Compare commits

..

5 commits

Author SHA1 Message Date
4f6b5bab31 Adding primevue to project
Some checks failed
ci/woodpecker/pr/check_fmt Pipeline failed
2025-04-04 11:48:14 +02:00
c6211418a6 Adding PrimeVue dependencies 2025-04-04 11:48:14 +02:00
jopejoe1
3139bab32f run treefmt 2025-04-04 11:32:19 +02:00
jopejoe1
00148b02eb make ci run on prs 2025-04-04 11:31:16 +02:00
ef002bf406 revert 54ca7f90b1
Some checks failed
ci/woodpecker/push/check_fmt Pipeline failed
revert commit fmt
2025-04-04 11:26:14 +02:00
15 changed files with 46 additions and 44 deletions

View file

@ -1,4 +1,4 @@
{
"rust-analyzer.check.features": "all",
"rust-analyzer.cargo.features": "all"
}
"rust-analyzer.check.features": "all",
"rust-analyzer.cargo.features": "all"
}

View file

@ -1,15 +1,8 @@
when:
- event: push
branch: main
- event: pull_request
steps:
- name: "Run nix flake check"
image: docker.nix-community.org/nixpkgs/nix-flakes
commands:
- nix fmt
- name: push commit
image: appleboy/drone-git-push
settings:
remote_name: origin
branch: main
local_ref: main
- nix fmt -- --fail-on-change

View file

@ -1,2 +1,3 @@
# peer-group-grading
Wir sind cool
Wir sind cool

View file

@ -2,8 +2,5 @@
"version": "1",
"name": "pgg-bruno",
"type": "collection",
"ignore": [
"node_modules",
".git"
]
}
"ignore": ["node_modules", ".git"]
}

View file

@ -1,11 +1,12 @@
use actix_session::Session;
use actix_web::{
HttpResponse, Responder, post,
post,
web::{self, ServiceConfig},
HttpResponse, Responder,
};
use serde::Deserialize;
use crate::{Database, error::ApiError};
use crate::{error::ApiError, Database};
#[derive(Deserialize)]
struct LoginRequest {

View file

@ -1,4 +1,4 @@
use actix_web::{Responder, delete, get, post, put};
use actix_web::{delete, get, post, put, Responder};
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
cfg.service(get_classes)

View file

@ -1,4 +1,4 @@
use actix_web::{Responder, delete, get, post, put};
use actix_web::{delete, get, post, put, Responder};
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
cfg.service(get_groups)

View file

@ -1,9 +1,9 @@
use actix_web::{Result, delete, get, post, put, web};
use actix_web::{delete, get, post, put, web, Result};
use uuid::Uuid;
use validator::Validate;
use crate::db::Database;
use crate::db::project::CreateProject;
use crate::db::Database;
use crate::entity;
use crate::error::ApiError;

View file

@ -1,4 +1,4 @@
use actix_web::{Responder, delete, get, post, put};
use actix_web::{delete, get, post, put, Responder};
pub fn setup(cfg: &mut actix_web::web::ServiceConfig) {
cfg.service(get_templates)

View file

@ -1,5 +1,5 @@
use crate::{Database, entity, error::ApiError};
use actix_web::{Responder, delete, get, post, put, web};
use crate::{entity, error::ApiError, Database};
use actix_web::{delete, get, post, put, web, Responder};
use serde::Deserialize;
use validator::Validate;

View file

@ -1,7 +1,7 @@
use crate::error::ApiError;
use argon2::{
password_hash::{rand_core::OsRng, PasswordHasher, SaltString},
Argon2, PasswordHash, PasswordVerifier,
password_hash::{PasswordHasher, SaltString, rand_core::OsRng},
};
use sea_orm::{
ActiveModelTrait,
@ -10,7 +10,7 @@ use sea_orm::{
};
use uuid::Uuid;
use crate::{Database, entity};
use crate::{entity, Database};
impl Database {
pub async fn create_user(

View file

@ -1,4 +1,4 @@
use actix_web::{HttpResponse, ResponseError, cookie::time::error, http::StatusCode};
use actix_web::{cookie::time::error, http::StatusCode, HttpResponse, ResponseError};
use sea_orm::TransactionError;
use thiserror::Error;

View file

@ -1,14 +1,14 @@
use actix_files::NamedFile;
use actix_session::{SessionMiddleware, storage::RedisSessionStore};
use actix_web::{App, HttpResponse, HttpServer, cookie::Key, middleware::Logger, web};
use actix_session::{storage::RedisSessionStore, SessionMiddleware};
use actix_web::{cookie::Key, middleware::Logger, web, App, HttpResponse, HttpServer};
use log::debug;
mod controller;
mod db;
mod error;
pub use db::Database;
pub use db::entity;
pub use db::Database;
#[derive(Clone)]
struct AppConfig {

View file

@ -30,17 +30,19 @@ fn authenticate_user(username: &str, password: &str) -> Result<bool, Box<dyn std
let ldap = LdapConn::new(&ldap_server)?;
// Search for the user in the LDAP directory
let (rs, _res) = ldap.search(
&format!("ou=users,{}", base_dn), // Search under "ou=users"
Scope::Subtree, // Search all levels
&format!("(uid={})", username), // Filter by username
vec!["dn"], // Retrieve the distinguished name (DN)
)?.success()?;
let (rs, _res) = ldap
.search(
&format!("ou=users,{}", base_dn), // Search under "ou=users"
Scope::Subtree, // Search all levels
&format!("(uid={})", username), // Filter by username
vec!["dn"], // Retrieve the distinguished name (DN)
)?
.success()?;
// If user is found, attempt to authenticate with their DN and password
if let Some(entry) = rs.into_iter().next() {
let user_dn = SearchEntry::construct(entry).dn; // Extract user DN
// Reconnect and bind with user credentials
let user_ldap = LdapConn::new(&ldap_server)?;
let auth_result = user_ldap.simple_bind(&user_dn, password)?.success();
@ -60,4 +62,4 @@ async fn main() -> std::io::Result<()> {
.bind(("127.0.0.1", 8080))?
.run()
.await
}
}

View file

@ -39,13 +39,21 @@ services:
- ./crates/ldap/src/users.ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom/users.ldif
healthcheck:
test: ["CMD", "ldapsearch", "-x", "-H", "ldap://localhost", "-b", "dc=Schule,dc=intern"]
test:
[
"CMD",
"ldapsearch",
"-x",
"-H",
"ldap://localhost",
"-b",
"dc=Schule,dc=intern",
]
interval: 30s
retries: 3
volumes:
postgres_data:
redis:
openldap_data:
openldap_config:
openldap_config: