Skip to content

Commit

Permalink
Add command for inspecting and manipulating node metadata (#5858)
Browse files Browse the repository at this point in the history
* Add command for inspecting and manipulating node metadata

* Add changelog

* Bump reva
  • Loading branch information
aduffeck committed Mar 17, 2023
1 parent 1efe4b5 commit 559915c
Show file tree
Hide file tree
Showing 2 changed files with 26 additions and 26 deletions.
4 changes: 2 additions & 2 deletions helpers/extended_vars.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -33,15 +33,15 @@ variables:
description: ""
do_ignore: true
- rawname: MICRO_LOG_LEVEL
path: ocis-pkg/log/log.go:35
path: ocis-pkg/log/log.go:31
foundincode: true
name: MICRO_LOG_LEVEL
type: ""
default_value: ""
description: ""
do_ignore: false
- rawname: MICRO_LOG_LEVEL
path: ocis-pkg/log/log.go:31
path: ocis-pkg/log/log.go:35
foundincode: true
name: MICRO_LOG_LEVEL
type: ""
Expand Down
48 changes: 24 additions & 24 deletions services/_includes/adoc/global_configvars.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ a| [subs=-attributes]
++false ++

a| [subs=-attributes]
The default role assignments the demo users should be setup.
Flag to enable or disable the creation of the demo users.

a| `LDAP_BIND_DN`

Expand All @@ -41,7 +41,7 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++uid=idp,ou=sysusers,o=libregraph-idm ++
++uid=libregraph,ou=sysusers,o=libregraph-idm ++

a| [subs=-attributes]
LDAP DN to use for simple bind authentication with the target LDAP server.
Expand Down Expand Up @@ -80,7 +80,7 @@ a| [subs=-attributes]
++~/.ocis/idm/ldap.crt ++

a| [subs=-attributes]
Path/File name for the root CA certificate (in PEM format) used to validate TLS server certificates of the LDAP service. If not definied, the root directory derives from $OCIS_BASE_DATA_PATH:/idp.
Path/File name for the root CA certificate (in PEM format) used to validate TLS server certificates of the LDAP service. If not definied, the root directory derives from $OCIS_BASE_DATA_PATH:/idm.

a| `LDAP_DISABLED_USERS_GROUP_DN`

Expand Down Expand Up @@ -109,10 +109,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++none ++
++attribute ++

a| [subs=-attributes]
An option to control the behavior for disabling users. Valid options are 'none', 'attribute' and 'group'. If set to 'group', disabling a user via API will add the user to the configured group for disabled users, if set to 'attribute' this will be done in the ldap user entry, if set to 'none' the disable request is not processed.
An option to control the behavior for disabling users. Supported options are 'none', 'attribute' and 'group'. If set to 'group', disabling a user via API will add the user to the configured group for disabled users, if set to 'attribute' this will be done in the ldap user entry, if set to 'none' the disable request is not processed. Default is 'attribute'.

a| `LDAP_GROUP_BASE_DN`

Expand Down Expand Up @@ -210,10 +210,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++ownclouduuid ++
++owncloudUUID ++

a| [subs=-attributes]
LDAP Attribute to use as the unique id for groups. This should be a stable globally unique id (e.g. a UUID).
LDAP Attribute to use as the unique id for groups. This should be a stable globally unique ID like a UUID.

a| `LDAP_GROUP_SCHEMA_ID_IS_OCTETSTRING`

Expand All @@ -229,7 +229,7 @@ a| [subs=-attributes]
++false ++

a| [subs=-attributes]
Set this to true if the defined 'id' attribute for groups is of the 'OCTETSTRING' syntax. This is e.g. required when using the 'objectGUID' attribute of Active Directory for the group IDs.
Set this to true if the defined 'id' attribute for groups is of the 'OCTETSTRING' syntax. This is e.g. required when using the 'objectGUID' attribute of Active Directory for the group ID's.

a| `LDAP_GROUP_SCHEMA_MAIL`

Expand Down Expand Up @@ -278,7 +278,7 @@ a| [subs=-attributes]
++sub ++

a| [subs=-attributes]
LDAP search scope to use when looking up groups. Supported values are 'base', 'one' and 'sub'.
LDAP search scope to use when looking up groups. Supported scopes are 'base', 'one' and 'sub'.

a| `LDAP_INSECURE`

Expand Down Expand Up @@ -314,7 +314,7 @@ a| [subs=-attributes]
++ldaps://localhost:9235 ++

a| [subs=-attributes]
Url of the LDAP service to use as IDP.
URI of the LDAP Server to connect to. Supported URI schemes are 'ldaps://' and 'ldap://'

a| `LDAP_USER_BASE_DN`

Expand Down Expand Up @@ -385,7 +385,7 @@ a| [subs=-attributes]
++inetOrgPerson ++

a| [subs=-attributes]
LDAP User ObjectClass like 'inetOrgPerson'.
The object class to use for users in the default user search filter ('inetOrgPerson').

a| `LDAP_USER_SCHEMA_DISPLAYNAME`

Expand Down Expand Up @@ -416,10 +416,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++uid ++
++owncloudUUID ++

a| [subs=-attributes]
LDAP User uuid attribute like 'uid'.
LDAP Attribute to use as the unique ID for users. This should be a stable globally unique ID like a UUID.

a| `LDAP_USER_SCHEMA_ID_IS_OCTETSTRING`

Expand All @@ -435,7 +435,7 @@ a| [subs=-attributes]
++false ++

a| [subs=-attributes]
Set this to true if the defined 'id' attribute for users is of the 'OCTETSTRING' syntax. This is e.g. required when using the 'objectGUID' attribute of Active Directory for the user IDs.
Set this to true if the defined 'id' attribute for users is of the 'OCTETSTRING' syntax. This is e.g. required when using the 'objectGUID' attribute of Active Directory for the user id's.

a| `LDAP_USER_SCHEMA_MAIL`

Expand All @@ -453,7 +453,7 @@ a| [subs=-attributes]
++mail ++

a| [subs=-attributes]
LDAP User email attribute like 'mail'.
LDAP Attribute to use for the email address of users.

a| `LDAP_USER_SCHEMA_USERNAME`

Expand All @@ -468,10 +468,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++displayName ++
++uid ++

a| [subs=-attributes]
LDAP User name attribute like 'displayName'.
LDAP Attribute to use for username of users.

a| `LDAP_USER_SCOPE`

Expand Down Expand Up @@ -671,7 +671,7 @@ a| [subs=-attributes]
++false ++

a| [subs=-attributes]
Enable TLS for the connection to the events broker. The events broker is the ocis service which receives and delivers events between the services.
Enable TLS for the connection to the events broker. The events broker is the ocis service which receives and delivers events between the services..

a| `OCIS_GRPC_CLIENT_TLS_CACERT`

Expand Down Expand Up @@ -832,7 +832,7 @@ a| [subs=-attributes]
++false ++

a| [subs=-attributes]
Whether the server should skip the client certificate verification during the TLS handshake.
Whether to verify the server TLS certificates.

a| `OCIS_JWT_SECRET`

Expand Down Expand Up @@ -1077,7 +1077,7 @@ a| [subs=-attributes]
++ ++

a| [subs=-attributes]
Machine auth API key used to validate internal requests necessary for the access to resources from other services.
Machine auth API key used to validate internal requests necessary to access resources from other services.

a| `OCIS_OIDC_ISSUER`

Expand All @@ -1098,7 +1098,7 @@ a| [subs=-attributes]
++https://localhost:9200 ++

a| [subs=-attributes]
The OIDC issuer URL to use.
URL of the OIDC issuer. It defaults to URL of the builtin IDP.

a| `OCIS_SHARING_PUBLIC_WRITEABLE_SHARE_MUST_HAVE_PASSWORD`

Expand Down Expand Up @@ -1372,10 +1372,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++https://localhost:9200 ++
++https://127.0.0.1:9200 ++

a| [subs=-attributes]
The OIDC issuer URL to use.
URL, where oCIS is reachable for users.

a| `REVA_GATEWAY`

Expand Down Expand Up @@ -1427,7 +1427,7 @@ a| [subs=-attributes]
++ ++

a| [subs=-attributes]
Transfer secret for signing file up- and download requests.
The storage transfer secret.

a| `STORAGE_USERS_OCIS_ASYNC_UPLOADS`

Expand Down

0 comments on commit 559915c

Please sign in to comment.