From 7f627d505a3d9c09278a3ab9c413d74774c85ce2 Mon Sep 17 00:00:00 2001 From: yaleman Date: Wed, 22 Jun 2022 12:43:49 +0000 Subject: [PATCH] deploy: 4b1989ee2234b098756b9de9c36387e14e4e7a51 --- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../kanidm_client/enum.ClientError.html | 6 +-- .../kanidm_client/struct.KanidmClient.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../kanidm_client/enum.ClientError.html | 6 +-- .../kanidm_client/struct.KanidmClient.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../kanidm_client/enum.ClientError.html | 6 +-- .../kanidm_client/struct.KanidmClient.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../kanidm_client/enum.ClientError.html | 6 +-- .../kanidm_client/struct.KanidmClient.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../kanidm_client/enum.ClientError.html | 6 +-- .../kanidm_client/struct.KanidmClient.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../kanidm_client/enum.ClientError.html | 6 +-- .../kanidm_client/struct.KanidmClient.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../kanidm_client/enum.ClientError.html | 6 +-- .../kanidm_client/struct.KanidmClient.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- .../rustdoc/kanidm_cli/enum.GroupOpt.html | 2 +- .../rustdoc/kanidm_cli/group/index.html | 2 +- .../rustdoc/src/kanidm_cli/group.rs.html | 10 +++- .../kanidmd_web_ui/credential/delete.rs.html | 10 +--- .../kanidmd_web_ui/credential/pwmodal.rs.html | 2 +- .../credential/totpmodal.rs.html | 14 ++--- .../rustdoc/src/kanidmd_web_ui/login.rs.html | 10 ---- .../src/kanidmd_web_ui/views/mod.rs.html | 2 +- .../src/kanidmd_web_ui/views/security.rs.html | 2 +- .../rustdoc/src/score/https/mod.rs.html | 52 +++++++++++-------- .../rustdoc/src/score/https/oauth2.rs.html | 16 +++++- 223 files changed, 1320 insertions(+), 1054 deletions(-) diff --git a/docs/master/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/master/rustdoc/kanidm_cli/enum.GroupOpt.html index 7b420910a..48b49fb0a 100644 --- a/docs/master/rustdoc/kanidm_cli/enum.GroupOpt.html +++ b/docs/master/rustdoc/kanidm_cli/enum.GroupOpt.html @@ -17,7 +17,7 @@ Posix { commands: GroupPosix, }, -}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/master/rustdoc/kanidm_cli/group/index.html b/docs/master/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/master/rustdoc/kanidm_cli/group/index.html +++ b/docs/master/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/master/rustdoc/src/kanidm_cli/group.rs.html b/docs/master/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/master/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/master/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/master/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/master/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/master/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/master/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/master/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/master/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/master/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/master/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/master/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/master/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/master/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/master/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/master/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/master/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/master/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/master/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/master/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/master/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/master/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/master/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/master/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/master/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/master/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/master/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/master/rustdoc/src/score/https/mod.rs.html b/docs/master/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/master/rustdoc/src/score/https/mod.rs.html
+++ b/docs/master/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/master/rustdoc/src/score/https/oauth2.rs.html b/docs/master/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/master/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/master/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/stable/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/stable/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/stable/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/stable/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/stable/rustdoc/kanidm_cli/group/index.html b/docs/stable/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/stable/rustdoc/kanidm_cli/group/index.html +++ b/docs/stable/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/stable/rustdoc/kanidm_client/enum.ClientError.html b/docs/stable/rustdoc/kanidm_client/enum.ClientError.html index 179baad7c..029e9ebea 100644 --- a/docs/stable/rustdoc/kanidm_client/enum.ClientError.html +++ b/docs/stable/rustdoc/kanidm_client/enum.ClientError.html @@ -6,16 +6,16 @@

ClientError

pub enum ClientError {
     Unauthorized,
-    Http(StatusCodeOption<OperationError>, String),
+    Http(StatusCodeOption<OperationError>, String),
     Transport(Error),
     AuthenticationFailed,
     EmptyResponse,
-    TotpVerifyFailed(UuidTotpSecret),
+    TotpVerifyFailed(Uuid, TotpSecret),
     TotpInvalidSha1(Uuid),
     JsonDecode(ErrorString),
     JsonEncode(SerdeJsonError),
     SystemError,
-}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(UuidTotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(Uuid, TotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/stable/rustdoc/kanidm_client/struct.KanidmClient.html b/docs/stable/rustdoc/kanidm_client/struct.KanidmClient.html index 5c762bf58..6260c7ef1 100644 --- a/docs/stable/rustdoc/kanidm_client/struct.KanidmClient.html +++ b/docs/stable/rustdoc/kanidm_client/struct.KanidmClient.html @@ -4,7 +4,7 @@
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

+

Struct kanidm_client::KanidmClient

source · []
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/stable/rustdoc/src/kanidm_cli/group.rs.html b/docs/stable/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/stable/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/stable/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/stable/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/stable/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/stable/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/stable/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/stable/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/stable/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/stable/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/stable/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/stable/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/stable/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/stable/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/stable/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/stable/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/stable/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/stable/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/stable/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/stable/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/stable/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/stable/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/stable/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/stable/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/stable/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/stable/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/stable/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/stable/rustdoc/src/score/https/mod.rs.html b/docs/stable/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/stable/rustdoc/src/score/https/mod.rs.html
+++ b/docs/stable/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/stable/rustdoc/src/score/https/oauth2.rs.html b/docs/stable/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/stable/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/stable/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0-rc10/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0-rc10/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0-rc10/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0-rc10/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0-rc10/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0-rc10/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0-rc10/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0-rc10/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0-rc10/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0-rc10/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0-rc10/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0-rc10/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0-rc10/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0-rc10/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0-rc10/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0-rc10/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0-rc10/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0-rc10/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0-rc10/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0-rc10/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0-rc10/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0rc1/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0rc1/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0rc1/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0rc1/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0rc1/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0rc1/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0rc1/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0rc1/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0rc1/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0rc1/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0rc1/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0rc1/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0rc1/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc1/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0rc1/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0rc1/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0rc1/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0rc1/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0rc1/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0rc1/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0rc1/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0rc10/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0rc10/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0rc10/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0rc10/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0rc10/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0rc10/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0rc10/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0rc10/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0rc10/rustdoc/kanidm_client/enum.ClientError.html b/docs/v1.0.0rc10/rustdoc/kanidm_client/enum.ClientError.html index 179baad7c..029e9ebea 100644 --- a/docs/v1.0.0rc10/rustdoc/kanidm_client/enum.ClientError.html +++ b/docs/v1.0.0rc10/rustdoc/kanidm_client/enum.ClientError.html @@ -6,16 +6,16 @@

ClientError

pub enum ClientError {
     Unauthorized,
-    Http(StatusCodeOption<OperationError>, String),
+    Http(StatusCodeOption<OperationError>, String),
     Transport(Error),
     AuthenticationFailed,
     EmptyResponse,
-    TotpVerifyFailed(UuidTotpSecret),
+    TotpVerifyFailed(Uuid, TotpSecret),
     TotpInvalidSha1(Uuid),
     JsonDecode(ErrorString),
     JsonEncode(SerdeJsonError),
     SystemError,
-}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(UuidTotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(Uuid, TotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.0.0rc10/rustdoc/kanidm_client/struct.KanidmClient.html b/docs/v1.0.0rc10/rustdoc/kanidm_client/struct.KanidmClient.html index 5c762bf58..6260c7ef1 100644 --- a/docs/v1.0.0rc10/rustdoc/kanidm_client/struct.KanidmClient.html +++ b/docs/v1.0.0rc10/rustdoc/kanidm_client/struct.KanidmClient.html @@ -4,7 +4,7 @@
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

+

Struct kanidm_client::KanidmClient

source · []
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.0.0rc10/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0rc10/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0rc10/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0rc10/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0rc10/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc10/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0rc10/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0rc10/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0rc10/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0rc10/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0rc10/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0rc10/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0rc10/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0rc11/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0rc11/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0rc11/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0rc11/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0rc11/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0rc11/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0rc11/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0rc11/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0rc11/rustdoc/kanidm_client/enum.ClientError.html b/docs/v1.0.0rc11/rustdoc/kanidm_client/enum.ClientError.html index 179baad7c..029e9ebea 100644 --- a/docs/v1.0.0rc11/rustdoc/kanidm_client/enum.ClientError.html +++ b/docs/v1.0.0rc11/rustdoc/kanidm_client/enum.ClientError.html @@ -6,16 +6,16 @@

