Compare commits

..

5 commits

Author SHA1 Message Date
4f6b5bab31 Adding primevue to project
Some checks failed
ci/woodpecker/pr/check_fmt Pipeline failed
2025-04-04 11:48:14 +02:00
c6211418a6 Adding PrimeVue dependencies 2025-04-04 11:48:14 +02:00
jopejoe1
3139bab32f run treefmt 2025-04-04 11:32:19 +02:00
jopejoe1
00148b02eb make ci run on prs 2025-04-04 11:31:16 +02:00
ef002bf406 revert 54ca7f90b1
Some checks failed
ci/woodpecker/push/check_fmt Pipeline failed
revert commit fmt
2025-04-04 11:26:14 +02:00
15 changed files with 46 additions and 44 deletions

View file

@ -1,4 +1,4 @@
{ {
"rust-analyzer.check.features": "all", "rust-analyzer.check.features": "all",
"rust-analyzer.cargo.features": "all" "rust-analyzer.cargo.features": "all"
} }

View file

@ -1,15 +1,8 @@
when: when:
- event: push - event: pull_request
branch: main
steps: steps:
- name: "Run nix flake check" - name: "Run nix flake check"
image: docker.nix-community.org/nixpkgs/nix-flakes image: docker.nix-community.org/nixpkgs/nix-flakes
commands: commands:
- nix fmt - nix fmt -- --fail-on-change
- name: push commit
image: appleboy/drone-git-push
settings:
remote_name: origin
branch: main
local_ref: main

View file

@ -1,2 +1,3 @@
# peer-group-grading # peer-group-grading
Wir sind cool
Wir sind cool

View file

@ -2,8 +2,5 @@
"version": "1", "version": "1",
"name": "pgg-bruno", "name": "pgg-bruno",
"type": "collection", "type": "collection",
"ignore": [ "ignore": ["node_modules", ".git"]
"node_modules", }
".git"
]
}

View file

@ -1,11 +1,12 @@
use actix_session::Session; use actix_session::Session;
use actix_web::{ use actix_web::{
HttpResponse, Responder, post, post,
web::{self, ServiceConfig}, web::{self, ServiceConfig},
HttpResponse, Responder,
}; };
use serde::Deserialize; use serde::Deserialize;
use crate::{Database, error::ApiError}; use crate::{error::ApiError, Database};
#[derive(Deserialize)] #[derive(Deserialize)]
struct LoginRequest { struct LoginRequest {

View file

@ -1,4 +1,4 @@
use actix_web::{Responder, delete, get, post, put}; use actix_web::{delete, get, post, put, Responder};
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) { pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
cfg.service(get_classes) cfg.service(get_classes)

View file

@ -1,4 +1,4 @@
use actix_web::{Responder, delete, get, post, put}; use actix_web::{delete, get, post, put, Responder};
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) { pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
cfg.service(get_groups) cfg.service(get_groups)

View file

@ -1,9 +1,9 @@
use actix_web::{Result, delete, get, post, put, web}; use actix_web::{delete, get, post, put, web, Result};
use uuid::Uuid; use uuid::Uuid;
use validator::Validate; use validator::Validate;
use crate::db::Database;
use crate::db::project::CreateProject; use crate::db::project::CreateProject;
use crate::db::Database;
use crate::entity; use crate::entity;
use crate::error::ApiError; use crate::error::ApiError;

View file

@ -1,4 +1,4 @@
use actix_web::{Responder, delete, get, post, put}; use actix_web::{delete, get, post, put, Responder};
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) { pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
cfg.service(get_templates) cfg.service(get_templates)

View file

@ -1,5 +1,5 @@
use crate::{Database, entity, error::ApiError}; use crate::{entity, error::ApiError, Database};
use actix_web::{Responder, delete, get, post, put, web}; use actix_web::{delete, get, post, put, web, Responder};
use serde::Deserialize; use serde::Deserialize;
use validator::Validate; use validator::Validate;

View file

@ -1,7 +1,7 @@
use crate::error::ApiError; use crate::error::ApiError;
use argon2::{ use argon2::{
password_hash::{rand_core::OsRng, PasswordHasher, SaltString},
Argon2, PasswordHash, PasswordVerifier, Argon2, PasswordHash, PasswordVerifier,
password_hash::{PasswordHasher, SaltString, rand_core::OsRng},
}; };
use sea_orm::{ use sea_orm::{
ActiveModelTrait, ActiveModelTrait,
@ -10,7 +10,7 @@ use sea_orm::{
}; };
use uuid::Uuid; use uuid::Uuid;
use crate::{Database, entity}; use crate::{entity, Database};
impl Database { impl Database {
pub async fn create_user( pub async fn create_user(

View file

@ -1,4 +1,4 @@
use actix_web::{HttpResponse, ResponseError, cookie::time::error, http::StatusCode}; use actix_web::{cookie::time::error, http::StatusCode, HttpResponse, ResponseError};
use sea_orm::TransactionError; use sea_orm::TransactionError;
use thiserror::Error; use thiserror::Error;

View file

@ -1,14 +1,14 @@
use actix_files::NamedFile; use actix_files::NamedFile;
use actix_session::{SessionMiddleware, storage::RedisSessionStore}; use actix_session::{storage::RedisSessionStore, SessionMiddleware};
use actix_web::{App, HttpResponse, HttpServer, cookie::Key, middleware::Logger, web}; use actix_web::{cookie::Key, middleware::Logger, web, App, HttpResponse, HttpServer};
use log::debug; use log::debug;
mod controller; mod controller;
mod db; mod db;
mod error; mod error;
pub use db::Database;
pub use db::entity; pub use db::entity;
pub use db::Database;
#[derive(Clone)] #[derive(Clone)]
struct AppConfig { struct AppConfig {

View file

@ -30,17 +30,19 @@ fn authenticate_user(username: &str, password: &str) -> Result<bool, Box<dyn std
let ldap = LdapConn::new(&ldap_server)?; let ldap = LdapConn::new(&ldap_server)?;
// Search for the user in the LDAP directory // Search for the user in the LDAP directory
let (rs, _res) = ldap.search( let (rs, _res) = ldap
&format!("ou=users,{}", base_dn), // Search under "ou=users" .search(
Scope::Subtree, // Search all levels &format!("ou=users,{}", base_dn), // Search under "ou=users"
&format!("(uid={})", username), // Filter by username Scope::Subtree, // Search all levels
vec!["dn"], // Retrieve the distinguished name (DN) &format!("(uid={})", username), // Filter by username
)?.success()?; vec!["dn"], // Retrieve the distinguished name (DN)
)?
.success()?;
// If user is found, attempt to authenticate with their DN and password // If user is found, attempt to authenticate with their DN and password
if let Some(entry) = rs.into_iter().next() { if let Some(entry) = rs.into_iter().next() {
let user_dn = SearchEntry::construct(entry).dn; // Extract user DN let user_dn = SearchEntry::construct(entry).dn; // Extract user DN
// Reconnect and bind with user credentials // Reconnect and bind with user credentials
let user_ldap = LdapConn::new(&ldap_server)?; let user_ldap = LdapConn::new(&ldap_server)?;
let auth_result = user_ldap.simple_bind(&user_dn, password)?.success(); let auth_result = user_ldap.simple_bind(&user_dn, password)?.success();
@ -60,4 +62,4 @@ async fn main() -> std::io::Result<()> {
.bind(("127.0.0.1", 8080))? .bind(("127.0.0.1", 8080))?
.run() .run()
.await .await
} }

View file

@ -39,13 +39,21 @@ services:
- ./crates/ldap/src/users.ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom/users.ldif - ./crates/ldap/src/users.ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom/users.ldif
healthcheck: healthcheck:
test: ["CMD", "ldapsearch", "-x", "-H", "ldap://localhost", "-b", "dc=Schule,dc=intern"] test:
[
"CMD",
"ldapsearch",
"-x",
"-H",
"ldap://localhost",
"-b",
"dc=Schule,dc=intern",
]
interval: 30s interval: 30s
retries: 3 retries: 3
volumes: volumes:
postgres_data: postgres_data:
redis: redis:
openldap_data: openldap_data:
openldap_config: openldap_config: