Compare commits
5 commits
29d1f41de5
...
4f6b5bab31
Author | SHA1 | Date | |
---|---|---|---|
4f6b5bab31 | |||
c6211418a6 | |||
![]() |
3139bab32f | ||
![]() |
00148b02eb | ||
ef002bf406 |
15 changed files with 46 additions and 44 deletions
6
.vscode/settings.json
vendored
6
.vscode/settings.json
vendored
|
@ -1,4 +1,4 @@
|
|||
{
|
||||
"rust-analyzer.check.features": "all",
|
||||
"rust-analyzer.cargo.features": "all"
|
||||
}
|
||||
"rust-analyzer.check.features": "all",
|
||||
"rust-analyzer.cargo.features": "all"
|
||||
}
|
||||
|
|
|
@ -1,15 +1,8 @@
|
|||
when:
|
||||
- event: push
|
||||
branch: main
|
||||
- event: pull_request
|
||||
|
||||
steps:
|
||||
- name: "Run nix flake check"
|
||||
image: docker.nix-community.org/nixpkgs/nix-flakes
|
||||
commands:
|
||||
- nix fmt
|
||||
- name: push commit
|
||||
image: appleboy/drone-git-push
|
||||
settings:
|
||||
remote_name: origin
|
||||
branch: main
|
||||
local_ref: main
|
||||
- nix fmt -- --fail-on-change
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
# peer-group-grading
|
||||
Wir sind cool
|
||||
|
||||
Wir sind cool
|
||||
|
|
|
@ -2,8 +2,5 @@
|
|||
"version": "1",
|
||||
"name": "pgg-bruno",
|
||||
"type": "collection",
|
||||
"ignore": [
|
||||
"node_modules",
|
||||
".git"
|
||||
]
|
||||
}
|
||||
"ignore": ["node_modules", ".git"]
|
||||
}
|
||||
|
|
|
@ -1,11 +1,12 @@
|
|||
use actix_session::Session;
|
||||
use actix_web::{
|
||||
HttpResponse, Responder, post,
|
||||
post,
|
||||
web::{self, ServiceConfig},
|
||||
HttpResponse, Responder,
|
||||
};
|
||||
use serde::Deserialize;
|
||||
|
||||
use crate::{Database, error::ApiError};
|
||||
use crate::{error::ApiError, Database};
|
||||
|
||||
#[derive(Deserialize)]
|
||||
struct LoginRequest {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
use actix_web::{Responder, delete, get, post, put};
|
||||
use actix_web::{delete, get, post, put, Responder};
|
||||
|
||||
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
|
||||
cfg.service(get_classes)
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
use actix_web::{Responder, delete, get, post, put};
|
||||
use actix_web::{delete, get, post, put, Responder};
|
||||
|
||||
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
|
||||
cfg.service(get_groups)
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
use actix_web::{Result, delete, get, post, put, web};
|
||||
use actix_web::{delete, get, post, put, web, Result};
|
||||
use uuid::Uuid;
|
||||
use validator::Validate;
|
||||
|
||||
use crate::db::Database;
|
||||
use crate::db::project::CreateProject;
|
||||
use crate::db::Database;
|
||||
use crate::entity;
|
||||
use crate::error::ApiError;
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
use actix_web::{Responder, delete, get, post, put};
|
||||
use actix_web::{delete, get, post, put, Responder};
|
||||
|
||||
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
|
||||
cfg.service(get_templates)
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
use crate::{Database, entity, error::ApiError};
|
||||
use actix_web::{Responder, delete, get, post, put, web};
|
||||
use crate::{entity, error::ApiError, Database};
|
||||
use actix_web::{delete, get, post, put, web, Responder};
|
||||
use serde::Deserialize;
|
||||
use validator::Validate;
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
use crate::error::ApiError;
|
||||
use argon2::{
|
||||