ClientError

pub enum ClientError {
     Unauthorized,
-    Http(StatusCodeOption<OperationError>, String),
+    Http(StatusCodeOption<OperationError>, String),
     Transport(Error),
     AuthenticationFailed,
     EmptyResponse,
-    TotpVerifyFailed(UuidTotpSecret),
+    TotpVerifyFailed(Uuid, TotpSecret),
     TotpInvalidSha1(Uuid),
     JsonDecode(ErrorString),
     JsonEncode(SerdeJsonError),
     SystemError,
-}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(UuidTotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(Uuid, TotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.0.0rc11/rustdoc/kanidm_client/struct.KanidmClient.html b/docs/v1.0.0rc11/rustdoc/kanidm_client/struct.KanidmClient.html index 5c762bf58..6260c7ef1 100644 --- a/docs/v1.0.0rc11/rustdoc/kanidm_client/struct.KanidmClient.html +++ b/docs/v1.0.0rc11/rustdoc/kanidm_client/struct.KanidmClient.html @@ -4,7 +4,7 @@
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

+

Struct kanidm_client::KanidmClient

source · []
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.0.0rc11/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0rc11/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0rc11/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0rc11/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0rc11/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc11/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0rc11/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0rc11/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0rc11/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0rc11/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0rc11/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0rc11/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0rc11/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0rc2/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0rc2/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0rc2/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0rc2/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0rc2/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0rc2/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0rc2/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0rc2/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0rc2/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0rc2/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0rc2/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0rc2/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0rc2/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc2/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0rc2/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0rc2/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0rc2/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0rc2/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0rc2/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0rc2/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0rc2/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0rc3/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0rc3/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0rc3/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0rc3/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0rc3/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0rc3/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0rc3/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0rc3/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0rc3/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0rc3/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0rc3/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0rc3/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0rc3/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc3/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0rc3/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0rc3/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0rc3/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0rc3/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0rc3/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0rc3/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0rc3/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0rc7/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0rc7/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0rc7/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0rc7/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0rc7/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0rc7/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0rc7/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0rc7/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0rc7/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0rc7/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0rc7/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0rc7/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0rc7/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc7/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0rc7/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0rc7/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0rc7/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0rc7/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0rc7/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0rc7/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0rc7/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0rc8/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0rc8/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0rc8/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0rc8/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0rc8/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0rc8/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0rc8/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0rc8/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0rc8/rustdoc/kanidm_client/enum.ClientError.html b/docs/v1.0.0rc8/rustdoc/kanidm_client/enum.ClientError.html index 029e9ebea..179baad7c 100644 --- a/docs/v1.0.0rc8/rustdoc/kanidm_client/enum.ClientError.html +++ b/docs/v1.0.0rc8/rustdoc/kanidm_client/enum.ClientError.html @@ -6,16 +6,16 @@

ClientError

pub enum ClientError {
     Unauthorized,
-    Http(StatusCodeOption<OperationError>, String),
+    Http(StatusCodeOption<OperationError>, String),
     Transport(Error),
     AuthenticationFailed,
     EmptyResponse,
-    TotpVerifyFailed(Uuid, TotpSecret),
+    TotpVerifyFailed(UuidTotpSecret),
     TotpInvalidSha1(Uuid),
     JsonDecode(ErrorString),
     JsonEncode(SerdeJsonError),
     SystemError,
-}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(Uuid, TotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(UuidTotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.0.0rc8/rustdoc/kanidm_client/struct.KanidmClient.html b/docs/v1.0.0rc8/rustdoc/kanidm_client/struct.KanidmClient.html index 6260c7ef1..5c762bf58 100644 --- a/docs/v1.0.0rc8/rustdoc/kanidm_client/struct.KanidmClient.html +++ b/docs/v1.0.0rc8/rustdoc/kanidm_client/struct.KanidmClient.html @@ -4,7 +4,7 @@
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

+

Struct kanidm_client::KanidmClient

source · []
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.0.0rc8/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0rc8/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0rc8/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0rc8/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0rc8/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc8/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0rc8/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0rc8/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0rc8/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0rc8/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0rc8/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0rc8/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0rc8/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.0.0rc9/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.0.0rc9/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.0.0rc9/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.0.0rc9/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.0.0rc9/rustdoc/kanidm_cli/group/index.html b/docs/v1.0.0rc9/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.0.0rc9/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.0.0rc9/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.0.0rc9/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.0.0rc9/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.0.0rc9/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.0.0rc9/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.0.0rc9/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.0.0rc9/rustdoc/src/score/https/mod.rs.html b/docs/v1.0.0rc9/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.0.0rc9/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.0.0rc9/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.0.0rc9/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.0.0rc9/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.0.0rc9/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.0.0rc9/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.1.0-alpha.2/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.1.0-alpha.2/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.1.0-alpha.2/rustdoc/kanidm_cli/group/index.html b/docs/v1.1.0-alpha.2/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.1.0-alpha.2/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.1.0-alpha.2/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.1.0-alpha.2/rustdoc/kanidm_client/enum.ClientError.html b/docs/v1.1.0-alpha.2/rustdoc/kanidm_client/enum.ClientError.html index 029e9ebea..179baad7c 100644 --- a/docs/v1.1.0-alpha.2/rustdoc/kanidm_client/enum.ClientError.html +++ b/docs/v1.1.0-alpha.2/rustdoc/kanidm_client/enum.ClientError.html @@ -6,16 +6,16 @@

ClientError

pub enum ClientError {
     Unauthorized,
-    Http(StatusCodeOption<OperationError>, String),
+    Http(StatusCodeOption<OperationError>, String),
     Transport(Error),
     AuthenticationFailed,
     EmptyResponse,
-    TotpVerifyFailed(Uuid, TotpSecret),
+    TotpVerifyFailed(UuidTotpSecret),
     TotpInvalidSha1(Uuid),
     JsonDecode(ErrorString),
     JsonEncode(SerdeJsonError),
     SystemError,
-}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(Uuid, TotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(UuidTotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.1.0-alpha.2/rustdoc/kanidm_client/struct.KanidmClient.html b/docs/v1.1.0-alpha.2/rustdoc/kanidm_client/struct.KanidmClient.html index 6260c7ef1..5c762bf58 100644 --- a/docs/v1.1.0-alpha.2/rustdoc/kanidm_client/struct.KanidmClient.html +++ b/docs/v1.1.0-alpha.2/rustdoc/kanidm_client/struct.KanidmClient.html @@ -4,7 +4,7 @@
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

+

Struct kanidm_client::KanidmClient

source · []
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.1.0-alpha.2/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.1.0-alpha.2/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/score/https/mod.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.1.0-alpha.2/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.1.0-alpha.2/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.1.0-alpha.2/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.1.0-alpha.2/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.1.0-alpha.3/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.1.0-alpha.3/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.1.0-alpha.3/rustdoc/kanidm_cli/group/index.html b/docs/v1.1.0-alpha.3/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.1.0-alpha.3/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.1.0-alpha.3/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.1.0-alpha.3/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.1.0-alpha.3/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/score/https/mod.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.1.0-alpha.3/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.1.0-alpha.3/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.1.0-alpha.3/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.1.0-alpha.3/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.1.0-alpha.4/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.1.0-alpha.4/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.1.0-alpha.4/rustdoc/kanidm_cli/group/index.html b/docs/v1.1.0-alpha.4/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.1.0-alpha.4/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.1.0-alpha.4/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.1.0-alpha.4/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.1.0-alpha.4/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/score/https/mod.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.1.0-alpha.4/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.1.0-alpha.4/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.1.0-alpha.4/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.1.0-alpha.4/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.1.0-alpha.5/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.1.0-alpha.5/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.1.0-alpha.5/rustdoc/kanidm_cli/group/index.html b/docs/v1.1.0-alpha.5/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.1.0-alpha.5/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.1.0-alpha.5/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.1.0-alpha.5/rustdoc/kanidm_client/enum.ClientError.html b/docs/v1.1.0-alpha.5/rustdoc/kanidm_client/enum.ClientError.html index 029e9ebea..179baad7c 100644 --- a/docs/v1.1.0-alpha.5/rustdoc/kanidm_client/enum.ClientError.html +++ b/docs/v1.1.0-alpha.5/rustdoc/kanidm_client/enum.ClientError.html @@ -6,16 +6,16 @@

ClientError

pub enum ClientError {
     Unauthorized,
-    Http(StatusCodeOption<OperationError>, String),
+    Http(StatusCodeOption<OperationError>, String),
     Transport(Error),
     AuthenticationFailed,
     EmptyResponse,
-    TotpVerifyFailed(Uuid, TotpSecret),
+    TotpVerifyFailed(UuidTotpSecret),
     TotpInvalidSha1(Uuid),
     JsonDecode(ErrorString),
     JsonEncode(SerdeJsonError),
     SystemError,
-}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(Uuid, TotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(UuidTotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.1.0-alpha.5/rustdoc/kanidm_client/struct.KanidmClient.html b/docs/v1.1.0-alpha.5/rustdoc/kanidm_client/struct.KanidmClient.html index 6260c7ef1..5c762bf58 100644 --- a/docs/v1.1.0-alpha.5/rustdoc/kanidm_client/struct.KanidmClient.html +++ b/docs/v1.1.0-alpha.5/rustdoc/kanidm_client/struct.KanidmClient.html @@ -4,7 +4,7 @@
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

+

Struct kanidm_client::KanidmClient

source · []
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.1.0-alpha.5/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.1.0-alpha.5/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/score/https/mod.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.1.0-alpha.5/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.1.0-alpha.5/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.1.0-alpha.5/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.1.0-alpha.5/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.1.0-alpha.6/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.1.0-alpha.6/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.1.0-alpha.6/rustdoc/kanidm_cli/group/index.html b/docs/v1.1.0-alpha.6/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.1.0-alpha.6/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.1.0-alpha.6/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.1.0-alpha.6/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.1.0-alpha.6/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/score/https/mod.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.1.0-alpha.6/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.1.0-alpha.6/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.1.0-alpha.6/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.1.0-alpha.6/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.1.0-alpha.7/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.1.0-alpha.7/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.1.0-alpha.7/rustdoc/kanidm_cli/group/index.html b/docs/v1.1.0-alpha.7/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.1.0-alpha.7/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.1.0-alpha.7/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.1.0-alpha.7/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.1.0-alpha.7/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/score/https/mod.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.1.0-alpha.7/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.1.0-alpha.7/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.1.0-alpha.7/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.1.0-alpha.7/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.1.0-alpha.8/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.1.0-alpha.8/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.1.0-alpha.8/rustdoc/kanidm_cli/group/index.html b/docs/v1.1.0-alpha.8/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.1.0-alpha.8/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.1.0-alpha.8/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.1.0-alpha.8/rustdoc/kanidm_client/enum.ClientError.html b/docs/v1.1.0-alpha.8/rustdoc/kanidm_client/enum.ClientError.html index 179baad7c..029e9ebea 100644 --- a/docs/v1.1.0-alpha.8/rustdoc/kanidm_client/enum.ClientError.html +++ b/docs/v1.1.0-alpha.8/rustdoc/kanidm_client/enum.ClientError.html @@ -6,16 +6,16 @@

ClientError

pub enum ClientError {
     Unauthorized,
-    Http(StatusCodeOption<OperationError>, String),
+    Http(StatusCodeOption<OperationError>, String),
     Transport(Error),
     AuthenticationFailed,
     EmptyResponse,
-    TotpVerifyFailed(UuidTotpSecret),
+    TotpVerifyFailed(Uuid, TotpSecret),
     TotpInvalidSha1(Uuid),
     JsonDecode(ErrorString),
     JsonEncode(SerdeJsonError),
     SystemError,
-}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(UuidTotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

Unauthorized

Http(StatusCodeOption<OperationError>, String)

