
original:
|
|
||||||
subdir: colonnade
|
subdir: colonnade
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/colonnade.git
|
version: 1.2.0.2
|
||||||
|
original:
|
||||||
commit: f8170266ab25b533576e96715bedffc5aa4f19fa
|
commit: f8170266ab25b533576e96715bedffc5aa4f19fa
|
||||||
|
git: https://gitlab.uniworx.de/haskell/colonnade.git
|
||||||
|
subdir: colonnade
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: 42103ab247057c04c8ce7a83d9d4c160713a3df1
|
||||||
|
git: https://gitlab.uniworx.de/haskell/minio-hs.git
|
||||||
name: minio-hs
|
name: minio-hs
|
||||||
version: 1.5.2
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/minio-hs.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 4560
|
|
||||||
sha256: c5faff15fa22a7a63f45cd903c9bd11ae03f422c26f24750f5c44cb4d0db70fc
|
sha256: c5faff15fa22a7a63f45cd903c9bd11ae03f422c26f24750f5c44cb4d0db70fc
|
||||||
commit: 42103ab247057c04c8ce7a83d9d4c160713a3df1
|
size: 4560
|
||||||
|
version: 1.5.2
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/minio-hs.git
|
|
||||||
commit: 42103ab247057c04c8ce7a83d9d4c160713a3df1
|
commit: 42103ab247057c04c8ce7a83d9d4c160713a3df1
|
||||||
|
git: https://gitlab.uniworx.de/haskell/minio-hs.git
|
||||||
- completed:
|
- completed:
|
||||||
subdir: cryptoids-class
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
name: cryptoids-class
|
name: cryptoids-class
|
||||||
version: 0.0.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 412
|
|
||||||
sha256: 30466648d273ffb1d580b7961188d67a0bedb3703d6d5f8cca3c15a45295f203
|
sha256: 30466648d273ffb1d580b7961188d67a0bedb3703d6d5f8cca3c15a45295f203
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
size: 412
|
||||||
original:
|
|
||||||
subdir: cryptoids-class
|
subdir: cryptoids-class
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
- completed:
|
|
||||||
subdir: cryptoids-types
|
|
||||||
name: cryptoids-types
|
|
||||||
version: 1.0.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
pantry-tree:
|
|
||||||
size: 320
|
|
||||||
sha256: 824ac5c55c2ad553bd401bb5a99731bbdccc828ecc5d71f174e9375c4e03c46e
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
original:
|
|
||||||
subdir: cryptoids-types
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
- completed:
|
|
||||||
subdir: cryptoids
|
|
||||||
name: cryptoids
|
|
||||||
version: 0.5.1.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
pantry-tree:
|
|
||||||
size: 566
|
|
||||||
sha256: b1f49dde76ff7e78b76e7f2f3b3f76c55e5e61555d1df5415ad3b6eb80dda2cb
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
original:
|
|
||||||
subdir: cryptoids
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
- completed:
|
|
||||||
subdir: filepath-crypto
|
|
||||||
name: filepath-crypto
|
|
||||||
version: 0.1.0.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
pantry-tree:
|
|
||||||
size: 676
|
|
||||||
sha256: 9c31a2ffb2b1c86f9ba34eb83529c7a5a7dc68a49f89813c9b553427474654d9
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
original:
|
|
||||||
subdir: filepath-crypto
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
- completed:
|
|
||||||
subdir: uuid-crypto
|
|
||||||
name: uuid-crypto
|
|
||||||
version: 1.4.0.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
pantry-tree:
|
|
||||||
size: 417
|
|
||||||
sha256: 852e59807df1f2cf4b5a3748c46fa149d15a78651c93addfe5fc31d2d94c47f4
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
original:
|
|
||||||
subdir: uuid-crypto
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptoids.git
|
|
||||||
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
|
||||||
- completed:
|
|
||||||
subdir: gearhash
|
|
||||||
name: gearhash
|
|
||||||
version: 1.0.0
|
|
||||||
git: https://github.com/gkleen/FastCDC.git
|
|
||||||
pantry-tree:
|
|
||||||
size: 551
|
|
||||||
sha256: 89c58554f6780bff2a2cab86e94d2f562eea34e8025a9925bfdc25b56c925d3e
|
|
||||||
commit: f216e3c0a1efa11a62fd4c9c2db38f7e2b7ac72d
|
|
||||||
original:
|
|
||||||
subdir: gearhash
|
|
||||||
git: https://github.com/gkleen/FastCDC.git
|
|
||||||
commit: f216e3c0a1efa11a62fd4c9c2db38f7e2b7ac72d
|
|
||||||
- completed:
|
|
||||||
subdir: fastcdc
|
|
||||||
name: fastcdc
|
|
||||||
version: 0.0.0
|
version: 0.0.0
|
||||||
git: https://github.com/gkleen/FastCDC.git
|
original:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
subdir: cryptoids-class
|
||||||
|
- completed:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
name: cryptoids-types
|
||||||
|
pantry-tree:
|
||||||
|
sha256: 824ac5c55c2ad553bd401bb5a99731bbdccc828ecc5d71f174e9375c4e03c46e
|
||||||
|
size: 320
|
||||||
|
subdir: cryptoids-types
|
||||||
|
version: 1.0.0
|
||||||
|
original:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
subdir: cryptoids-types
|
||||||
|
- completed:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
name: cryptoids
|
||||||
|
pantry-tree:
|
||||||
|
sha256: b1f49dde76ff7e78b76e7f2f3b3f76c55e5e61555d1df5415ad3b6eb80dda2cb
|
||||||
|
size: 566
|
||||||
|
subdir: cryptoids
|
||||||
|
version: 0.5.1.0
|
||||||
|
original:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
subdir: cryptoids
|
||||||
|
- completed:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
name: filepath-crypto
|
||||||
|
pantry-tree:
|
||||||
|
sha256: 9c31a2ffb2b1c86f9ba34eb83529c7a5a7dc68a49f89813c9b553427474654d9
|
||||||
|
size: 676
|
||||||
|
subdir: filepath-crypto
|
||||||
|
version: 0.1.0.0
|
||||||
|
original:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
subdir: filepath-crypto
|
||||||
|
- completed:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
name: uuid-crypto
|
||||||
|
pantry-tree:
|
||||||
|
sha256: 852e59807df1f2cf4b5a3748c46fa149d15a78651c93addfe5fc31d2d94c47f4
|
||||||
|
size: 417
|
||||||
|
subdir: uuid-crypto
|
||||||
|
version: 1.4.0.0
|
||||||
|
original:
|
||||||
|
commit: 130b0dcbf2b09ccdf387b50262f1efbbbf1819e3
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptoids.git
|
||||||
|
subdir: uuid-crypto
|
||||||
|
- completed:
|
||||||
|
commit: f216e3c0a1efa11a62fd4c9c2db38f7e2b7ac72d
|
||||||
|
git: https://github.com/gkleen/FastCDC.git
|
||||||
|
name: gearhash
|
||||||
|
pantry-tree:
|
||||||
|
sha256: 89c58554f6780bff2a2cab86e94d2f562eea34e8025a9925bfdc25b56c925d3e
|
||||||
|
size: 551
|
||||||
|
subdir: gearhash
|
||||||
|
version: 1.0.0
|
||||||
|
original:
|
||||||
|
commit: f216e3c0a1efa11a62fd4c9c2db38f7e2b7ac72d
|
||||||
|
git: https://github.com/gkleen/FastCDC.git
|
||||||
|
subdir: gearhash
|
||||||
|
- completed:
|
||||||
|
commit: f216e3c0a1efa11a62fd4c9c2db38f7e2b7ac72d
|
||||||
|
git: https://github.com/gkleen/FastCDC.git
|
||||||
|
name: fastcdc
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 292
|
|
||||||
sha256: aa588b55c7c9c079e39569489a8089ec312f0538d02cf0e1fffe2f0e058566b8
|
sha256: aa588b55c7c9c079e39569489a8089ec312f0538d02cf0e1fffe2f0e058566b8
|
||||||
commit: f216e3c0a1efa11a62fd4c9c2db38f7e2b7ac72d
|
size: 292
|
||||||
original:
|
|
||||||
subdir: fastcdc
|
subdir: fastcdc
|
||||||
git: https://github.com/gkleen/FastCDC.git
|
version: 0.0.0
|
||||||
|
original:
|
||||||
commit: f216e3c0a1efa11a62fd4c9c2db38f7e2b7ac72d
|
commit: f216e3c0a1efa11a62fd4c9c2db38f7e2b7ac72d
|
||||||
|
git: https://github.com/gkleen/FastCDC.git
|
||||||
|
subdir: fastcdc
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: 843683d024f767de236f74d24a3348f69181a720
|
||||||
|
git: https://gitlab.uniworx.de/haskell/zip-stream.git
|
||||||
name: zip-stream
|
name: zip-stream
|
||||||
version: 0.2.0.1
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/zip-stream.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 812
|
|
||||||
sha256: 0da8bc38d73034962d2e2d1a7586b6dee848a629319fce9cbbf578348c61118c
|
sha256: 0da8bc38d73034962d2e2d1a7586b6dee848a629319fce9cbbf578348c61118c
|
||||||
commit: 843683d024f767de236f74d24a3348f69181a720
|
size: 812
|
||||||
|
version: 0.2.0.1
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/zip-stream.git
|
|
||||||
commit: 843683d024f767de236f74d24a3348f69181a720
|
commit: 843683d024f767de236f74d24a3348f69181a720
|
||||||
|
git: https://gitlab.uniworx.de/haskell/zip-stream.git
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-core
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-core
|
name: yesod-core
|
||||||
version: 1.6.20.2
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 5954
|
|
||||||
sha256: 08c8da10b32c8d9f784238fd87232bf90b752e82f81ef2c52c62210f9aadda9a
|
sha256: 08c8da10b32c8d9f784238fd87232bf90b752e82f81ef2c52c62210f9aadda9a
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 5954
|
||||||
original:
|
|
||||||
subdir: yesod-core
|
subdir: yesod-core
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.20.2
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-core
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-static
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-static
|
name: yesod-static
|
||||||
version: 1.6.1.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 2949
|
|
||||||
sha256: 32c1608243a5309005ce11e2aa379ac1d6f8c380c529785eb510770118f3da06
|
sha256: 32c1608243a5309005ce11e2aa379ac1d6f8c380c529785eb510770118f3da06
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 2949
|
||||||
original:
|
|
||||||
subdir: yesod-static
|
subdir: yesod-static
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.1.0
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-static
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-persistent
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-persistent
|
name: yesod-persistent
|
||||||
version: 1.6.0.7
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 497
|
|
||||||
sha256: 3778ef2964e1a3890afc22cc9124eacb40e64b62bed4983a85d3b99897f54c5c
|
sha256: 3778ef2964e1a3890afc22cc9124eacb40e64b62bed4983a85d3b99897f54c5c
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 497
|
||||||
original:
|
|
||||||
subdir: yesod-persistent
|
subdir: yesod-persistent
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.0.7
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-persistent
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-newsfeed
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-newsfeed
|
name: yesod-newsfeed
|
||||||
version: 1.7.0.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 488
|
|
||||||
sha256: 53ebad62655863a657dcf749ffd3de46f6af90dd71f55bc4d50805ac48ddb099
|
sha256: 53ebad62655863a657dcf749ffd3de46f6af90dd71f55bc4d50805ac48ddb099
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 488
|
||||||
original:
|
|
||||||
subdir: yesod-newsfeed
|
subdir: yesod-newsfeed
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.7.0.0
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-newsfeed
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-form
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-form
|
name: yesod-form
|
||||||
version: 1.7.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 1914
|
|
||||||
sha256: 260b7f16a8e1d58da137eb91aeed3a11ccbe59ba3e614457a635b9dc3e71426f
|
sha256: 260b7f16a8e1d58da137eb91aeed3a11ccbe59ba3e614457a635b9dc3e71426f
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 1914
|
||||||
original:
|
|
||||||
subdir: yesod-form
|
subdir: yesod-form
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.7.0
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-form
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-form-multi
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-form-multi
|
name: yesod-form-multi
|
||||||
version: 1.7.0.2
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 328
|
|
||||||
sha256: b21fc50db43733dfe6e285345856610ba4feb83329e9cf953bf8047ba18ecbd6
|
sha256: b21fc50db43733dfe6e285345856610ba4feb83329e9cf953bf8047ba18ecbd6
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 328
|
||||||
original:
|
|
||||||
subdir: yesod-form-multi
|
subdir: yesod-form-multi
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.7.0.2
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-form-multi
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-auth
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-auth
|
name: yesod-auth
|
||||||
version: 1.6.10.3
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 1212
|
|
||||||
sha256: d335b940a207f8155f421b7146746a72d20db6ad54412154f2c829a59bf21e08
|
sha256: d335b940a207f8155f421b7146746a72d20db6ad54412154f2c829a59bf21e08
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 1212
|
||||||
original:
|
|
||||||
subdir: yesod-auth
|
subdir: yesod-auth
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.10.3
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-auth
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-auth-oauth
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-auth-oauth
|
name: yesod-auth-oauth
|
||||||
version: 1.6.0.3
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 321
|
|
||||||
sha256: 39d2f7d5d1abb3a2953858c5f23880e60ecfcdad0549ddc2570204f9c47649f4
|
sha256: 39d2f7d5d1abb3a2953858c5f23880e60ecfcdad0549ddc2570204f9c47649f4
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 321
|
||||||
original:
|
|
||||||
subdir: yesod-auth-oauth
|
subdir: yesod-auth-oauth
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.0.3
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-auth-oauth
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-sitemap
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-sitemap
|
name: yesod-sitemap
|
||||||
version: 1.6.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 314
|
|
||||||
sha256: 971f48af7011ff7816872d067e5de9cadafdd371bdf209170b77df36001abd27
|
sha256: 971f48af7011ff7816872d067e5de9cadafdd371bdf209170b77df36001abd27
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 314
|
||||||
original:
|
|
||||||
subdir: yesod-sitemap
|
subdir: yesod-sitemap
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.0
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-sitemap
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-test
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-test
|
name: yesod-test
|
||||||
version: 1.6.12
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 563
|
|
||||||
sha256: 3d5022e8e3f8e77abcf075c42cf49efaa26f4951159bbb5ab50b69fdfeacb7c1
|
sha256: 3d5022e8e3f8e77abcf075c42cf49efaa26f4951159bbb5ab50b69fdfeacb7c1
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 563
|
||||||
original:
|
|
||||||
subdir: yesod-test
|
subdir: yesod-test
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.12
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-test
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-bin
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-bin
|
name: yesod-bin
|
||||||
version: 1.6.1
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 1295
|
|
||||||
sha256: 422d7816965b79826c6c24582d76dadbacd1bfb3e9a8f31208867cd788f2a5b8
|
sha256: 422d7816965b79826c6c24582d76dadbacd1bfb3e9a8f31208867cd788f2a5b8
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 1295
|
||||||
original:
|
|
||||||
subdir: yesod-bin
|
subdir: yesod-bin
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.1
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-bin
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod
|
name: yesod
|
||||||
version: 1.6.1.1
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 666
|
|
||||||
sha256: cb53ef3f2036185d2b4752d6fbc5d78470b4504e646e7eb4dd2397f2599daf42
|
sha256: cb53ef3f2036185d2b4752d6fbc5d78470b4504e646e7eb4dd2397f2599daf42
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 666
|
||||||
original:
|
|
||||||
subdir: yesod
|
subdir: yesod
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.1.1
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-eventsource
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-eventsource
|
name: yesod-eventsource
|
||||||
version: 1.6.0.1
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 324
|
|
||||||
sha256: 6d393201852cd024e377159ba836398e24d191563e08165430113d3c1384aff2
|
sha256: 6d393201852cd024e377159ba836398e24d191563e08165430113d3c1384aff2
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 324
|
||||||
original:
|
|
||||||
subdir: yesod-eventsource
|
subdir: yesod-eventsource
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 1.6.0.1
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-eventsource
|
||||||
- completed:
|
- completed:
|
||||||
subdir: yesod-websockets
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
name: yesod-websockets
|
name: yesod-websockets
|
||||||
version: 0.3.0.3
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 485
|
|
||||||
sha256: 02df6117e9b74a77879ea750130ba2d8ad8d3c99e14ca678320cb578984301e5
|
sha256: 02df6117e9b74a77879ea750130ba2d8ad8d3c99e14ca678320cb578984301e5
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
size: 485
|
||||||
original:
|
|
||||||
subdir: yesod-websockets
|
subdir: yesod-websockets
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/yesod.git
|
version: 0.3.0.3
|
||||||
|
original:
|
||||||
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
commit: aa671eb41fdad360f2f7cb844f8de03479efe3f7
|
||||||
|
git: https://gitlab.uniworx.de/haskell/yesod.git
|
||||||
|
subdir: yesod-websockets
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: 342dac80e40b10f07694a7e9aa8bab6d03ed6d66
|
||||||
|
git: https://github.com/freckle/yesod-auth-oauth2
|
||||||
|
name: yesod-auth-oauth2
|
||||||
|
pantry-tree:
|
||||||
|
sha256: 22e8be5c8128e2f0fb976cb904ac93cefb49e6feef6bcadb7746641be11dcb13
|
||||||
|
size: 3054
|
||||||
|
version: 0.6.3.4
|
||||||
|
original:
|
||||||
|
commit: 342dac80e40b10f07694a7e9aa8bab6d03ed6d66
|
||||||
|
git: https://github.com/freckle/yesod-auth-oauth2
|
||||||
|
- completed:
|
||||||
|
commit: 71a630edaf5f22c464e24fac8d9d310f4055ea1f
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptonite.git
|
||||||
name: cryptonite
|
name: cryptonite
|
||||||
version: '0.29'
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptonite.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 25056
|
|
||||||
sha256: 19e49259fa5e3c257495d72b3c7c3c49537aeafd508c780c2430ddca2ef71a91
|
sha256: 19e49259fa5e3c257495d72b3c7c3c49537aeafd508c780c2430ddca2ef71a91
|
||||||
commit: 71a630edaf5f22c464e24fac8d9d310f4055ea1f
|
size: 25056
|
||||||
|
version: '0.29'
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/cryptonite.git
|
|
||||||
commit: 71a630edaf5f22c464e24fac8d9d310f4055ea1f
|
commit: 71a630edaf5f22c464e24fac8d9d310f4055ea1f
|
||||||
|
git: https://gitlab.uniworx.de/haskell/cryptonite.git
|
||||||
- completed:
|
- completed:
|
||||||
|
commit: e18dd125c5ea26fa4e88bed079b61d8c1365ee37
|
||||||
|
git: https://gitlab.uniworx.de/haskell/esqueleto.git
|
||||||
name: esqueleto
|
name: esqueleto
|
||||||
version: 3.5.4.0
|
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/esqueleto.git
|
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 5633
|
|
||||||
sha256: 8a93dc98eb4529ff64aa5bcdaa3c00dcdf0378033ad675864e2b0fc3d869d947
|
sha256: 8a93dc98eb4529ff64aa5bcdaa3c00dcdf0378033ad675864e2b0fc3d869d947
|
||||||
commit: e18dd125c5ea26fa4e88bed079b61d8c1365ee37
|
size: 5633
|
||||||
|
version: 3.5.4.0
|
||||||
original:
|
original:
|
||||||
git: https://gitlab.ifi.lmu.de/uni2work/haskell/esqueleto.git
|
|
||||||
commit: e18dd125c5ea26fa4e88bed079b61d8c1365ee37
|
commit: e18dd125c5ea26fa4e88bed079b61d8c1365ee37
|
||||||
|
git: https://gitlab.uniworx.de/haskell/esqueleto.git
|
||||||
- completed:
|
- completed:
|
||||||
hackage: classy-prelude-yesod-1.5.0@sha256:8f7e183bdfd6d2ea9674284c4f285294ab086aff60d9be4e5d7d2f3c1a2b05b7,1330
|
hackage: classy-prelude-yesod-1.5.0@sha256:8f7e183bdfd6d2ea9674284c4f285294ab086aff60d9be4e5d7d2f3c1a2b05b7,1330
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 330
|
|
||||||
sha256: ae84d4cc0e1daf985db6cdcf2ac92319531b8e60f547183cc46480d00aafbe20
|
sha256: ae84d4cc0e1daf985db6cdcf2ac92319531b8e60f547183cc46480d00aafbe20
|
||||||
|
size: 330
|
||||||
original:
|
original:
|
||||||
hackage: classy-prelude-yesod-1.5.0@sha256:8f7e183bdfd6d2ea9674284c4f285294ab086aff60d9be4e5d7d2f3c1a2b05b7,1330
|
hackage: classy-prelude-yesod-1.5.0@sha256:8f7e183bdfd6d2ea9674284c4f285294ab086aff60d9be4e5d7d2f3c1a2b05b7,1330
|
||||||
- completed:
|
- completed:
|
||||||
hackage: acid-state-0.16.0.1@sha256:d43f6ee0b23338758156c500290c4405d769abefeb98e9bc112780dae09ece6f,6207
|
hackage: acid-state-0.16.0.1@sha256:d43f6ee0b23338758156c500290c4405d769abefeb98e9bc112780dae09ece6f,6207
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 13678
|
|
||||||
sha256: d57bcb2ad5e01fe7424abbcf9e58cf943027b5c4a8496d93625c57b6e1272274
|
sha256: d57bcb2ad5e01fe7424abbcf9e58cf943027b5c4a8496d93625c57b6e1272274
|
||||||
|
size: 13678
|
||||||
original:
|
original:
|
||||||
hackage: acid-state-0.16.0.1@sha256:d43f6ee0b23338758156c500290c4405d769abefeb98e9bc112780dae09ece6f,6207
|
hackage: acid-state-0.16.0.1@sha256:d43f6ee0b23338758156c500290c4405d769abefeb98e9bc112780dae09ece6f,6207
|
||||||
- completed:
|
- completed:
|
||||||
hackage: normaldistribution-1.1.0.3@sha256:2615b784c4112cbf6ffa0e2b55b76790290a9b9dff18a05d8c89aa374b213477,2160
|
hackage: normaldistribution-1.1.0.3@sha256:2615b784c4112cbf6ffa0e2b55b76790290a9b9dff18a05d8c89aa374b213477,2160
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 269
|
|
||||||
sha256: 856818862d12df8b030fa9cfef2c4ffa604d06f0eb057498db245dfffcd60e3c
|
sha256: 856818862d12df8b030fa9cfef2c4ffa604d06f0eb057498db245dfffcd60e3c
|
||||||
|
size: 269
|
||||||
original:
|
original:
|
||||||
hackage: normaldistribution-1.1.0.3@sha256:2615b784c4112cbf6ffa0e2b55b76790290a9b9dff18a05d8c89aa374b213477,2160
|
hackage: normaldistribution-1.1.0.3@sha256:2615b784c4112cbf6ffa0e2b55b76790290a9b9dff18a05d8c89aa374b213477,2160
|
||||||
- completed:
|
- completed:
|
||||||
hackage: pkcs7-1.0.0.1@sha256:b26e5181868667abbde3ce17f9a61cf705eb695da073cdf82e1f9dfd6cc11176,3594
|
hackage: pkcs7-1.0.0.1@sha256:b26e5181868667abbde3ce17f9a61cf705eb695da073cdf82e1f9dfd6cc11176,3594
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 316
|
|
||||||
sha256: ab3c2d2880179a945ab3122c51d1657ab4a7a628292b646e047cd32b0751a80c
|
sha256: ab3c2d2880179a945ab3122c51d1657ab4a7a628292b646e047cd32b0751a80c
|
||||||
|
size: 316
|
||||||
original:
|
original:
|
||||||
hackage: pkcs7-1.0.0.1@sha256:b26e5181868667abbde3ce17f9a61cf705eb695da073cdf82e1f9dfd6cc11176,3594
|
hackage: pkcs7-1.0.0.1@sha256:b26e5181868667abbde3ce17f9a61cf705eb695da073cdf82e1f9dfd6cc11176,3594
|
||||||
- completed:
|
- completed:
|
||||||
hackage: system-locale-0.3.0.0@sha256:13b3982403d8ac8cc6138e68802be8d8e7cf7ebc4cbc7e47e99e3c0dd1be066a,1529
|
hackage: system-locale-0.3.0.0@sha256:13b3982403d8ac8cc6138e68802be8d8e7cf7ebc4cbc7e47e99e3c0dd1be066a,1529
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 446
|
|
||||||
sha256: 3b22af3e6315835bf614a0d30381ec7e47aca147b59ba601aeaa26f1fdc19373
|
sha256: 3b22af3e6315835bf614a0d30381ec7e47aca147b59ba601aeaa26f1fdc19373
|
||||||
|
size: 446
|
||||||
original:
|
original:
|
||||||
hackage: system-locale-0.3.0.0@sha256:13b3982403d8ac8cc6138e68802be8d8e7cf7ebc4cbc7e47e99e3c0dd1be066a,1529
|
hackage: system-locale-0.3.0.0@sha256:13b3982403d8ac8cc6138e68802be8d8e7cf7ebc4cbc7e47e99e3c0dd1be066a,1529
|
||||||
- completed:
|
- completed:
|
||||||
hackage: token-bucket-0.1.0.1@sha256:d8e85f2fc373939975e7ace7907baee177531ab6e43df94e330a2357e64a2d11,1899
|
hackage: token-bucket-0.1.0.1@sha256:d8e85f2fc373939975e7ace7907baee177531ab6e43df94e330a2357e64a2d11,1899
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 399
|
|
||||||
sha256: b0b4a08ea1bf76bd108310f64d7f80e0f30b61ddc3d71f6cab7bdce329d2c1fa
|
sha256: b0b4a08ea1bf76bd108310f64d7f80e0f30b61ddc3d71f6cab7bdce329d2c1fa
|
||||||
|
size: 399
|
||||||
original:
|
original:
|
||||||
hackage: token-bucket-0.1.0.1@sha256:d8e85f2fc373939975e7ace7907baee177531ab6e43df94e330a2357e64a2d11,1899
|
hackage: token-bucket-0.1.0.1@sha256:d8e85f2fc373939975e7ace7907baee177531ab6e43df94e330a2357e64a2d11,1899
|
||||||
- completed:
|
- completed:
|
||||||
hackage: tz-0.1.3.5@sha256:fb17ca50a7d943e511c0ca70342dc83f66aa2532de2745632f1f5f9b1ad783c4,5086
|
hackage: tz-0.1.3.5@sha256:fb17ca50a7d943e511c0ca70342dc83f66aa2532de2745632f1f5f9b1ad783c4,5086
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 1179
|
|
||||||
sha256: 6482698ea1b1a93bd684fca35836b35e8cdf53fe51b0fa6b215afa7da1f983a6
|
sha256: 6482698ea1b1a93bd684fca35836b35e8cdf53fe51b0fa6b215afa7da1f983a6
|
||||||
|
size: 1179
|
||||||
original:
|
original:
|
||||||
hackage: tz-0.1.3.5@sha256:fb17ca50a7d943e511c0ca70342dc83f66aa2532de2745632f1f5f9b1ad783c4,5086
|
hackage: tz-0.1.3.5@sha256:fb17ca50a7d943e511c0ca70342dc83f66aa2532de2745632f1f5f9b1ad783c4,5086
|
||||||
- completed:
|
- completed:
|
||||||
hackage: unidecode-0.1.0.4@sha256:99581ee1ea334a4596a09ae3642e007808457c66893b587e965b31f15cbf8c4d,1144
|
hackage: unidecode-0.1.0.4@sha256:99581ee1ea334a4596a09ae3642e007808457c66893b587e965b31f15cbf8c4d,1144
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 492
|
|
||||||
sha256: 4959068a0caf410dd4b8046f0b0138e3cf6471abb0cc865c9993db3b2930d283
|
sha256: 4959068a0caf410dd4b8046f0b0138e3cf6471abb0cc865c9993db3b2930d283
|
||||||
|
size: 492
|
||||||
original:
|
original:
|
||||||
hackage: unidecode-0.1.0.4@sha256:99581ee1ea334a4596a09ae3642e007808457c66893b587e965b31f15cbf8c4d,1144
|
hackage: unidecode-0.1.0.4@sha256:99581ee1ea334a4596a09ae3642e007808457c66893b587e965b31f15cbf8c4d,1144
|
||||||
- completed:
|
- completed:
|
||||||
hackage: hlint-test-0.1.0.0@sha256:e427c0593433205fc629fb05b74c6b1deb1de72d1571f26142de008f0d5ee7a9,1814
|
hackage: hlint-test-0.1.0.0@sha256:e427c0593433205fc629fb05b74c6b1deb1de72d1571f26142de008f0d5ee7a9,1814
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 442
|
|
||||||
sha256: 347eac6c8a3c02fc0101444d6526b57b3c27785809149b12f90d8db57c721fea
|
sha256: 347eac6c8a3c02fc0101444d6526b57b3c27785809149b12f90d8db57c721fea
|
||||||
|
size: 442
|
||||||
original:
|
original:
|
||||||
hackage: hlint-test-0.1.0.0@sha256:e427c0593433205fc629fb05b74c6b1deb1de72d1571f26142de008f0d5ee7a9,1814
|
hackage: hlint-test-0.1.0.0@sha256:e427c0593433205fc629fb05b74c6b1deb1de72d1571f26142de008f0d5ee7a9,1814
|
||||||
- completed:
|
- completed:
|
||||||
hackage: servant-quickcheck-0.0.10.0@sha256:1d5849d703c2487752f8fc7391cca7c998ee24f54ca0bb72d238bf99b64ac667,3755
|
hackage: servant-quickcheck-0.0.10.0@sha256:1d5849d703c2487752f8fc7391cca7c998ee24f54ca0bb72d238bf99b64ac667,3755
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 976
|
|
||||||
sha256: 37dab60111c71d011fc4964e9a8b4b05ac544bc0ba8155e895518680066c2adb
|
sha256: 37dab60111c71d011fc4964e9a8b4b05ac544bc0ba8155e895518680066c2adb
|
||||||
|
size: 976
|
||||||
original:
|
original:
|
||||||
hackage: servant-quickcheck-0.0.10.0@sha256:1d5849d703c2487752f8fc7391cca7c998ee24f54ca0bb72d238bf99b64ac667,3755
|
hackage: servant-quickcheck-0.0.10.0@sha256:1d5849d703c2487752f8fc7391cca7c998ee24f54ca0bb72d238bf99b64ac667,3755
|
||||||
- completed:
|
- completed:
|
||||||
hackage: servant-flatten-0.2@sha256:276896f7c5cdec5b8f8493f6205fded0cc602d050b58fdb09a6d7c85c3bb0837,1234
|
hackage: servant-flatten-0.2@sha256:276896f7c5cdec5b8f8493f6205fded0cc602d050b58fdb09a6d7c85c3bb0837,1234
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 325
|
|
||||||
sha256: 04f12c7bef2c3f9a25d94eb9489752ed498db8e243069fe95838dbb51df1dcb3
|
sha256: 04f12c7bef2c3f9a25d94eb9489752ed498db8e243069fe95838dbb51df1dcb3
|
||||||
|
size: 325
|
||||||
original:
|
original:
|
||||||
hackage: servant-flatten-0.2@sha256:276896f7c5cdec5b8f8493f6205fded0cc602d050b58fdb09a6d7c85c3bb0837,1234
|
hackage: servant-flatten-0.2@sha256:276896f7c5cdec5b8f8493f6205fded0cc602d050b58fdb09a6d7c85c3bb0837,1234
|
||||||
- completed:
|
- completed:
|
||||||
hackage: network-arbitrary-0.7.0.0@sha256:0cd381c80ae20c16048936edcdb018b1d9fbe2b6ac8c44e908df403a5c6d7cd5,2520
|
hackage: network-arbitrary-0.7.0.0@sha256:0cd381c80ae20c16048936edcdb018b1d9fbe2b6ac8c44e908df403a5c6d7cd5,2520
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 912
|
|
||||||
sha256: a40b62eddfb12cfec753a10836a4ef5fe8ec94d7478e6957e1fe5729017928fb
|
sha256: a40b62eddfb12cfec753a10836a4ef5fe8ec94d7478e6957e1fe5729017928fb
|
||||||
|
size: 912
|
||||||
original:
|
original:
|
||||||
hackage: network-arbitrary-0.7.0.0@sha256:0cd381c80ae20c16048936edcdb018b1d9fbe2b6ac8c44e908df403a5c6d7cd5,2520
|
hackage: network-arbitrary-0.7.0.0@sha256:0cd381c80ae20c16048936edcdb018b1d9fbe2b6ac8c44e908df403a5c6d7cd5,2520
|
||||||
- completed:
|
- completed:
|
||||||
hackage: saltine-0.2.0.0@sha256:2232a285ef326b0942bbcbfa6f465933a020f27e19552213e688fe371d66dddd,5198
|
hackage: saltine-0.2.0.0@sha256:2232a285ef326b0942bbcbfa6f465933a020f27e19552213e688fe371d66dddd,5198
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 5016
|
|
||||||
sha256: fdf4397f4b1ed7975f38d0b463eb6c9d206d0c85d157c41c19983e80b2005763
|
sha256: fdf4397f4b1ed7975f38d0b463eb6c9d206d0c85d157c41c19983e80b2005763
|
||||||
|
size: 5016
|
||||||
original:
|
original:
|
||||||
hackage: saltine-0.2.0.0@sha256:2232a285ef326b0942bbcbfa6f465933a020f27e19552213e688fe371d66dddd,5198
|
hackage: saltine-0.2.0.0@sha256:2232a285ef326b0942bbcbfa6f465933a020f27e19552213e688fe371d66dddd,5198
|
||||||
- completed:
|
- completed:
|
||||||
hackage: persistent-postgresql-2.13.0.3@sha256:43384bf8ed9c931c673e6abb763c8811113d1b7004095faaae1eb42e2cd52d8f,3601
|
hackage: persistent-postgresql-2.13.0.3@sha256:43384bf8ed9c931c673e6abb763c8811113d1b7004095faaae1eb42e2cd52d8f,3601
|
||||||
pantry-tree:
|
pantry-tree:
|
||||||
size: 1059
|
|
||||||
sha256: 2d647a17372e42bc54331cfb35f5a55a71e6854dac8299b7ed6a1c69ae12734d
|
sha256: 2d647a17372e42bc54331cfb35f5a55a71e6854dac8299b7ed6a1c69ae12734d
|
||||||
|
size: 1059
|
||||||
original:
|
original:
|
||||||
hackage: persistent-postgresql-2.13.0.3@sha256:43384bf8ed9c931c673e6abb763c8811113d1b7004095faaae1eb42e2cd52d8f,3601
|
hackage: persistent-postgresql-2.13.0.3@sha256:43384bf8ed9c931c673e6abb763c8811113d1b7004095faaae1eb42e2cd52d8f,3601
|
||||||
snapshots:
|
snapshots:
|
||||||
- completed:
|
- completed:
|
||||||
|
sha256: c632012da648385b9fa3c29f4e0afd56ead299f1c5528ee789058be410e883c0
|
||||||
size: 585393
|
size: 585393
|
||||||
url: https://raw.githubusercontent.com/commercialhaskell/stackage-snapshots/master/lts/18/0.yaml
|
url: https://raw.githubusercontent.com/commercialhaskell/stackage-snapshots/master/lts/18/0.yaml
|
||||||
sha256: c632012da648385b9fa3c29f4e0afd56ead299f1c5528ee789058be410e883c0
|
|
||||||
original: lts-18.0
|
original: lts-18.0
|
||||||
|
|||||||
46
templates/admin/external-user.hamlet
Normal file
46
templates/admin/external-user.hamlet
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
$newline never
|
||||||
|
|
||||||
|
$# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
|
$#
|
||||||
|
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<p>
|
||||||
|
Query external user databases:
|
||||||
|
^{personForm}
|
||||||
|
$maybe responses <- mbData
|
||||||
|
<h1>
|
||||||
|
Responses: #
|
||||||
|
<dl .deflist>
|
||||||
|
$forall (source,responses) <- responses
|
||||||
|
<dt .deflist__dt>
|
||||||
|
$case source
|
||||||
|
$of AuthSourceIdAzure tenantId
|
||||||
|
Azure Tenant ID: #
|
||||||
|
#{tshow tenantId}
|
||||||
|
$of AuthSourceIdLdap ldapHost
|
||||||
|
LDAP host: #
|
||||||
|
#{ldapHost}
|
||||||
|
<dd .deflist__dd>
|
||||||
|
<pre>
|
||||||
|
#{responses}
|
||||||
|
$# <dl .deflist>
|
||||||
|
$# $forall (k,(numv,vUtf8,vLatin1)) <- responses
|
||||||
|
$# <dt .deflist__dt>
|
||||||
|
$# #{k}
|
||||||
|
$# $if 1 < numv
|
||||||
|
$# \ (#{show numv})
|
||||||
|
$# <dd .deflist__dd>
|
||||||
|
$# UTF8: #{vUtf8}
|
||||||
|
$# —
|
||||||
|
$# Latin: #{vLatin1}
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<p>
|
||||||
|
Upsert user from external database:
|
||||||
|
^{upsertForm}
|
||||||
|
$maybe response <- mbUpsert
|
||||||
|
<h1>
|
||||||
|
Response: #
|
||||||
|
<p>
|
||||||
|
#{tshow response}
|
||||||
@ -1,6 +1,6 @@
|
|||||||
$newline never
|
$newline never
|
||||||
|
|
||||||
$# SPDX-FileCopyrightText: 2022 Felix Hamann <felix.hamann@campus.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
$# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Felix Hamann <felix.hamann@campus.lmu.de>, Sarah Vaupel <vaupel.sarah@campus.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
$#
|
$#
|
||||||
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
|||||||
@ -0,0 +1,7 @@
|
|||||||
|
$newline never
|
||||||
|
|
||||||
|
$# SPDX-FileCopyrightText: 2024 Sarah Vaupel <sarah.vaupel@uniworx.de>
|
||||||
|
$#
|
||||||
|
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
FRADrive-Benutzer können sich nun über ihr Azure-Benutzerkonto in FRADrive anmelden
|
||||||
@ -0,0 +1,7 @@
|
|||||||
|
$newline never
|
||||||
|
|
||||||
|
$# SPDX-FileCopyrightText: 2024 Sarah Vaupel <sarah.vaupel@uniworx.de>
|
||||||
|
$#
|
||||||
|
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
FRADrive users can now log in to FRADrive using their Azure user account
|
||||||
@ -1,33 +0,0 @@
|
|||||||
$newline never
|
|
||||||
|
|
||||||
$# SPDX-FileCopyrightText: 2022 Steffen Jost <jost@tcs.ifi.lmu.de>
|
|
||||||
$#
|
|
||||||
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<p>
|
|
||||||
LDAP Person Search:
|
|
||||||
^{personForm}
|
|
||||||
$maybe answers <- mbLdapData
|
|
||||||
<h1>
|
|
||||||
Antwort: #
|
|
||||||
<dl .deflist>
|
|
||||||
$forall (lk, lv) <- answers
|
|
||||||
$with numv <- length lv
|
|
||||||
<dt>
|
|
||||||
#{show lk}
|
|
||||||
$if 1 < numv
|
|
||||||
\ (#{show numv})
|
|
||||||
<dd>
|
|
||||||
UTF8: #{presentUtf8 lv}
|
|
||||||
—
|
|
||||||
Latin: #{presentLatin1 lv}
|
|
||||||
<section>
|
|
||||||
<p>
|
|
||||||
LDAP Upsert user in DB:
|
|
||||||
^{upsertForm}
|
|
||||||
$maybe answer <- mbLdapUpsert
|
|
||||||
<h1>
|
|
||||||
Antwort: #
|
|
||||||
<p>
|
|
||||||
#{tshow answer}
|
|
||||||
@ -1,20 +1,33 @@
|
|||||||
$newline never
|
$newline never
|
||||||
|
|
||||||
$# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>
|
$# SPDX-FileCopyrightText: 2022-2024 Gregor Kleen <gregor.kleen@ifi.lmu.de>, David Mosbach <david.mosbach@uniworx.de>
|
||||||
$#
|
$#
|
||||||
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
$forall AuthPlugin{apName, apLogin} <- plugins
|
$forall AuthPlugin{apName, apLogin} <- plugins
|
||||||
$if apName == "LDAP"
|
$if apName == apAzure
|
||||||
|
<section>
|
||||||
|
<h2>Azure
|
||||||
|
^{apLogin toParent}
|
||||||
|
$elseif apName == apAzureMock
|
||||||
|
<section>
|
||||||
|
<h2>_{MsgDummyLoginTitle}
|
||||||
|
^{apLogin toParent}
|
||||||
|
$elseif apName == apLdap
|
||||||
<section>
|
<section>
|
||||||
<h2>_{MsgLDAPLoginTitle}
|
<h2>_{MsgLDAPLoginTitle}
|
||||||
^{apLogin toParent}
|
^{apLogin toParent}
|
||||||
$elseif apName == "PWHash"
|
$elseif apName == apHash
|
||||||
<section>
|
<section>
|
||||||
<h2>_{MsgPWHashLoginTitle}
|
<h2>_{MsgPWHashLoginTitle}
|
||||||
<p>_{MsgPWHashLoginNote}
|
<p>_{MsgPWHashLoginNote}
|
||||||
^{apLogin toParent}
|
^{apLogin toParent}
|
||||||
$elseif apName == "dummy"
|
$elseif apName == apDummy
|
||||||
<section>
|
<section>
|
||||||
<h2>_{MsgDummyLoginTitle}
|
<h2>_{MsgDummyLoginTitle}
|
||||||
^{apLogin toParent}
|
^{apLogin toParent}
|
||||||
|
$maybe port <- mPort
|
||||||
|
<section>
|
||||||
|
<h2>SSO Dev Test
|
||||||
|
<a href=http://localhost:#{port}/test-sso>Test login via single sign-on
|
||||||
|
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
$newline never
|
$newline never
|
||||||
|
|
||||||
$# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
$# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>, Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
$#
|
$#
|
||||||
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -19,21 +19,16 @@ $# SPDX-License-Identifier: AGPL-3.0-or-later
|
|||||||
}
|
}
|
||||||
<body>
|
<body>
|
||||||
<h1>
|
<h1>
|
||||||
$case userAuthentication
|
$if is _Just userPasswordHash
|
||||||
$of AuthLDAP
|
_{SomeMessage MsgUserAuthPasswordEnabled}
|
||||||
_{SomeMessage MsgUserAuthModeChangedToLDAP}
|
$else
|
||||||
$of AuthPWHash _
|
_{SomeMessage MsgUserAuthPasswordDisabled}
|
||||||
_{SomeMessage MsgUserAuthModeChangedToPWHash}
|
|
||||||
$of AuthNoLogin
|
|
||||||
_{SomeMessage MsgUserAuthModeChangedToNoLogin}
|
|
||||||
<p>
|
<p>
|
||||||
<a href=@{NewsR}>
|
<a href=@{NewsR}>
|
||||||
_{SomeMessage MsgMailFradrive} #
|
_{SomeMessage MsgMailFradrive} #
|
||||||
_{SomeMessage MsgMailBodyFradrive}
|
_{SomeMessage MsgMailBodyFradrive}
|
||||||
|
|
||||||
$if is _AuthPWHash userAuthentication
|
$if is _Just userPasswordHash
|
||||||
<p>
|
|
||||||
_{SomeMessage MsgAuthPWHashTip}
|
|
||||||
<dl>
|
<dl>
|
||||||
<dt>
|
<dt>
|
||||||
_{SomeMessage MsgPWHashIdent}
|
_{SomeMessage MsgPWHashIdent}
|
||||||
@ -42,6 +37,9 @@ $# SPDX-License-Identifier: AGPL-3.0-or-later
|
|||||||
<dt>_{SomeMessage MsgPWHashPassword}
|
<dt>_{SomeMessage MsgPWHashPassword}
|
||||||
<dd>
|
<dd>
|
||||||
_{SomeMessage MsgPasswordResetEmailIncoming}
|
_{SomeMessage MsgPasswordResetEmailIncoming}
|
||||||
|
$else
|
||||||
|
<p>
|
||||||
|
_{SomeMessage MsgAuthExternalLoginTip}
|
||||||
|
|
||||||
$if is _Just userLastAuthentication
|
$if is _Just userLastAuthentication
|
||||||
^{editNotifications}
|
^{editNotifications}
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
$newline never
|
$newline never
|
||||||
|
|
||||||
$# SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
$# SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <vaupel.sarah@campus.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>,Winnie Ros <winnie.ros@campus.lmu.de>
|
||||||
$#
|
$#
|
||||||
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
$# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -10,10 +10,6 @@ $# SPDX-License-Identifier: AGPL-3.0-or-later
|
|||||||
_{MsgIdent}
|
_{MsgIdent}
|
||||||
<dd .deflist__dd .email>
|
<dd .deflist__dd .email>
|
||||||
#{userIdent}
|
#{userIdent}
|
||||||
<dt .deflist__dt>
|
|
||||||
_{MsgAuthModeSet}
|
|
||||||
<dd .deflist__dd>
|
|
||||||
_{userAuthentication}
|
|
||||||
$maybe avs <- avsId
|
$maybe avs <- avsId
|
||||||
<dt .deflist__dt>
|
<dt .deflist__dt>
|
||||||
_{MsgAvsPersonNo}
|
_{MsgAvsPersonNo}
|
||||||
@ -124,6 +120,25 @@ $# SPDX-License-Identifier: AGPL-3.0-or-later
|
|||||||
_{MsgUserCreated}
|
_{MsgUserCreated}
|
||||||
<dd .deflist__dd>
|
<dd .deflist__dd>
|
||||||
^{formatTimeW SelFormatDateTime userCreated}
|
^{formatTimeW SelFormatDateTime userCreated}
|
||||||
|
<dt .deflist__dt>
|
||||||
|
_{MsgAdminUserAuthentication}
|
||||||
|
<dd .deflist__dd>
|
||||||
|
$if null externalUsers && is _Nothing userPasswordHash
|
||||||
|
_{MsgAuthKindNoLogin}
|
||||||
|
$else
|
||||||
|
<ul>
|
||||||
|
$if is _Just userPasswordHash
|
||||||
|
<li>_{MsgAuthKindPWHash}
|
||||||
|
$forall (authIdent, sourceIdent, lsync) <- externalUsers
|
||||||
|
<li>
|
||||||
|
$case sourceIdent
|
||||||
|
$of AuthSourceIdAzure _clientId
|
||||||
|
_{MsgAuthKindAzure}: #
|
||||||
|
$of AuthSourceIdLdap _sourceId
|
||||||
|
_{MsgAuthKindLDAP}: #
|
||||||
|
#{authIdent} #
|
||||||
|
<span .comment>
|
||||||
|
(_{MsgAdminUserAuthLastSync}: ^{formatTimeW SelFormatDateTime lsync})
|
||||||
<dt .deflist__dt>
|
<dt .deflist__dt>
|
||||||
_{MsgLastLogin}
|
_{MsgLastLogin}
|
||||||
<dd .deflist__dd>
|
<dd .deflist__dd>
|
||||||
@ -131,18 +146,6 @@ $# SPDX-License-Identifier: AGPL-3.0-or-later
|
|||||||
^{formatTimeW SelFormatDateTime llogin}
|
^{formatTimeW SelFormatDateTime llogin}
|
||||||
$nothing
|
$nothing
|
||||||
_{MsgNeverSet}
|
_{MsgNeverSet}
|
||||||
<dt .deflist__dt>
|
|
||||||
_{MsgProfileLastLdapSynchronisation}
|
|
||||||
<dd .deflist__dd>
|
|
||||||
$maybe lsync <- userLastLdapSynchronisation
|
|
||||||
^{formatTimeW SelFormatDateTime lsync}
|
|
||||||
$nothing
|
|
||||||
_{MsgNeverSet}
|
|
||||||
$maybe pKey <- userLdapPrimaryKey
|
|
||||||
<dt .deflist__dt>
|
|
||||||
_{MsgProfileLdapPrimaryKey}
|
|
||||||
<dd .deflist__dd .ldap-primary-key>
|
|
||||||
#{pKey}
|
|
||||||
<dt .deflist__dt>
|
<dt .deflist__dt>
|
||||||
_{MsgTokensLastReset}
|
_{MsgTokensLastReset}
|
||||||
<dd .deflist__dd>
|
<dd .deflist__dd>
|
||||||
|
|||||||
@ -82,8 +82,9 @@ fillDb = do
|
|||||||
|
|
||||||
gkleen <- insert User
|
gkleen <- insert User
|
||||||
{ userIdent = "G.Kleen@campus.lmu.de"
|
{ userIdent = "G.Kleen@campus.lmu.de"
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Just now
|
, userLastAuthentication = Just now
|
||||||
|
, userLastSync = Just now
|
||||||
, userTokensIssuedAfter = Just now
|
, userTokensIssuedAfter = Just now
|
||||||
, userMatrikelnummer = Nothing
|
, userMatrikelnummer = Nothing
|
||||||
, userEmail = "G.Kleen@campus.lmu.de"
|
, userEmail = "G.Kleen@campus.lmu.de"
|
||||||
@ -103,8 +104,6 @@ fillDb = do
|
|||||||
, userLanguages = Just $ Languages ["en"]
|
, userLanguages = Just $ Languages ["en"]
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def { csvFormat = csvPreset # CsvPresetRFC }
|
, userCsvOptions = def { csvFormat = csvPreset # CsvPresetRFC }
|
||||||
, userSex = Just SexMale
|
, userSex = Just SexMale
|
||||||
, userBirthday = Nothing
|
, userBirthday = Nothing
|
||||||
@ -122,8 +121,9 @@ fillDb = do
|
|||||||
}
|
}
|
||||||
fhamann <- insert User
|
fhamann <- insert User
|
||||||
{ userIdent = "felix.hamann@campus.lmu.de"
|
{ userIdent = "felix.hamann@campus.lmu.de"
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Nothing
|
, userMatrikelnummer = Nothing
|
||||||
, userEmail = "noEmailKnown"
|
, userEmail = "noEmailKnown"
|
||||||
@ -143,8 +143,6 @@ fillDb = do
|
|||||||
, userLanguages = Nothing
|
, userLanguages = Nothing
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def { csvFormat = csvPreset # CsvPresetExcel }
|
, userCsvOptions = def { csvFormat = csvPreset # CsvPresetExcel }
|
||||||
, userSex = Just SexMale
|
, userSex = Just SexMale
|
||||||
, userShowSex = userDefaultShowSex
|
, userShowSex = userDefaultShowSex
|
||||||
@ -164,12 +162,12 @@ fillDb = do
|
|||||||
let pw = "123.456"
|
let pw = "123.456"
|
||||||
PWHashConf{..} <- getsYesod $ view _appAuthPWHash
|
PWHashConf{..} <- getsYesod $ view _appAuthPWHash
|
||||||
pwHash <- liftIO $ PWStore.makePasswordWith pwHashAlgorithm pw pwHashStrength
|
pwHash <- liftIO $ PWStore.makePasswordWith pwHashAlgorithm pw pwHashStrength
|
||||||
return $ AuthPWHash $ TEnc.decodeUtf8 pwHash
|
return $ TEnc.decodeUtf8 pwHash
|
||||||
jost <- insert User
|
jost <- insert User
|
||||||
{ userIdent = "jost@tcs.ifi.lmu.de"
|
{ userIdent = "jost@tcs.ifi.lmu.de"
|
||||||
-- , userAuthentication = AuthLDAP
|
, userPasswordHash = Just pwSimple
|
||||||
, userAuthentication = pwSimple
|
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Just "12345678"
|
, userMatrikelnummer = Just "12345678"
|
||||||
, userEmail = "S.Jost@Fraport.de"
|
, userEmail = "S.Jost@Fraport.de"
|
||||||
@ -189,8 +187,6 @@ fillDb = do
|
|||||||
, userLanguages = Nothing
|
, userLanguages = Nothing
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userSex = Just SexMale
|
, userSex = Just SexMale
|
||||||
, userBirthday = Just $ n_day $ 35 * (-365)
|
, userBirthday = Just $ n_day $ 35 * (-365)
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
@ -208,8 +204,9 @@ fillDb = do
|
|||||||
}
|
}
|
||||||
maxMuster <- insert User
|
maxMuster <- insert User
|
||||||
{ userIdent = "max@campus.lmu.de"
|
{ userIdent = "max@campus.lmu.de"
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Just now
|
, userLastAuthentication = Just now
|
||||||
|
, userLastSync = Just now
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Just "1299"
|
, userMatrikelnummer = Just "1299"
|
||||||
, userEmail = "max@campus.lmu.de"
|
, userEmail = "max@campus.lmu.de"
|
||||||
@ -229,8 +226,6 @@ fillDb = do
|
|||||||
, userLanguages = Just $ Languages ["de"]
|
, userLanguages = Just $ Languages ["de"]
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userSex = Just SexMale
|
, userSex = Just SexMale
|
||||||
, userBirthday = Just $ n_day $ 27 * (-365)
|
, userBirthday = Just $ n_day $ 27 * (-365)
|
||||||
@ -248,8 +243,9 @@ fillDb = do
|
|||||||
}
|
}
|
||||||
tinaTester <- insert $ User
|
tinaTester <- insert $ User
|
||||||
{ userIdent = "tester@campus.lmu.de"
|
{ userIdent = "tester@campus.lmu.de"
|
||||||
, userAuthentication = AuthNoLogin
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Just "999"
|
, userMatrikelnummer = Just "999"
|
||||||
, userEmail = "tester@campus.lmu.de"
|
, userEmail = "tester@campus.lmu.de"
|
||||||
@ -269,8 +265,6 @@ fillDb = do
|
|||||||
, userLanguages = Just $ Languages ["sn"]
|
, userLanguages = Just $ Languages ["sn"]
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userSex = Just SexNotApplicable
|
, userSex = Just SexNotApplicable
|
||||||
, userBirthday = Just $ n_day 3
|
, userBirthday = Just $ n_day 3
|
||||||
@ -288,8 +282,9 @@ fillDb = do
|
|||||||
}
|
}
|
||||||
svaupel <- insert User
|
svaupel <- insert User
|
||||||
{ userIdent = "vaupel.sarah@campus.lmu.de"
|
{ userIdent = "vaupel.sarah@campus.lmu.de"
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Nothing
|
, userMatrikelnummer = Nothing
|
||||||
, userEmail = "vaupel.sarah@campus.lmu.de"
|
, userEmail = "vaupel.sarah@campus.lmu.de"
|
||||||
@ -309,8 +304,6 @@ fillDb = do
|
|||||||
, userLanguages = Nothing
|
, userLanguages = Nothing
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userSex = Just SexFemale
|
, userSex = Just SexFemale
|
||||||
, userBirthday = Nothing
|
, userBirthday = Nothing
|
||||||
@ -328,8 +321,9 @@ fillDb = do
|
|||||||
}
|
}
|
||||||
sbarth <- insert User
|
sbarth <- insert User
|
||||||
{ userIdent = "Stephan.Barth@campus.lmu.de"
|
{ userIdent = "Stephan.Barth@campus.lmu.de"
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Nothing
|
, userMatrikelnummer = Nothing
|
||||||
, userEmail = "Stephan.Barth@lmu.de"
|
, userEmail = "Stephan.Barth@lmu.de"
|
||||||
@ -349,8 +343,6 @@ fillDb = do
|
|||||||
, userLanguages = Nothing
|
, userLanguages = Nothing
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userSex = Just SexMale
|
, userSex = Just SexMale
|
||||||
, userBirthday = Nothing
|
, userBirthday = Nothing
|
||||||
@ -368,8 +360,9 @@ fillDb = do
|
|||||||
}
|
}
|
||||||
_stranger1 <- insert User
|
_stranger1 <- insert User
|
||||||
{ userIdent = "AVSID:996699"
|
{ userIdent = "AVSID:996699"
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Nothing
|
, userMatrikelnummer = Nothing
|
||||||
, userEmail = "E996699@fraport.de"
|
, userEmail = "E996699@fraport.de"
|
||||||
@ -389,8 +382,6 @@ fillDb = do
|
|||||||
, userLanguages = Nothing
|
, userLanguages = Nothing
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userSex = Just SexMale
|
, userSex = Just SexMale
|
||||||
, userBirthday = Nothing
|
, userBirthday = Nothing
|
||||||
@ -408,8 +399,9 @@ fillDb = do
|
|||||||
}
|
}
|
||||||
_stranger2 <- insert User
|
_stranger2 <- insert User
|
||||||
{ userIdent = "AVSID:669966"
|
{ userIdent = "AVSID:669966"
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Nothing
|
, userMatrikelnummer = Nothing
|
||||||
, userEmail = "E669966@fraport.de"
|
, userEmail = "E669966@fraport.de"
|
||||||
@ -429,8 +421,6 @@ fillDb = do
|
|||||||
, userLanguages = Nothing
|
, userLanguages = Nothing
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userSex = Just SexMale
|
, userSex = Just SexMale
|
||||||
, userBirthday = Nothing
|
, userBirthday = Nothing
|
||||||
@ -448,8 +438,9 @@ fillDb = do
|
|||||||
}
|
}
|
||||||
_stranger3 <- insert User
|
_stranger3 <- insert User
|
||||||
{ userIdent = "AVSID:6969"
|
{ userIdent = "AVSID:6969"
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Nothing
|
, userMatrikelnummer = Nothing
|
||||||
, userEmail = "E6969@fraport.de"
|
, userEmail = "E6969@fraport.de"
|
||||||
@ -469,8 +460,6 @@ fillDb = do
|
|||||||
, userLanguages = Nothing
|
, userLanguages = Nothing
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userSex = Just SexMale
|
, userSex = Just SexMale
|
||||||
, userBirthday = Nothing
|
, userBirthday = Nothing
|
||||||
@ -526,8 +515,9 @@ fillDb = do
|
|||||||
middlenames = [ Nothing, Just "Jamesson", Just "Theresa", Just "Ally", Just "Tiberius", Just "Maria" ]
|
middlenames = [ Nothing, Just "Jamesson", Just "Theresa", Just "Ally", Just "Tiberius", Just "Maria" ]
|
||||||
manyUser (firstName, middleName, userSurname) userMatrikelnummer' = User
|
manyUser (firstName, middleName, userSurname) userMatrikelnummer' = User
|
||||||
{ userIdent
|
{ userIdent
|
||||||
, userAuthentication = AuthLDAP
|
, userPasswordHash = Nothing
|
||||||
, userLastAuthentication = Nothing
|
, userLastAuthentication = Nothing
|
||||||
|
, userLastSync = Nothing
|
||||||
, userTokensIssuedAfter = Nothing
|
, userTokensIssuedAfter = Nothing
|
||||||
, userMatrikelnummer = Just userMatrikelnummer'
|
, userMatrikelnummer = Just userMatrikelnummer'
|
||||||
, userEmail = userEmail'
|
, userEmail = userEmail'
|
||||||
@ -549,8 +539,6 @@ fillDb = do
|
|||||||
, userLanguages = Nothing
|
, userLanguages = Nothing
|
||||||
, userNotificationSettings = def
|
, userNotificationSettings = def
|
||||||
, userCreated = now
|
, userCreated = now
|
||||||
, userLastLdapSynchronisation = Nothing
|
|
||||||
, userLdapPrimaryKey = Nothing
|
|
||||||
, userCsvOptions = def
|
, userCsvOptions = def
|
||||||
, userSex = Nothing
|
, userSex = Nothing
|
||||||
, userBirthday = Nothing
|
, userBirthday = Nothing
|
||||||
|
|||||||
231
test/Database/test-users.yaml
Normal file
231
test/Database/test-users.yaml
Normal file
@ -0,0 +1,231 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 David Mosbach <david.mosbach@uniworx.de>
|
||||||
|
#
|
||||||
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
special-users:
|
||||||
|
|
||||||
|
- default: &default-user
|
||||||
|
userIdent: null
|
||||||
|
userAuthentication: AuthLDAP
|
||||||
|
userLastAuthentication: null
|
||||||
|
userTokensIssuedAfter: null
|
||||||
|
userMatrikelnummer: null
|
||||||
|
userEmail: ""
|
||||||
|
userDisplayEmail: null
|
||||||
|
userDisplayName: null
|
||||||
|
userSurname: ""
|
||||||
|
userFirstName: ""
|
||||||
|
userTitle: null
|
||||||
|
userMaxFavourites: userDefaultMaxFavourites
|
||||||
|
userMaxFavouriteTerms: userDefaultMaxFavouriteTerms
|
||||||
|
userTheme: ThemeDefault
|
||||||
|
userDateTimeFormat: userDefaultDateTimeFormat
|
||||||
|
userDateFormat: userDefaultDateFormat
|
||||||
|
userTimeFormat: userDefaultTimeFormat
|
||||||
|
userDownloadFiles: userDefaultDownloadFiles
|
||||||
|
userWarningDays: userDefaultWarningDays
|
||||||
|
userLanguages: null
|
||||||
|
userCreated: now
|
||||||
|
userNotificationSettings: def
|
||||||
|
userLastLdapSynchronisation: null
|
||||||
|
userLdapPrimaryKey: null
|
||||||
|
userCsvOptions: def
|
||||||
|
userSex: null
|
||||||
|
userBirthday: null
|
||||||
|
userShowSex: userDefaultShowSex
|
||||||
|
userTelephone: null
|
||||||
|
userMobile: null
|
||||||
|
userCompanyPersonalNumber: null
|
||||||
|
userCompanyDepartment: null
|
||||||
|
userPinPassword: null
|
||||||
|
userPostAddress: null
|
||||||
|
userPostLastUpdate: null
|
||||||
|
userPrefersPostal: true
|
||||||
|
userExamOfficeGetSynced: userDefaultExamOfficeGetSynced
|
||||||
|
userExamOfficeGetLabels: userDefaultExamOfficeGetLabels
|
||||||
|
|
||||||
|
- gkleen:
|
||||||
|
<<: *default-user
|
||||||
|
userIdent: "G.Kleen@campus.lmu.de"
|
||||||
|
userLastAuthentication: now
|
||||||
|
userTokensIssuedAfter: now
|
||||||
|
userEmail: "G.Kleen@campus.lmu.de"
|
||||||
|
userDisplayEmail: "gregor.kleen@ifi.lmu.de"
|
||||||
|
userDisplayName: "Gregor Kleen"
|
||||||
|
userSurname: "Kleen"
|
||||||
|
userFirstName: "Gregor Julius Arthur"
|
||||||
|
userMaxFavourites: 6
|
||||||
|
userMaxFavouriteTerms: 1
|
||||||
|
userLanguages: ["en"]
|
||||||
|
# userCsvOptions = def { csvFormat = csvPreset # CsvPresetRFC }
|
||||||
|
userSex: SexMale
|
||||||
|
userCompanyPersonalNumber: "00000"
|
||||||
|
userPostAddress: "Büro 127 \nMathematisches Institut der Ludwig-Maximilians-Universität München \nTheresienstr. 39 \nD-80333 München"
|
||||||
|
|
||||||
|
- fhamann:
|
||||||
|
<<: *default-user
|
||||||
|
userIdent: "felix.hamann@campus.lmu.de"
|
||||||
|
userEmail: "noEmailKnown"
|
||||||
|
userDisplayEmail: "felix.hamann@campus.lmu.de"
|
||||||
|
userDisplayName: "Felix Hamann"
|
||||||
|
userSurname: "Hamann"
|
||||||
|
userFirstName: "Felix"
|
||||||
|
# userCsvOptions = def { csvFormat = csvPreset # CsvPresetExcel }
|
||||||
|
userSex: SexMale
|
||||||
|
userPinPassword: "tomatenmarmelade"
|
||||||
|
userPostAddress: "Erdbeerweg 24 \n12345 Schlumpfhausen \nTraumland"
|
||||||
|
|
||||||
|
- jost:
|
||||||
|
<<: *default-user
|
||||||
|
userIdent: "jost@tcs.ifi.lmu.de"
|
||||||
|
userAuthentication: pwSimple
|
||||||
|
userMatrikelnummer: "12345678"
|
||||||
|
userEmail: "S.Jost@Fraport.de"
|
||||||
|
userDisplayEmail: "jost@tcs.ifi.lmu.de"
|
||||||
|
userDisplayName: "Steffen Jost"
|
||||||
|
userSurname: "Jost"
|
||||||
|
userFirstName: "Steffen"
|
||||||
|
userTitle: "Dr."
|
||||||
|
userMaxFavourites: 14
|
||||||
|
userMaxFavouriteTerms: 4
|
||||||
|
userTheme: ThemeMossGreen
|
||||||
|
userSex: SexMale
|
||||||
|
# userBirthday = Just $ n_day $ 35 * (-365)
|
||||||
|
userTelephone: "+49 69 690-71706"
|
||||||
|
userMobile: "0173 69 99 646"
|
||||||
|
userCompanyPersonalNumber: "57138"
|
||||||
|
userCompanyDepartment: "AVN-AR2"
|
||||||
|
|
||||||
|
- maxMuster:
|
||||||
|
<<: *default-user
|
||||||
|
userIdent: "max@campus.lmu.de"
|
||||||
|
userLastAuthentication: now
|
||||||
|
userMatrikelnummer: "1299"
|
||||||
|
userEmail: "max@campus.lmu.de"
|
||||||
|
userDisplayEmail: "max@max.com"
|
||||||
|
userDisplayName: "Max Musterstudent"
|
||||||
|
userSurname: "Musterstudent"
|
||||||
|
userFirstName: "Max"
|
||||||
|
userMaxFavourites: 7
|
||||||
|
userTheme: ThemeAberdeenReds
|
||||||
|
userLanguages: ["de"]
|
||||||
|
userSex: SexMale
|
||||||
|
# userBirthday = Just $ n_day $ 27 * (-365)
|
||||||
|
userPrefersPostal: false
|
||||||
|
|
||||||
|
- tinaTester:
|
||||||
|
<<: *default-user
|
||||||
|
userIdent: "tester@campus.lmu.de"
|
||||||
|
userAuthentication: null
|
||||||
|
userMatrikelnummer: "999"
|
||||||
|
userEmail: "tester@campus.lmu.de"
|
||||||
|
userDisplayEmail: "tina@tester.example"
|
||||||
|
userDisplayName: "Tina Tester"
|
||||||
|
userSurname: "vön Tërrör¿"
|
||||||
|
userFirstName: "Sabrina"
|
||||||
|
userTitle: "Magister"
|
||||||
|
userMaxFavourites: 5
|
||||||
|
userTheme: ThemeAberdeenReds
|
||||||
|
userLanguages: ["sn"]
|
||||||
|
userSex: SexNotApplicable
|
||||||
|
# userBirthday = Just $ n_day 3
|
||||||
|
userCompanyPersonalNumber: "12345"
|
||||||
|
userPrefersPostal: false
|
||||||
|
|
||||||
|
- svaupel:
|
||||||
|
<<: *default-user
|
||||||
|
userIdent: "vaupel.sarah@campus.lmu.de"
|
||||||
|
userEmail: "vaupel.sarah@campus.lmu.de"
|
||||||
|
userDisplayEmail: "vaupel.sarah@campus.lmu.de"
|
||||||
|
userDisplayName: "Sarah Vaupel"
|
||||||
|
userSurname: "Vaupel"
|
||||||
|
userFirstName: "Sarah"
|
||||||
|
userMaxFavourites: 14
|
||||||
|
userMaxFavouriteTerms: 4
|
||||||
|
userTheme: ThemeMossGreen
|
||||||
|
userLanguages: null
|
||||||
|
userSex: SexFemale
|
||||||
|
userPrefersPostal: false
|
||||||
|
|
||||||
|
- sbarth:
|
||||||
|
<<: *default-user
|
||||||
|
userIdent: "Stephan.Barth@campus.lmu.de"
|
||||||
|
userEmail: "Stephan.Barth@lmu.de"
|
||||||
|
userDisplayEmail: "stephan.barth@ifi.lmu.de"
|
||||||
|
userDisplayName: "Stephan Barth"
|
||||||
|
userSurname: "Barth"
|
||||||
|
userFirstName: "Stephan"
|
||||||
|
userTheme: ThemeMossGreen
|
||||||
|
userSex: SexMale
|
||||||
|
userPrefersPostal: false
|
||||||
|
userExamOfficeGetSynced: false
|
||||||
|
userExamOfficeGetLabels: true
|
||||||
|
|
||||||
|
- _stranger1:
|
||||||
|
userIdent: "AVSID:996699"
|
||||||
|
userEmail: "E996699@fraport.de"
|
||||||
|
userDisplayEmail: ""
|
||||||
|
userDisplayName: "Stranger One"
|
||||||
|
userSurname: "One"
|
||||||
|
userFirstName: "Stranger"
|
||||||
|
userTheme: ThemeMossGreen
|
||||||
|
userSex: SexMale
|
||||||
|
userCompanyPersonalNumber: "E996699"
|
||||||
|
userCompanyDepartment: "AVN-Strange"
|
||||||
|
userPrefersPostal: false
|
||||||
|
userExamOfficeGetSynced: false
|
||||||
|
userExamOfficeGetLabels: true
|
||||||
|
|
||||||
|
- _stranger2:
|
||||||
|
userIdent: "AVSID:669966"
|
||||||
|
userEmail: "E669966@fraport.de"
|
||||||
|
userDisplayEmail: ""
|
||||||
|
userDisplayName: "Stranger Two"
|
||||||
|
userSurname: "Stranger"
|
||||||
|
userFirstName: "Two"
|
||||||
|
userTheme: ThemeMossGreen
|
||||||
|
userSex: SexMale
|
||||||
|
userCompanyPersonalNumber: "669966"
|
||||||
|
userCompanyDepartment: "AVN-Strange"
|
||||||
|
userPrefersPostal: false
|
||||||
|
userExamOfficeGetSynced: false
|
||||||
|
userExamOfficeGetLabels: true
|
||||||
|
|
||||||
|
- _stranger3:
|
||||||
|
userIdent: "AVSID:6969"
|
||||||
|
userEmail: "E6969@fraport.de"
|
||||||
|
userDisplayEmail: ""
|
||||||
|
userDisplayName: "Stranger 3 Three"
|
||||||
|
userSurname: "Three"
|
||||||
|
userFirstName: "Stranger"
|
||||||
|
userTheme: ThemeMossGreen
|
||||||
|
userSex: SexMale
|
||||||
|
userCompanyPersonalNumber: "E996699"
|
||||||
|
userCompanyDepartment: "AVN-Strange"
|
||||||
|
userPostAddress: "Kartoffelweg 12 \n666 Höllensumpf \nFreiland"
|
||||||
|
userPrefersPostal: false
|
||||||
|
userExamOfficeGetSynced: false
|
||||||
|
userExamOfficeGetLabels: true
|
||||||
|
|
||||||
|
|
||||||
|
random-users:
|
||||||
|
firstNames: [ "James", "John", "Robert", "Michael"
|
||||||
|
, "William", "David", "Mary", "Richard"
|
||||||
|
, "Joseph", "Thomas", "Charles", "Daniel"
|
||||||
|
, "Matthew", "Patricia", "Jennifer", "Linda"
|
||||||
|
, "Elizabeth", "Barbara", "Anthony", "Donald"
|
||||||
|
, "Mark", "Paul", "Steven", "Andrew"
|
||||||
|
, "Kenneth", "Joshua", "George", "Kevin"
|
||||||
|
, "Brian", "Edward", "Susan", "Ronald"
|
||||||
|
]
|
||||||
|
surnames: [ "Smith", "Johnson", "Williams", "Brown"
|
||||||
|
, "Jones", "Miller", "Davis", "Garcia"
|
||||||
|
, "Rodriguez", "Wilson", "Martinez", "Anderson"
|
||||||
|
, "Taylor", "Thomas", "Hernandez", "Moore"
|
||||||
|
, "Martin", "Jackson", "Thompson", "White"
|
||||||
|
, "Lopez", "Lee", "Gonzalez", "Harris"
|
||||||
|
, "Clark", "Lewis", "Robinson", "Walker"
|
||||||
|
, "Perez", "Hall", "Young", "Allen"
|
||||||
|
]
|
||||||
|
middlenames: [ null, "Jamesson" ]
|
||||||
|
|
||||||
@ -51,7 +51,6 @@ makeUsers (fromIntegral -> n) = do
|
|||||||
let baseid = "user." <> tshow i
|
let baseid = "user." <> tshow i
|
||||||
u' = u { userIdent = CI.mk baseid
|
u' = u { userIdent = CI.mk baseid
|
||||||
, userEmail = CI.mk $ baseid <> "@example.com"
|
, userEmail = CI.mk $ baseid <> "@example.com"
|
||||||
, userLdapPrimaryKey = Just $ baseid <> ".ldap"
|
|
||||||
}
|
}
|
||||||
return u'
|
return u'
|
||||||
uids <- insertMany users
|
uids <- insertMany users
|
||||||
|
|||||||
@ -10,7 +10,6 @@ module Model.TypesSpec
|
|||||||
|
|
||||||
import TestImport
|
import TestImport
|
||||||
import TestInstances ()
|
import TestInstances ()
|
||||||
import Settings
|
|
||||||
|
|
||||||
import Utils (guardOn)
|
import Utils (guardOn)
|
||||||
|
|
||||||
@ -21,7 +20,6 @@ import qualified Data.Aeson.Types as Aeson
|
|||||||
import Model.Types.LanguagesSpec ()
|
import Model.Types.LanguagesSpec ()
|
||||||
|
|
||||||
import System.IO.Unsafe
|
import System.IO.Unsafe
|
||||||
import Yesod.Auth.Util.PasswordStore
|
|
||||||
|
|
||||||
import Database.Persist.Sql (SqlBackend, fromSqlKey, toSqlKey)
|
import Database.Persist.Sql (SqlBackend, fromSqlKey, toSqlKey)
|
||||||
|
|
||||||
@ -217,21 +215,6 @@ instance Arbitrary Value where
|
|||||||
arbitrary' = scale (`div` 2) arbitrary
|
arbitrary' = scale (`div` 2) arbitrary
|
||||||
shrink = genericShrink
|
shrink = genericShrink
|
||||||
|
|
||||||
instance Arbitrary AuthenticationMode where
|
|
||||||
arbitrary = oneof
|
|
||||||
[ pure AuthLDAP
|
|
||||||
, do
|
|
||||||
pw <- encodeUtf8 . pack . getPrintableString <$> arbitrary
|
|
||||||
let
|
|
||||||
PWHashConf{..} = appAuthPWHash compileTimeAppSettings
|
|
||||||
authPWHash = unsafePerformIO . fmap decodeUtf8 $ makePasswordWith pwHashAlgorithm pw (pwHashStrength `div` 2)
|
|
||||||
return $ AuthPWHash{..}
|
|
||||||
]
|
|
||||||
|
|
||||||
shrink AuthLDAP = []
|
|
||||||
shrink AuthNoLogin = []
|
|
||||||
shrink (AuthPWHash _) = [AuthLDAP]
|
|
||||||
|
|
||||||
instance Arbitrary LecturerType where
|
instance Arbitrary LecturerType where
|
||||||
arbitrary = genericArbitrary
|
arbitrary = genericArbitrary
|
||||||
shrink = genericShrink
|
shrink = genericShrink
|
||||||
@ -462,8 +445,6 @@ spec = do
|
|||||||
[ eqLaws, ordLaws, boundedEnumLaws, showReadLaws, jsonLaws, finiteLaws, pathPieceLaws, persistFieldLaws ]
|
[ eqLaws, ordLaws, boundedEnumLaws, showReadLaws, jsonLaws, finiteLaws, pathPieceLaws, persistFieldLaws ]
|
||||||
lawsCheckHspec (Proxy @CorrectorState)
|
lawsCheckHspec (Proxy @CorrectorState)
|
||||||
[ eqLaws, ordLaws, showReadLaws, boundedEnumLaws, jsonLaws, finiteLaws, pathPieceLaws, persistFieldLaws ]
|
[ eqLaws, ordLaws, showReadLaws, boundedEnumLaws, jsonLaws, finiteLaws, pathPieceLaws, persistFieldLaws ]
|
||||||
lawsCheckHspec (Proxy @AuthenticationMode)
|
|
||||||
[ eqLaws, ordLaws, showReadLaws, jsonLaws, persistFieldLaws ]
|
|
||||||
lawsCheckHspec (Proxy @Value)
|
lawsCheckHspec (Proxy @Value)
|
||||||
[ persistFieldLaws ]
|
[ persistFieldLaws ]
|
||||||
lawsCheckHspec (Proxy @Scientific)
|
lawsCheckHspec (Proxy @Scientific)
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
-- SPDX-FileCopyrightText: 2022 Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
-- SPDX-FileCopyrightText: 2022-2024 Sarah Vaupel <sarah.vaupel@uniworx.de>, Gregor Kleen <gregor.kleen@ifi.lmu.de>,Sarah Vaupel <sarah.vaupel@ifi.lmu.de>,Steffen Jost <jost@cip.ifi.lmu.de>,Steffen Jost <jost@tcs.ifi.lmu.de>
|
||||||
--
|
--
|
||||||
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
-- SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
@ -9,7 +9,7 @@ module ModelSpec where
|
|||||||
|
|
||||||
import TestImport
|
import TestImport
|
||||||
|
|
||||||
import Settings (getTimeLocale', VerpMode(..))
|
import Settings
|
||||||
|
|
||||||
import Model.TypesSpec ()
|
import Model.TypesSpec ()
|
||||||
import MailSpec ()
|
import MailSpec ()
|
||||||
@ -34,9 +34,10 @@ import qualified Data.CryptoID.Class.ImplicitNamespace as Implicit
|
|||||||
import qualified Data.CryptoID.Class as Explicit
|
import qualified Data.CryptoID.Class as Explicit
|
||||||
import Data.Binary.SerializationLength
|
import Data.Binary.SerializationLength
|
||||||
|
|
||||||
import Control.Monad.Catch.Pure (Catch, runCatch)
|
import System.IO.Unsafe
|
||||||
|
import Yesod.Auth.Util.PasswordStore
|
||||||
|
|
||||||
import System.IO.Unsafe (unsafePerformIO)
|
import Control.Monad.Catch.Pure (Catch, runCatch)
|
||||||
|
|
||||||
import Data.Universe
|
import Data.Universe
|
||||||
|
|
||||||
@ -102,7 +103,12 @@ instance Arbitrary User where
|
|||||||
[ getPrintableString <$> arbitrary
|
[ getPrintableString <$> arbitrary
|
||||||
, on (\l d -> l <> "@" <> d) getPrintableString <$> arbitrary <*> arbitrary
|
, on (\l d -> l <> "@" <> d) getPrintableString <$> arbitrary <*> arbitrary
|
||||||
]
|
]
|
||||||
userAuthentication <- arbitrary
|
userPasswordHash <-
|
||||||
|
let genPwd = do
|
||||||
|
pw <- encodeUtf8 . pack . getPrintableString <$> arbitrary
|
||||||
|
let PWHashConf{..} = appAuthPWHash compileTimeAppSettings
|
||||||
|
return . unsafePerformIO . fmap decodeUtf8 $ makePasswordWith pwHashAlgorithm pw (pwHashStrength `div` 2)
|
||||||
|
in oneof [ pure Nothing, Just <$> genPwd ]
|
||||||
userLastAuthentication <- arbitrary
|
userLastAuthentication <- arbitrary
|
||||||
userTokensIssuedAfter <- arbitrary
|
userTokensIssuedAfter <- arbitrary
|
||||||
userMatrikelnummer <- fmap pack . assertM' (not . null) <$> listOf (elements ['0'..'9'])
|
userMatrikelnummer <- fmap pack . assertM' (not . null) <$> listOf (elements ['0'..'9'])
|
||||||
@ -146,14 +152,7 @@ instance Arbitrary User where
|
|||||||
userExamOfficeGetLabels <- arbitrary
|
userExamOfficeGetLabels <- arbitrary
|
||||||
|
|
||||||
userCreated <- arbitrary
|
userCreated <- arbitrary
|
||||||
userLastLdapSynchronisation <- arbitrary
|
userLastSync <- arbitrary
|
||||||
userLdapPrimaryKey <- oneof
|
|
||||||
[ pure Nothing
|
|
||||||
, fmap Just $ pack <$> oneof
|
|
||||||
[ getPrintableString <$> arbitrary
|
|
||||||
, on (\l d -> l <> "@" <> d) getPrintableString <$> arbitrary <*> arbitrary
|
|
||||||
]
|
|
||||||
]
|
|
||||||
|
|
||||||
return User{..}
|
return User{..}
|
||||||
shrink = genericShrink
|
shrink = genericShrink
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user