password_hash::{rand_core::OsRng, PasswordHasher, SaltString},
|
||||
Argon2, PasswordHash, PasswordVerifier,
|
||||
password_hash::{PasswordHasher, SaltString, rand_core::OsRng},
|
||||
};
|
||||
use sea_orm::{
|
||||
ActiveModelTrait,
|
||||
|
@ -10,7 +10,7 @@ use sea_orm::{
|
|||
};
|
||||
use uuid::Uuid;
|
||||
|
||||
use crate::{Database, entity};
|
||||
use crate::{entity, Database};
|
||||
|
||||
impl Database {
|
||||
pub async fn create_user(
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
use actix_web::{HttpResponse, ResponseError, cookie::time::error, http::StatusCode};
|
||||
use actix_web::{cookie::time::error, http::StatusCode, HttpResponse, ResponseError};
|
||||
use sea_orm::TransactionError;
|
||||
use thiserror::Error;
|
||||
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
use actix_files::NamedFile;
|
||||
use actix_session::{SessionMiddleware, storage::RedisSessionStore};
|
||||
use actix_web::{App, HttpResponse, HttpServer, cookie::Key, middleware::Logger, web};
|
||||
use actix_session::{storage::RedisSessionStore, SessionMiddleware};
|
||||
use actix_web::{cookie::Key, middleware::Logger, web, App, HttpResponse, HttpServer};
|
||||
use log::debug;
|
||||
|
||||
mod controller;
|
||||
mod db;
|
||||
mod error;
|
||||
|
||||
pub use db::Database;
|
||||
pub use db::entity;
|
||||
pub use db::Database;
|
||||
|
||||
#[derive(Clone)]
|
||||
struct AppConfig {
|
||||
|
|
|
@ -30,17 +30,19 @@ fn authenticate_user(username: &str, password: &str) -> Result<bool, Box<dyn std
|
|||
let ldap = LdapConn::new(&ldap_server)?;
|
||||
|
||||
// Search for the user in the LDAP directory
|
||||
let (rs, _res) = ldap.search(
|
||||
&format!("ou=users,{}", base_dn), // Search under "ou=users"
|
||||
Scope::Subtree, // Search all levels
|
||||
&format!("(uid={})", username), // Filter by username
|
||||
vec!["dn"], // Retrieve the distinguished name (DN)
|
||||
)?.success()?;
|
||||
let (rs, _res) = ldap
|
||||
.search(
|
||||
&format!("ou=users,{}", base_dn), // Search under "ou=users"
|
||||
Scope::Subtree, // Search all levels
|
||||
&format!("(uid={})", username), // Filter by username
|
||||
vec!["dn"], // Retrieve the distinguished name (DN)
|
||||
)?
|
||||
.success()?;
|
||||
|
||||
// If user is found, attempt to authenticate with their DN and password
|
||||
if let Some(entry) = rs.into_iter().next() {
|
||||
let user_dn = SearchEntry::construct(entry).dn; // Extract user DN
|
||||
|
||||
|
||||
// Reconnect and bind with user credentials
|
||||
let user_ldap = LdapConn::new(&ldap_server)?;
|
||||
let auth_result = user_ldap.simple_bind(&user_dn, password)?.success();
|
||||
|
@ -60,4 +62,4 @@ async fn main() -> std::io::Result<()> {
|
|||
.bind(("127.0.0.1", 8080))?
|
||||
.run()
|
||||
.await
|
||||
}
|
||||
}
|
||||
|
|
|
@ -39,13 +39,21 @@ services:
|
|||
- ./crates/ldap/src/users.ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom/users.ldif
|
||||
|
||||
healthcheck:
|
||||
test: ["CMD", "ldapsearch", "-x", "-H", "ldap://localhost", "-b", "dc=Schule,dc=intern"]
|
||||
test:
|
||||
[
|
||||
"CMD",
|
||||
"ldapsearch",
|
||||
"-x",
|
||||
"-H",
|
||||
"ldap://localhost",
|
||||
"-b",
|
||||
"dc=Schule,dc=intern",
|
||||
]
|
||||
interval: 30s
|
||||
retries: 3
|
||||
|
||||
|
||||
volumes:
|
||||
postgres_data:
|
||||
redis:
|
||||
openldap_data:
|
||||
openldap_config:
|
||||
openldap_config:
|
||||
|
|
Loading…
Add table
Reference in a new issue