Transport(Error)

AuthenticationFailed

EmptyResponse

TotpVerifyFailed(Uuid, TotpSecret)

TotpInvalidSha1(Uuid)

JsonDecode(ErrorString)

JsonEncode(SerdeJsonError)

SystemError

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.1.0-alpha.8/rustdoc/kanidm_client/struct.KanidmClient.html b/docs/v1.1.0-alpha.8/rustdoc/kanidm_client/struct.KanidmClient.html index 5c762bf58..6260c7ef1 100644 --- a/docs/v1.1.0-alpha.8/rustdoc/kanidm_client/struct.KanidmClient.html +++ b/docs/v1.1.0-alpha.8/rustdoc/kanidm_client/struct.KanidmClient.html @@ -4,7 +4,7 @@
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

+

Struct kanidm_client::KanidmClient

source · []
pub struct KanidmClient { /* private fields */ }

Implementations

source

pub async fn idm_account_post_ssh_pubkey(
    &self,
    id: &str,
    tag: &str,
    pubkey: &str
) -> Result<(), ClientError>

Trait Implementations

Formats the value using the given formatter. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more

Immutably borrows from an owned value. Read more

Mutably borrows from an owned value. Read more

diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.1.0-alpha.8/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.1.0-alpha.8/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/score/https/mod.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.1.0-alpha.8/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.1.0-alpha.8/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.1.0-alpha.8/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.1.0-alpha.8/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {
diff --git a/docs/v1.1.0-alpha/rustdoc/kanidm_cli/enum.GroupOpt.html b/docs/v1.1.0-alpha/rustdoc/kanidm_cli/enum.GroupOpt.html
index 7b420910a..48b49fb0a 100644
--- a/docs/v1.1.0-alpha/rustdoc/kanidm_cli/enum.GroupOpt.html
+++ b/docs/v1.1.0-alpha/rustdoc/kanidm_cli/enum.GroupOpt.html
@@ -17,7 +17,7 @@
     Posix {
         commands: GroupPosix,
     },
-}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

+}

Variants

List(CommonOpt)

Get(Named)

Create(Named)

Delete(Named)

ListMembers(Named)

SetMembers(GroupNamedMembers)

PurgeMembers(Named)

AddMembers(GroupNamedMembers)

RemoveMembers(GroupNamedMembers)

Posix

Fields

commands: GroupPosix

Implementations

Trait Implementations

Formats the value using the given formatter. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Instantiate Self from [ArgMatches], parsing the arguments as needed. Read more

Assign values from ArgMatches to self.

diff --git a/docs/v1.1.0-alpha/rustdoc/kanidm_cli/group/index.html b/docs/v1.1.0-alpha/rustdoc/kanidm_cli/group/index.html index a221a2edb..a2a4c39a2 100644 --- a/docs/v1.1.0-alpha/rustdoc/kanidm_cli/group/index.html +++ b/docs/v1.1.0-alpha/rustdoc/kanidm_cli/group/index.html @@ -4,5 +4,5 @@
+

Module kanidm_cli::group

source · []
\ No newline at end of file diff --git a/docs/v1.1.0-alpha/rustdoc/src/kanidm_cli/group.rs.html b/docs/v1.1.0-alpha/rustdoc/src/kanidm_cli/group.rs.html index 9d8bab86b..0b86ebd44 100644 --- a/docs/v1.1.0-alpha/rustdoc/src/kanidm_cli/group.rs.html +++ b/docs/v1.1.0-alpha/rustdoc/src/kanidm_cli/group.rs.html @@ -137,6 +137,10 @@ 132 133 134 +135 +136 +137 +138
use crate::{GroupOpt, GroupPosix};
 
 impl GroupOpt {
@@ -217,7 +221,11 @@
                     .await
                 {
                     Err(e) => error!("Error -> {:?}", e),
-                    Ok(_) => println!("Successfully added {:?} to group \"{}\"", &new_members, gcopt.name.as_str()),
+                    Ok(_) => println!(
+                        "Successfully added {:?} to group \"{}\"",
+                        &new_members,
+                        gcopt.name.as_str()
+                    ),
                 }
             }
 
diff --git a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
index dba62effc..5adc184a7 100644
--- a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
+++ b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/delete.rs.html
@@ -197,9 +197,6 @@
 192
 193
 194
-195
-196
-197
 
use crate::error::*;
 use crate::utils;
 
