rename users and groups extensions

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
This commit is contained in:
Jörn Friedrich Dreyer
2022-05-05 08:50:18 +00:00
parent 2b6220d790
commit 51e1aa2978
47 changed files with 112 additions and 112 deletions

View File

@@ -55,7 +55,7 @@ config = {
"extensions/glauth",
"extensions/graph-explorer",
"extensions/graph",
"extensions/group",
"extensions/groups",
"extensions/idm",
"extensions/idp",
"extensions/nats",
@@ -71,7 +71,7 @@ config = {
"extensions/storage-users",
"extensions/store",
"extensions/thumbnails",
"extensions/user",
"extensions/users",
"extensions/web",
"extensions/webdav",
"ocis-pkg",
@@ -1721,7 +1721,7 @@ def ocisServer(storage, accounts_hash_difficulty = 4, volumes = [], depends_on =
"SHARING_USER_OWNCLOUDSQL_DB_NAME": "owncloud",
# General oCIS config
# OCIS_RUN_EXTENSIONS specifies to start all extensions except glauth, idp and accounts. These are replaced by external services
"OCIS_RUN_EXTENSIONS": "settings,storage-system,graph,graph-explorer,ocs,store,thumbnails,web,webdav,frontend,gateway,user,group,auth-basic,auth-bearer,auth-machine,storage-users,storage-shares,storage-publiclink,app-provider,sharing,proxy,nats,ocdav",
"OCIS_RUN_EXTENSIONS": "settings,storage-system,graph,graph-explorer,ocs,store,thumbnails,web,webdav,frontend,gateway,users,groups,auth-basic,auth-bearer,auth-machine,storage-users,storage-shares,storage-publiclink,app-provider,sharing,proxy,nats,ocdav",
"OCIS_LOG_LEVEL": "info",
"OCIS_URL": OCIS_URL,
"OCIS_BASE_DATA_PATH": "/mnt/data/ocis",

2
.vscode/launch.json vendored
View File

@@ -22,7 +22,7 @@
// demo users
"IDM_CREATE_DEMO_USERS": "true",
// OCIS_RUN_EXTENSIONS allows to start a subset of extensions even in the supervised mode
//"OCIS_RUN_EXTENSIONS": "settings,storage-system,glauth,graph,graph-explorer,idp,ocs,store,thumbnails,web,webdav,frontend,gateway,user,group,auth-basic,auth-bearer,storage-authmachine,storage-users,storage-shares,storage-publiclink,app-provider,sharing,accounts,proxy,ocdav",
//"OCIS_RUN_EXTENSIONS": "settings,storage-system,glauth,graph,graph-explorer,idp,ocs,store,thumbnails,web,webdav,frontend,gateway,users,groups,auth-basic,auth-bearer,storage-authmachine,storage-users,storage-shares,storage-publiclink,app-provider,sharing,accounts,proxy,ocdav",
/*
* Keep secrets and passwords in one block to allow easy uncommenting

View File

@@ -28,7 +28,7 @@ OCIS_MODULES = \
extensions/glauth \
extensions/graph \
extensions/graph-explorer \
extensions/group \
extensions/groups \
extensions/idm \
extensions/idp \
extensions/nats \
@@ -44,7 +44,7 @@ OCIS_MODULES = \
extensions/storage-users \
extensions/store \
extensions/thumbnails \
extensions/user \
extensions/users \
extensions/web \
extensions/webdav\
ocis \

View File

@@ -108,7 +108,7 @@ services:
OCIS_STORAGE_READ_ONLY: "false" # TODO: conflict with OWNCLOUDSQL -> https://github.com/owncloud/ocis/issues/2303
# General oCIS config
# OCIS_RUN_EXTENSIONS specifies to start all extensions except glauth, idp and accounts. These are replaced by external services
OCIS_RUN_EXTENSIONS: settings,storage-system,graph,graph-explorer,ocs,store,thumbnails,web,webdav,storage-frontend,storage-gateway,storage-userprovider,storage-groupprovider,storage-authbasic,storage-authbearer,storage-authmachine,storage-users,storage-shares,storage-public-link,app-provider,storage-sharing,proxy,nats
OCIS_RUN_EXTENSIONS: settings,storage-system,graph,graph-explorer,ocs,store,thumbnails,web,webdav,frontend,gateway,users,groups,auth-basic,auth-bearer,auth-machine,storage-users,storage-shares,storage-publiclink,app-provider,sharing,proxy,nats
OCIS_LOG_LEVEL: ${OCIS_LOG_LEVEL:-error} # make oCIS less verbose
OCIS_URL: https://${CLOUD_DOMAIN:-cloud.owncloud.test}
PROXY_TLS: "false" # do not use SSL between Traefik and oCIS

View File

@@ -589,7 +589,7 @@ services:
driver: "local"
restart: always
storage-userprovider:
users:
image: owncloud/ocis:${OCIS_DOCKER_TAG:-latest}
deploy:
replicas: ${OCIS_SCALE:-1}
@@ -597,14 +597,14 @@ services:
ocis-net:
entrypoint:
- ocis
- storage-userprovider
- users
- server
environment:
OCIS_LOG_LEVEL: "${OCIS_LOG_LEVEL:-error}"
OCIS_LOG_COLOR: "${OCIS_LOG_COLOR:-false}"
OCIS_LOG_PRETTY: "${OCIS_LOG_PRETTY:-false}"
STORAGE_USERPROVIDER_ENDPOINT: storage-userprovider:9144
STORAGE_USERPROVIDER_ENDPOINT: users:9144
STORAGE_USERPROVIDER_ADDR: 0.0.0.0:9144
STORAGE_USERPROVIDER_DRIVER: ldap
@@ -619,7 +619,7 @@ services:
driver: "local"
restart: always
storage-groupprovider:
groups:
image: owncloud/ocis:${OCIS_DOCKER_TAG:-latest}
deploy:
replicas: ${OCIS_SCALE:-1}
@@ -627,14 +627,14 @@ services:
ocis-net:
entrypoint:
- ocis
- storage-groupprovider
- groups
- server
environment:
OCIS_LOG_LEVEL: "${OCIS_LOG_LEVEL:-error}"
OCIS_LOG_COLOR: "${OCIS_LOG_COLOR:-false}"
OCIS_LOG_PRETTY: "${OCIS_LOG_PRETTY:-false}"
STORAGE_GROUPPROVIDER_ENDPOINT: storage-groupprovider:9160
STORAGE_GROUPPROVIDER_ENDPOINT: groups:9160
STORAGE_GROUPPROVIDER_ADDR: 0.0.0.0:9160
STORAGE_GROUPPROVIDER_DRIVER: ldap
@@ -708,10 +708,10 @@ services:
STORAGE_AUTH_MACHINE_ENDPOINT: storage-authmachine:9148
STORAGE_SHARES_ENDPOINT: storage-shares:9154
STORAGE_SHARING_ENDPOINT: storage-sharing:9150
STORAGE_SHARING_ENDPOINT: sharing:9150
STORAGE_GROUPPROVIDER_ENDPOINT: storage-groupprovider:9160
STORAGE_USERPROVIDER_ENDPOINT: storage-userprovider:9144
STORAGE_GROUPPROVIDER_ENDPOINT: groups:9160
STORAGE_USERPROVIDER_ENDPOINT: users:9144
STORAGE_PERMISSIONS_ENDPOINT: settings:9191
STORAGE_FRONTEND_PUBLIC_URL: https://${OCIS_DOMAIN:-ocis.owncloud.test}

View File

@@ -163,7 +163,7 @@ services:
OCIS_TRACING_ENDPOINT: jaeger-agent:6831
# metrics
STORAGE_SHARING_DEBUG_ADDR: 0.0.0.0:9151
storage-userprovider:
users:
environment:
# tracing
OCIS_TRACING_ENABLED: "true"
@@ -171,7 +171,7 @@ services:
OCIS_TRACING_ENDPOINT: jaeger-agent:6831
# metrics
STORAGE_USERPROVIDER_DEBUG_ADDR: 0.0.0.0:9145
storage-groupprovider:
groups:
environment:
# tracing
OCIS_TRACING_ENABLED: "true"

View File

@@ -3,7 +3,7 @@ title: Group
date: 2022-03-02T00:00:00+00:00
weight: 20
geekdocRepo: https://github.com/owncloud/ocis
geekdocEditPath: edit/master/docs/extensions/group
geekdocEditPath: edit/master/docs/extensions/groups
geekdocFilePath: _index.md
geekdocCollapseSection: true
---

View File

@@ -3,13 +3,13 @@ title: Service Configuration
date: 2018-05-02T00:00:00+00:00
weight: 20
geekdocRepo: https://github.com/owncloud/ocis
geekdocEditPath: edit/master/docs/extensions/user
geekdocEditPath: edit/master/docs/extensions/groups
geekdocFilePath: configuration.md
geekdocCollapseSection: true
---
## Example YAML Config
{{< include file="extensions/_includes/user-config-example.yaml" language="yaml" >}}
{{< include file="extensions/_includes/groups-config-example.yaml" language="yaml" >}}
{{< include file="extensions/_includes/user_configvars.md" >}}
{{< include file="extensions/_includes/groups_configvars.md" >}}

View File

@@ -34,8 +34,8 @@ For now, the storage service uses these ports to preconfigure those services:
| 9159 | storage users debug |
| 9160 | groups |
| 9161 | groups debug |
| 9164 | storage app-provider |
| 9165 | storage app-provider debug |
| 9164 | storage app-provider |
| 9165 | storage app-provider debug |
| 9178 | storage public link |
| 9179 | storage public link data |
| 9180 | accounts grpc |

View File

@@ -3,7 +3,7 @@ title: User
date: 2022-03-02T00:00:00+00:00
weight: 20
geekdocRepo: https://github.com/owncloud/ocis
geekdocEditPath: edit/master/docs/extensions/user
geekdocEditPath: edit/master/docs/extensions/users
geekdocFilePath: _index.md
geekdocCollapseSection: true
---

View File

@@ -3,13 +3,13 @@ title: Service Configuration
date: 2018-05-02T00:00:00+00:00
weight: 20
geekdocRepo: https://github.com/owncloud/ocis
geekdocEditPath: edit/master/docs/extensions/group
geekdocEditPath: edit/master/docs/extensions/users
geekdocFilePath: configuration.md
geekdocCollapseSection: true
---
## Example YAML Config
{{< include file="extensions/_includes/group-config-example.yaml" language="yaml" >}}
{{< include file="extensions/_includes/users-config-example.yaml" language="yaml" >}}
{{< include file="extensions/_includes/group_configvars.md" >}}
{{< include file="extensions/_includes/users_configvars.md" >}}

View File

@@ -1,5 +1,5 @@
SHELL := bash
NAME := user
NAME := groups
include ../../.make/recursion.mk

View File

@@ -3,8 +3,8 @@ package main
import (
"os"
"github.com/owncloud/ocis/v2/extensions/user/pkg/command"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config/defaults"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/command"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config/defaults"
)
func main() {

View File

@@ -4,9 +4,9 @@ import (
"fmt"
"net/http"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config/parser"
"github.com/owncloud/ocis/v2/extensions/user/pkg/logging"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config/parser"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/logging"
"github.com/urfave/cli/v2"
)

View File

@@ -4,7 +4,7 @@ import (
"context"
"os"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/clihelper"
ociscfg "github.com/owncloud/ocis/v2/ocis-pkg/config"
"github.com/thejerf/suture/v4"
@@ -48,9 +48,9 @@ type SutureService struct {
// NewSutureService creates a new group.SutureService
func NewSutureService(cfg *ociscfg.Config) suture.Service {
cfg.Group.Commons = cfg.Commons
cfg.Groups.Commons = cfg.Commons
return SutureService{
cfg: cfg.Group,
cfg: cfg.Groups,
}
}

View File

@@ -9,12 +9,12 @@ import (
"github.com/cs3org/reva/v2/cmd/revad/runtime"
"github.com/gofrs/uuid"
"github.com/oklog/run"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config/parser"
"github.com/owncloud/ocis/v2/extensions/group/pkg/logging"
"github.com/owncloud/ocis/v2/extensions/group/pkg/revaconfig"
"github.com/owncloud/ocis/v2/extensions/group/pkg/server/debug"
"github.com/owncloud/ocis/v2/extensions/group/pkg/tracing"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config/parser"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/logging"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/revaconfig"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/server/debug"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/tracing"
"github.com/owncloud/ocis/v2/ocis-pkg/ldap"
"github.com/owncloud/ocis/v2/ocis-pkg/service/external"
"github.com/owncloud/ocis/v2/ocis-pkg/sync"

View File

@@ -8,7 +8,7 @@ import (
"github.com/owncloud/ocis/v2/ocis-pkg/version"
tw "github.com/olekukonko/tablewriter"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/urfave/cli/v2"
)

