diff --git a/Makefile b/Makefile index 4d4058f8e..49c08650e 100644 --- a/Makefile +++ b/Makefile @@ -108,10 +108,11 @@ install-tools: .PHONY: codespell codespell: codespell -c \ - -L crate,unexpect,Pres,pres,ACI,aci,te,ue \ - --skip='./target,./pykanidm/.venv,./pykanidm/.mypy_cache,./.mypy_cache' \ + -L 'crate,unexpect,Pres,pres,ACI,aci,te,ue,aNULL' \ + --skip='./target,./pykanidm/.venv,./pykanidm/.mypy_cache,./.mypy_cache,./pykanidm/poetry.lock' \ --skip='./book/book/*' \ --skip='./docs/*,./.git' \ + --skip='./rlm_python/mods-available/eap' \ --skip='./server/web_ui/src/external,./server/web_ui/pkg/external' \ --skip='./server/lib/src/constants/system_config.rs,./pykanidm/site,./server/lib/src/constants/*.json' diff --git a/book/src/developers/designs/account_policy.rst b/book/src/developers/designs/account_policy.rst index d7e4d3b19..a8d1b32e2 100644 --- a/book/src/developers/designs/account_policy.rst +++ b/book/src/developers/designs/account_policy.rst @@ -20,7 +20,7 @@ As the majority of the attacks listed can be prevented with TOTP, and all effect Webauthn, it's essential that policies can exist that allow an administrator to set requirements on accounts to what level of authentication they require to protect resources. -Credential Polcies are inherited from groups, as groups grant rights and claims to other resources. +Credential Policies are inherited from groups, as groups grant rights and claims to other resources. Since it is these resources and privileges we wish to protect, logically the credential policy becomes part of the group that should be protected. diff --git a/book/src/developers/designs/repl_future_considerations.rst b/book/src/developers/designs/repl_future_considerations.rst index 52788db35..c53c64187 100644 --- a/book/src/developers/designs/repl_future_considerations.rst +++ b/book/src/developers/designs/repl_future_considerations.rst @@ -303,7 +303,7 @@ to prevent this situation such as: In this case, one can imagine B would then supply data, and when A Received B's changes, it would again supply to R. However, this can be easily avoided by adhering to the following: -* A server can only supply to a read-only if all of the suppling server's RUV CSN MAX are contained +* A server can only supply to a read-only if all of the source server's RUV CSN MAX are contained within the destination RUV CSN MAX. By following this, B would determine that as it does *not* have (3, A) (which is greater than the local @@ -380,7 +380,7 @@ R: As R is a read-only it has no concept of the changelog, so it sets MIN to MAX. -Now, we then poll the RUV again. Protocol wise RUV polling should be separate to suppling of data! +Now, we then poll the RUV again. Protocol wise RUV polling should be separate to transfer of data! :: diff --git a/server/core/src/https/manifest.rs b/server/core/src/https/manifest.rs index 6372982e7..bc3d8557a 100644 --- a/server/core/src/https/manifest.rs +++ b/server/core/src/https/manifest.rs @@ -94,7 +94,7 @@ enum DisplayMode { Browser, } -/// Generates a manifest.json file for progressive web app usag +/// Generates a manifest.json file for progressive web app usage pub async fn manifest(req: tide::Request) -> tide::Result { let mut res = tide::Response::new(200); let (eventid, _) = req.new_eventid(); diff --git a/server/web_ui/pkg/img/kani-waving.svg b/server/web_ui/pkg/img/kani-waving.svg index e69de29bb..d6ff475d5 100644 --- a/server/web_ui/pkg/img/kani-waving.svg +++ b/server/web_ui/pkg/img/kani-waving.svg @@ -0,0 +1,168 @@ + + + + + Kanidm Square Logo + + + + + + + + + + + + Kanidm Square Logo + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/server/web_ui/pkg/img/logo-square.svg b/server/web_ui/pkg/img/logo-square.svg index e69de29bb..dca55c5f2 100644 --- a/server/web_ui/pkg/img/logo-square.svg +++ b/server/web_ui/pkg/img/logo-square.svg @@ -0,0 +1,252 @@ + + + + + Kanidm Square Logo + + + + + + + + + + + + Kanidm Square Logo + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + PASSPORT + AUTHSTRALIA + KANIDM + + + + + diff --git a/server/web_ui/pkg/kanidmd_web_ui.js b/server/web_ui/pkg/kanidmd_web_ui.js index 51ef6c88b..8b366dec1 100644 --- a/server/web_ui/pkg/kanidmd_web_ui.js +++ b/server/web_ui/pkg/kanidmd_web_ui.js @@ -233,19 +233,19 @@ function addBorrowedObject(obj) { } function __wbg_adapter_48(arg0, arg1, arg2) { try { - wasm._dyn_core__ops__function__FnMut___A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1a2425c1ff443c06(arg0, arg1, addBorrowedObject(arg2)); + wasm._dyn_core__ops__function__FnMut___A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hf55006aea4c68504(arg0, arg1, addBorrowedObject(arg2)); } finally { heap[stack_pointer++] = undefined; } } function __wbg_adapter_51(arg0, arg1, arg2) { - wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h67535681ec7e0a05(arg0, arg1, addHeapObject(arg2)); + wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h952401ac26470b7a(arg0, arg1, addHeapObject(arg2)); } function __wbg_adapter_54(arg0, arg1, arg2) { try { - wasm._dyn_core__ops__function__FnMut___A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h5a26dea6ead0b9dc(arg0, arg1, addBorrowedObject(arg2)); + wasm._dyn_core__ops__function__FnMut___A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h789a13d164f258bd(arg0, arg1, addBorrowedObject(arg2)); } finally { heap[stack_pointer++] = undefined; } @@ -1148,16 +1148,16 @@ function getImports() { const ret = wasm.memory; return addHeapObject(ret); }; - imports.wbg.__wbindgen_closure_wrapper4729 = function(arg0, arg1, arg2) { - const ret = makeMutClosure(arg0, arg1, 1095, __wbg_adapter_48); + imports.wbg.__wbindgen_closure_wrapper4748 = function(arg0, arg1, arg2) { + const ret = makeMutClosure(arg0, arg1, 1092, __wbg_adapter_48); return addHeapObject(ret); }; - imports.wbg.__wbindgen_closure_wrapper5585 = function(arg0, arg1, arg2) { - const ret = makeMutClosure(arg0, arg1, 1426, __wbg_adapter_51); + imports.wbg.__wbindgen_closure_wrapper5602 = function(arg0, arg1, arg2) { + const ret = makeMutClosure(arg0, arg1, 1422, __wbg_adapter_51); return addHeapObject(ret); }; - imports.wbg.__wbindgen_closure_wrapper5663 = function(arg0, arg1, arg2) { - const ret = makeMutClosure(arg0, arg1, 1456, __wbg_adapter_54); + imports.wbg.__wbindgen_closure_wrapper5680 = function(arg0, arg1, arg2) { + const ret = makeMutClosure(arg0, arg1, 1452, __wbg_adapter_54); return addHeapObject(ret); }; diff --git a/server/web_ui/pkg/kanidmd_web_ui_bg.wasm b/server/web_ui/pkg/kanidmd_web_ui_bg.wasm index 3d9715192..57d33461c 100644 Binary files a/server/web_ui/pkg/kanidmd_web_ui_bg.wasm and b/server/web_ui/pkg/kanidmd_web_ui_bg.wasm differ diff --git a/server/web_ui/src/img/kani-waving.svg b/server/web_ui/src/img/kani-waving.svg index e69de29bb..d6ff475d5 100644 --- a/server/web_ui/src/img/kani-waving.svg +++ b/server/web_ui/src/img/kani-waving.svg @@ -0,0 +1,168 @@ + + + + + Kanidm Square Logo + + + + + + + + + + + + Kanidm Square Logo + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/server/web_ui/src/img/logo-square.svg b/server/web_ui/src/img/logo-square.svg index e69de29bb..dca55c5f2 100644 --- a/server/web_ui/src/img/logo-square.svg +++ b/server/web_ui/src/img/logo-square.svg @@ -0,0 +1,252 @@ + + + + + Kanidm Square Logo + + + + + + + + + + + + Kanidm Square Logo + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + PASSPORT + AUTHSTRALIA + KANIDM + + + + +