@@ -207,17 +204,14 @@
 use super::reset::ModalProps;
 
 use gloo::console;
-use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURequest, CUSessionToken, CUStatus};
 
 enum State {
     Init,
diff --git a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
index 3dd3fbe99..c200cf3b0 100644
--- a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
+++ b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/pwmodal.rs.html
@@ -332,7 +332,7 @@
 
 use gloo::console;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
diff --git a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
index a6d56343c..6634d24cc 100644
--- a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
+++ b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/credential/totpmodal.rs.html
@@ -405,15 +405,13 @@
 use gloo::console;
 use web_sys::Node;
 use yew::prelude::*;
-use yew_agent::{Dispatched, Dispatcher};
+use yew_agent::Dispatched;
 
 use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
-use kanidm_proto::v1::{
-    CURegState, CURequest, CUSessionToken, CUStatus, OperationError, PasswordFeedback, TotpSecret,
-};
+use kanidm_proto::v1::{CURegState, CURequest, CUSessionToken, CUStatus, TotpSecret};
 use qrcode::{render::svg, QrCode};
 
 enum TotpState {
@@ -594,9 +592,14 @@
                 self.check = TotpCheck::Invalid;
                 self.state = TotpState::Init;
             }
+            // TODO: which status do we want to return?
             Msg::TotpClearInvalid => {
                 self.check = TotpCheck::Init;
             }
+            // this was originally lower in the code
+            // Msg::TotpClearInvalid => {
+            //     self.check = TotpCheck::Invalid;
+            // }
             Msg::TotpInvalidSha1 => {
                 self.check = TotpCheck::Sha1Accept;
                 self.state = TotpState::Init;
@@ -611,9 +614,6 @@
 
                 self.state = TotpState::Waiting;
             }
-            Msg::TotpClearInvalid => {
-                self.check = TotpCheck::Invalid;
-            }
             Msg::TotpSuccess => {
                 // Nothing to do but close and hide!
                 self.reset_and_hide();
diff --git a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/login.rs.html b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/login.rs.html
index e098d9c6a..c0aced8a4 100644
--- a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/login.rs.html
+++ b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/login.rs.html
@@ -797,11 +797,6 @@
 792
 793
 794
-795
-796
-797
-798
-799
 
// use anyhow::Error;
 use gloo::console;
 use wasm_bindgen::prelude::*;
@@ -821,11 +816,6 @@
 
 use webauthn_rs::proto::PublicKeyCredential;
 
-#[wasm_bindgen]
-extern "C" {
-    fn startConfetti();
-}
-
 pub struct LoginApp {
     inputvalue: String,
     session_id: String,
diff --git a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/views/mod.rs.html b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
index a39bcb31a..320e867a3 100644
--- a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
+++ b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/views/mod.rs.html
@@ -292,7 +292,7 @@
 
 use serde::{Deserialize, Serialize};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/views/security.rs.html b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/views/security.rs.html
index 8cb427fec..81cd5d368 100644
--- a/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/views/security.rs.html
+++ b/docs/v1.1.0-alpha/rustdoc/src/kanidmd_web_ui/views/security.rs.html
@@ -220,7 +220,7 @@
 
 use kanidm_proto::v1::{CUSessionToken, CUStatus, UserAuthToken};
 
-use wasm_bindgen::{JsCast, JsValue, UnwrapThrowExt};
+use wasm_bindgen::{JsCast, UnwrapThrowExt};
 use wasm_bindgen_futures::JsFuture;
 use web_sys::{Request, RequestInit, RequestMode, Response};
 
diff --git a/docs/v1.1.0-alpha/rustdoc/src/score/https/mod.rs.html b/docs/v1.1.0-alpha/rustdoc/src/score/https/mod.rs.html
index cbf2fe1a7..088d6dab9 100644
--- a/docs/v1.1.0-alpha/rustdoc/src/score/https/mod.rs.html
+++ b/docs/v1.1.0-alpha/rustdoc/src/score/https/mod.rs.html
@@ -766,6 +766,11 @@
 761
 762
 763
+764
+765
+766
+767
+768
 
mod oauth2;
 mod v1;
 