View File

@@ -3,7 +3,7 @@ package defaults
import (
"path/filepath"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/config/defaults"
)
@@ -28,7 +28,7 @@ func DefaultConfig() *config.Config {
Protocol: "tcp",
},
Service: config.Service{
Name: "group",
Name: "groups",
},
GroupMembersCacheExpiration: 5,
Reva: &config.Reva{

View File

@@ -3,8 +3,8 @@ package parser
import (
"errors"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config/defaults"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config/defaults"
ociscfg "github.com/owncloud/ocis/v2/ocis-pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/shared"

View File

@@ -1,7 +1,7 @@
package logging
import (
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/log"
)

View File

@@ -1,7 +1,7 @@
package revaconfig
import (
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
)
// GroupsConfigFromStruct will adapt an oCIS config struct into a reva mapstructure to start a reva service.

View File

@@ -3,7 +3,7 @@ package debug
import (
"context"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/log"
)

View File

@@ -4,7 +4,7 @@ import (
"io"
"net/http"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/service/debug"
"github.com/owncloud/ocis/v2/ocis-pkg/version"
)

View File

@@ -1,7 +1,7 @@
package tracing
import (
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/log"
"github.com/owncloud/ocis/v2/ocis-pkg/tracing"
"go.opentelemetry.io/otel/trace"

View File

@@ -1,5 +1,5 @@
SHELL := bash
NAME := group
NAME := users
include ../../.make/recursion.mk

View File

@@ -3,8 +3,8 @@ package main
import (
"os"
"github.com/owncloud/ocis/v2/extensions/group/pkg/command"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config/defaults"
"github.com/owncloud/ocis/v2/extensions/users/pkg/command"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config/defaults"
)
func main() {

View File

@@ -4,9 +4,9 @@ import (
"fmt"
"net/http"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config/parser"
"github.com/owncloud/ocis/v2/extensions/group/pkg/logging"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config/parser"
"github.com/owncloud/ocis/v2/extensions/users/pkg/logging"
"github.com/urfave/cli/v2"
)

View File

@@ -4,7 +4,7 @@ import (
"context"
"os"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/clihelper"
ociscfg "github.com/owncloud/ocis/v2/ocis-pkg/config"
"github.com/thejerf/suture/v4"
@@ -48,9 +48,9 @@ type SutureService struct {
// NewSutureService creates a new user.SutureService
func NewSutureService(cfg *ociscfg.Config) suture.Service {
cfg.User.Commons = cfg.Commons
cfg.Users.Commons = cfg.Commons
return SutureService{
cfg: cfg.User,
cfg: cfg.Users,
}
}

View File

@@ -9,12 +9,12 @@ import (
"github.com/cs3org/reva/v2/cmd/revad/runtime"
"github.com/gofrs/uuid"
"github.com/oklog/run"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config/parser"
"github.com/owncloud/ocis/v2/extensions/user/pkg/logging"
"github.com/owncloud/ocis/v2/extensions/user/pkg/revaconfig"
"github.com/owncloud/ocis/v2/extensions/user/pkg/server/debug"
"github.com/owncloud/ocis/v2/extensions/user/pkg/tracing"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config/parser"
"github.com/owncloud/ocis/v2/extensions/users/pkg/logging"
"github.com/owncloud/ocis/v2/extensions/users/pkg/revaconfig"
"github.com/owncloud/ocis/v2/extensions/users/pkg/server/debug"
"github.com/owncloud/ocis/v2/extensions/users/pkg/tracing"
"github.com/owncloud/ocis/v2/ocis-pkg/ldap"
"github.com/owncloud/ocis/v2/ocis-pkg/service/external"
"github.com/owncloud/ocis/v2/ocis-pkg/sync"

View File

@@ -8,7 +8,7 @@ import (
"github.com/owncloud/ocis/v2/ocis-pkg/version"
tw "github.com/olekukonko/tablewriter"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/urfave/cli/v2"
)

View File

@@ -18,7 +18,7 @@ type Config struct {
TokenManager *TokenManager `yaml:"token_manager"`
Reva *Reva `yaml:"reva"`
SkipUserGroupsInToken bool `yaml:"skip_user_groups_in_token" env:"USER_SKIP_USER_GROUPS_IN_TOKEN"`
SkipUserGroupsInToken bool `yaml:"skip_user_groups_in_token" env:"USERS_SKIP_USER_GROUPS_IN_TOKEN"`
UsersCacheExpiration int `yaml:"users_cache_expiration"`
Driver string `yaml:"driver"`

View File

@@ -3,7 +3,7 @@ package defaults
import (
"path/filepath"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/config/defaults"
)
@@ -28,7 +28,7 @@ func DefaultConfig() *config.Config {
Protocol: "tcp",
},
Service: config.Service{
Name: "user",
Name: "users",
},
UsersCacheExpiration: 5,
Reva: &config.Reva{

View File

@@ -3,8 +3,8 @@ package parser
import (
"errors"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config/defaults"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config/defaults"
ociscfg "github.com/owncloud/ocis/v2/ocis-pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/shared"

View File

@@ -1,7 +1,7 @@
package logging
import (
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/log"
)

View File

@@ -1,7 +1,7 @@
package revaconfig
import (
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
)
// UsersConfigFromStruct will adapt an oCIS config struct into a reva mapstructure to start a reva service.

View File

@@ -3,7 +3,7 @@ package debug
import (
"context"
"github.com/owncloud/ocis/v2/extensions/user/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/log"
)

View File

@@ -4,7 +4,7 @@ import (
"io"
"net/http"
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/service/debug"
"github.com/owncloud/ocis/v2/ocis-pkg/version"
)

View File

@@ -1,7 +1,7 @@
package tracing
import (
"github.com/owncloud/ocis/v2/extensions/group/pkg/config"
"github.com/owncloud/ocis/v2/extensions/users/pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/log"
"github.com/owncloud/ocis/v2/ocis-pkg/tracing"
"go.opentelemetry.io/otel/trace"

View File

@@ -15,7 +15,7 @@ import (
glauth "github.com/owncloud/ocis/v2/extensions/glauth/pkg/config"
graphExplorer "github.com/owncloud/ocis/v2/extensions/graph-explorer/pkg/config"
graph "github.com/owncloud/ocis/v2/extensions/graph/pkg/config"
group "github.com/owncloud/ocis/v2/extensions/group/pkg/config"
groups "github.com/owncloud/ocis/v2/extensions/groups/pkg/config"
idm "github.com/owncloud/ocis/v2/extensions/idm/pkg/config"
idp "github.com/owncloud/ocis/v2/extensions/idp/pkg/config"
nats "github.com/owncloud/ocis/v2/extensions/nats/pkg/config"
@@ -32,7 +32,7 @@ import (
storageusers "github.com/owncloud/ocis/v2/extensions/storage-users/pkg/config"
store "github.com/owncloud/ocis/v2/extensions/store/pkg/config"
thumbnails "github.com/owncloud/ocis/v2/extensions/thumbnails/pkg/config"
user "github.com/owncloud/ocis/v2/extensions/user/pkg/config"
users "github.com/owncloud/ocis/v2/extensions/users/pkg/config"
web "github.com/owncloud/ocis/v2/extensions/web/pkg/config"
webdav "github.com/owncloud/ocis/v2/extensions/webdav/pkg/config"
)
@@ -86,7 +86,7 @@ type Config struct {
GLAuth *glauth.Config `yaml:"glauth"`
Graph *graph.Config `yaml:"graph"`
GraphExplorer *graphExplorer.Config `yaml:"graph_explorer"`
Group *group.Config `yaml:"group"`
Groups *groups.Config `yaml:"groups"`
IDM *idm.Config `yaml:"idm"`
IDP *idp.Config `yaml:"idp"`
Nats *nats.Config `yaml:"nats"`
@@ -102,7 +102,7 @@ type Config struct {
StorageUsers *storageusers.Config `yaml:"storage_users"`
Store *store.Config `yaml:"store"`
Thumbnails *thumbnails.Config `yaml:"thumbnails"`
User *user.Config `yaml:"user"`
Users *users.Config `yaml:"users"`
Web *web.Config `yaml:"web"`
WebDAV *webdav.Config `yaml:"webdav"`
Search *search.Config `yaml:"search"`

View File

@@ -13,7 +13,7 @@ import (
glauth "github.com/owncloud/ocis/v2/extensions/glauth/pkg/config/defaults"
graphExplorer "github.com/owncloud/ocis/v2/extensions/graph-explorer/pkg/config/defaults"
graph "github.com/owncloud/ocis/v2/extensions/graph/pkg/config/defaults"
group "github.com/owncloud/ocis/v2/extensions/group/pkg/config/defaults"
groups "github.com/owncloud/ocis/v2/extensions/groups/pkg/config/defaults"
idm "github.com/owncloud/ocis/v2/extensions/idm/pkg/config/defaults"
idp "github.com/owncloud/ocis/v2/extensions/idp/pkg/config/defaults"
nats "github.com/owncloud/ocis/v2/extensions/nats/pkg/config/defaults"
@@ -30,7 +30,7 @@ import (
storageusers "github.com/owncloud/ocis/v2/extensions/storage-users/pkg/config/defaults"
store "github.com/owncloud/ocis/v2/extensions/store/pkg/config/defaults"
thumbnails "github.com/owncloud/ocis/v2/extensions/thumbnails/pkg/config/defaults"
user "github.com/owncloud/ocis/v2/extensions/user/pkg/config/defaults"
users "github.com/owncloud/ocis/v2/extensions/users/pkg/config/defaults"
web "github.com/owncloud/ocis/v2/extensions/web/pkg/config/defaults"
webdav "github.com/owncloud/ocis/v2/extensions/webdav/pkg/config/defaults"
)
@@ -54,7 +54,7 @@ func DefaultConfig() *Config {
GLAuth: glauth.DefaultConfig(),
Graph: graph.DefaultConfig(),
GraphExplorer: graphExplorer.DefaultConfig(),
Group: group.DefaultConfig(),
Groups: groups.DefaultConfig(),
IDM: idm.DefaultConfig(),
IDP: idp.DefaultConfig(),
Nats: nats.DefaultConfig(),
@@ -71,7 +71,7 @@ func DefaultConfig() *Config {
StorageUsers: storageusers.DefaultConfig(),
Store: store.DefaultConfig(),
Thumbnails: thumbnails.DefaultConfig(),
User: user.DefaultConfig(),
Users: users.DefaultConfig(),
Web: web.DefaultConfig(),
WebDAV: webdav.DefaultConfig(),
}

View File

@@ -3,31 +3,31 @@ package command
import (
"fmt"
"github.com/owncloud/ocis/v2/extensions/group/pkg/command"
"github.com/owncloud/ocis/v2/extensions/groups/pkg/command"
"github.com/owncloud/ocis/v2/ocis-pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/config/parser"
"github.com/owncloud/ocis/v2/ocis/pkg/register"
"github.com/urfave/cli/v2"
)
// GroupCommand is the entrypoint for the Group command.
func GroupCommand(cfg *config.Config) *cli.Command {
// GroupsCommand is the entrypoint for the groups command.
func GroupsCommand(cfg *config.Config) *cli.Command {
return &cli.Command{
Name: cfg.Group.Service.Name,
Usage: subcommandDescription(cfg.Group.Service.Name),
Name: cfg.Groups.Service.Name,
Usage: subcommandDescription(cfg.Groups.Service.Name),
Category: "extensions",
Before: func(c *cli.Context) error {
if err := parser.ParseConfig(cfg); err != nil {
fmt.Printf("%v", err)
return err
}
cfg.Group.Commons = cfg.Commons
cfg.Groups.Commons = cfg.Commons
return nil
},
Subcommands: command.GetCommands(cfg.Group),
Subcommands: command.GetCommands(cfg.Groups),
}
}
func init() {
register.AddCommand(GroupCommand)
register.AddCommand(GroupsCommand)
}

View File

@@ -3,31 +3,31 @@ package command
import (
"fmt"
"github.com/owncloud/ocis/v2/extensions/user/pkg/command"
"github.com/owncloud/ocis/v2/extensions/users/pkg/command"
"github.com/owncloud/ocis/v2/ocis-pkg/config"
"github.com/owncloud/ocis/v2/ocis-pkg/config/parser"
"github.com/owncloud/ocis/v2/ocis/pkg/register"
"github.com/urfave/cli/v2"
)
// UserCommand is the entrypoint for the User command.
func UserCommand(cfg *config.Config) *cli.Command {
// UsersCommand is the entrypoint for the users command.
func UsersCommand(cfg *config.Config) *cli.Command {
return &cli.Command{
Name: cfg.User.Service.Name,
Usage: subcommandDescription(cfg.User.Service.Name),
Name: cfg.Users.Service.Name,
Usage: subcommandDescription(cfg.Users.Service.Name),
Category: "extensions",
Before: func(c *cli.Context) error {
if err := parser.ParseConfig(cfg); err != nil {
fmt.Printf("%v", err)
return err
}
cfg.User.Commons = cfg.Commons
cfg.Users.Commons = cfg.Commons
return nil
},
Subcommands: command.GetCommands(cfg.User),
Subcommands: command.GetCommands(cfg.Users),
}
}
func init() {
register.AddCommand(UserCommand)
register.AddCommand(UsersCommand)
}

View File

@@ -70,7 +70,7 @@ type AuthbearerExtension struct {
AuthProviders AuthProviderSettings `yaml:"auth_providers"`
}
type UserAndGroupExtension struct {
type UsersAndGroupsExtension struct {
Drivers LdapBasedExtension
}
@@ -109,8 +109,8 @@ type OcisConfig struct {
Frontend FrontendExtension
AuthBasic AuthbasicExtension `yaml:"auth_basic"`
AuthBearer AuthbearerExtension `yaml:"auth_bearer"`
User UserAndGroupExtension
Group UserAndGroupExtension
Users UsersAndGroupsExtension
Groups UsersAndGroupsExtension
StorageSystem DataProviderInsecureSettings `yaml:"storage_system"`
StorageUsers DataProviderInsecureSettings `yaml:"storage_users"`
Ocdav InsecureExtension
@@ -232,14 +232,14 @@ func CreateConfig(insecure, forceOverwrite bool, configPath, adminPassword strin
},
},
},
Group: UserAndGroupExtension{
Groups: UsersAndGroupsExtension{
Drivers: LdapBasedExtension{
Ldap: LdapSettings{
Bind_password: revaServicePassword,
},
},
},
User: UserAndGroupExtension{
Users: UsersAndGroupsExtension{
Drivers: LdapBasedExtension{
Ldap: LdapSettings{
Bind_password: revaServicePassword,

View File

@@ -30,7 +30,7 @@ import (
glauth "github.com/owncloud/ocis/v2/extensions/glauth/pkg/command"
graphExplorer "github.com/owncloud/ocis/v2/extensions/graph-explorer/pkg/command"
graph "github.com/owncloud/ocis/v2/extensions/graph/pkg/command"
group "github.com/owncloud/ocis/v2/extensions/group/pkg/command"
groups "github.com/owncloud/ocis/v2/extensions/groups/pkg/command"
idm "github.com/owncloud/ocis/v2/extensions/idm/pkg/command"
idp "github.com/owncloud/ocis/v2/extensions/idp/pkg/command"
nats "github.com/owncloud/ocis/v2/extensions/nats/pkg/command"
@@ -47,7 +47,7 @@ import (
storageusers "github.com/owncloud/ocis/v2/extensions/storage-users/pkg/command"
store "github.com/owncloud/ocis/v2/extensions/store/pkg/command"
thumbnails "github.com/owncloud/ocis/v2/extensions/thumbnails/pkg/command"
user "github.com/owncloud/ocis/v2/extensions/user/pkg/command"
users "github.com/owncloud/ocis/v2/extensions/users/pkg/command"
web "github.com/owncloud/ocis/v2/extensions/web/pkg/command"
webdav "github.com/owncloud/ocis/v2/extensions/webdav/pkg/command"
ociscfg "github.com/owncloud/ocis/v2/ocis-pkg/config"
@@ -124,8 +124,8 @@ func NewService(options ...Option) (*Service, error) {
s.ServicesRegistry[opts.Config.OCDav.Service.Name] = ocdav.NewSutureService
s.ServicesRegistry[opts.Config.Gateway.Service.Name] = gateway.NewSutureService
s.ServicesRegistry[opts.Config.AppRegistry.Service.Name] = appRegistry.NewSutureService
s.ServicesRegistry[opts.Config.User.Service.Name] = user.NewSutureService
s.ServicesRegistry[opts.Config.Group.Service.Name] = group.NewSutureService
s.ServicesRegistry[opts.Config.Users.Service.Name] = users.NewSutureService
s.ServicesRegistry[opts.Config.Groups.Service.Name] = groups.NewSutureService
s.ServicesRegistry[opts.Config.AuthBasic.Service.Name] = authbasic.NewSutureService
s.ServicesRegistry[opts.Config.AuthBearer.Service.Name] = authbearer.NewSutureService
s.ServicesRegistry[opts.Config.AuthMachine.Service.Name] = authmachine.NewSutureService