@@ -935,7 +940,6 @@
             <link rel="stylesheet" href="/pkg/external/bootstrap.min.css" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC"/>
             <link rel="stylesheet" href="/pkg/style.css"/>
             <script src="/pkg/external/bootstrap.bundle.min.js" integrity="sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM"></script>
-            <script src="/pkg/external/confetti.js"></script>
             <script type="module" type="text/javascript" src="/pkg/wasmloader.js" integrity="sha384-==WASMHASH==">
             </script>
 
@@ -1050,28 +1054,34 @@
         // update it with the hash
         response.set_body(body_str.replace("==WASMHASH==", self.integrity_wasmloader.as_str()));
         response.insert_header(
-                /* content-security-policy headers tell the browser what to trust
-                    https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
+            /* content-security-policy headers tell the browser what to trust
+                https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
 
-                    In this case we're only trusting the same server that the page is being loaded from, and adding
-                    a hash of wasmloader.js, which is the main script we should be loading, and should be really secure
-                    about that!
+                In this case we're only trusting the same server that the page is
+                loaded from, and adding a hash of wasmloader.js, which is the main script
+                we should be loading, and should be really secure about that!
 
-                */
-
-                // TODO: consider scraping the other js files that wasm-pack builds and including them too
-                "content-security-policy",
-                vec![
-                    "default-src 'self'",
-                    // we need unsafe-eval because of WASM things
-                    format!("script-src 'self' 'sha384-{}' 'unsafe-eval'", self.integrity_wasmloader.as_str() ).as_str(),
-                    "img-src 'self'",
-
-                    "object-src 'self'",
-                    // not currently using workers so it can be blocked
-                    "worker-src 'none'",
-                ].join(";"),
-            );
+            */
+            // TODO: consider scraping the other js files that wasm-pack builds and including them too
+            "content-security-policy",
+            vec![
+                "default-src 'self'",
+                // we need unsafe-eval because of WASM things
+                format!(
+                    "script-src 'self' 'sha384-{}' 'unsafe-eval'",
+                    self.integrity_wasmloader.as_str()
+                )
+                .as_str(),
+                "form-action https: 'self'", // to allow for OAuth posts
+                // we are not currently using workers so it can be blocked
+                "worker-src 'none'",
+                // TODO: Content-Security-Policy-Report-Only https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
+                // "report-to 'none'", // unsupported by a lot of things still, but mozilla's saying report-uri is deprecated?
+                "report-uri 'none'",
+                "base-uri 'self'",
+            ]
+            .join(";"),
+        );
 
         Ok(response)
     }
diff --git a/docs/v1.1.0-alpha/rustdoc/src/score/https/oauth2.rs.html b/docs/v1.1.0-alpha/rustdoc/src/score/https/oauth2.rs.html
index 779bfb928..072d561c7 100644
--- a/docs/v1.1.0-alpha/rustdoc/src/score/https/oauth2.rs.html
+++ b/docs/v1.1.0-alpha/rustdoc/src/score/https/oauth2.rs.html
@@ -659,6 +659,12 @@
 654
 655
 656
+657
+658
+659
+660
+661
+662
 
use super::v1::{json_rest_event_get, json_rest_event_post};
 use super::{to_tide_response, AppState, RequestExtensions};
 use kanidm::idm::oauth2::{
@@ -922,7 +928,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             tide::Body::from_json(&AuthorisationResponse::Permitted).map(|b| {
                 res.set_body(b);
                 res
@@ -1019,7 +1028,10 @@
                 .append_pair("code", &code);
             res.insert_header("Location", redirect_uri.as_str());
             // I think the client server needs this
-            res.insert_header("Access-Control-Allow-Origin", redirect_uri.origin().ascii_serialization());
+            res.insert_header(
+                "Access-Control-Allow-Origin",
+                redirect_uri.origin().ascii_serialization(),
+            );
             res
         }
         Err(_e) => {