kanidm/server/lib/src
Firstyear ed88b72080
Some checks are pending
Linting checks / clippy (push) Waiting to run
Linting checks / fmt (push) Waiting to run
Spell Check / codespell (push) Waiting to run
Container - Kanidm / Set image tag values (push) Waiting to run
Container - Kanidm / Build kanidm Docker image (push) Blocked by required conditions
Container - Kanidm / Push kanidm Docker image (push) Blocked by required conditions
Container - Kanidmd / Set image tag values (push) Waiting to run
Container - Kanidmd / Build kanidmd Docker image (push) Blocked by required conditions
Container - Kanidmd / Push kanidmd Docker image (push) Blocked by required conditions
Container - Radiusd / Set image tag values (push) Waiting to run
Container - Radiusd / Build radius Docker image (push) Blocked by required conditions
Container - Radiusd / Push radius Docker image (push) Blocked by required conditions
Javascript Linting / javascript_lint (push) Waiting to run
Javascript Linting / javascript_fmt (push) Waiting to run
GitHub Pages / pre_deploy (push) Waiting to run
GitHub Pages / fanout (${{ needs.pre_deploy.outputs.latest}}) (push) Blocked by required conditions
GitHub Pages / docs_master (push) Waiting to run
GitHub Pages / deploy (push) Blocked by required conditions
PyKanidm tests / tests (push) Waiting to run
Linux Build and Test / rust_build (push) Waiting to run
Linux Build and Test / rust_build_next (beta) (push) Waiting to run
Linux Build and Test / rust_build_next (nightly) (push) Waiting to run
Linux Build and Test / run_release (push) Waiting to run
Windows Build and Test / windows_build_kanidm (push) Waiting to run
Exempt idm_admin and admin from denied names. (#3429)
idm_admin and admin should be exempted from the denied names process,
as these values will already be denied due to attribute uniqueness.
Additionally improved the denied names check to only validate the
name during a change, not during a modifification. This way entries
that become denied can get themself out of the pickle.
2025-02-15 22:45:25 +00:00
..
be Feat: Allowing spn query with non-spn structured data in LDAP (#3400) 2025-02-08 06:37:28 +00:00
constants Exempt idm_admin and admin from denied names. (#3429) 2025-02-15 22:45:25 +00:00
credential fix(docstrings): minor lack of formatting breaking things (#3260) 2024-12-03 12:52:31 +10:00
idm 20240213 3413 domain displayname (#3425) 2025-02-14 10:52:49 +10:00
plugins Exempt idm_admin and admin from denied names. (#3429) 2025-02-15 22:45:25 +00:00
repl Cleanup of println and other outputs (#3266) 2024-12-04 15:13:14 +10:00
server Exempt idm_admin and admin from denied names. (#3429) 2025-02-15 22:45:25 +00:00
valueset chore: Remove empty scopemaps (#3170) 2025-02-09 11:19:52 +10:00
entry.rs Feat: Allowing spn query with non-spn structured data in LDAP (#3400) 2025-02-08 06:37:28 +00:00
event.rs 20250114 3325 SCIM access control (#3359) 2025-01-20 11:28:22 +00:00
filter.rs Feat: Allowing spn query with non-spn structured data in LDAP (#3400) 2025-02-08 06:37:28 +00:00
lib.rs Feat: Allowing spn query with non-spn structured data in LDAP (#3400) 2025-02-08 06:37:28 +00:00
macros.rs Cleanup of println and other outputs (#3266) 2024-12-04 15:13:14 +10:00
modify.rs Bump the all group with 22 updates (#3376) 2025-01-29 13:57:38 +10:00
schema.rs Clippy Lints (#3255) 2024-11-30 06:13:26 +00:00
status.rs Make /status less noisy (#2574) 2024-02-22 17:34:46 +10:00
testkit.rs Add domain version test framework (#2576) 2024-02-28 21:04:33 +00:00
time.rs 20231008 remove expect used (#2191) 2023-10-08 17:39:00 +10:00
utils.rs 20240927 SCIM put (#3151) 2024-11-30 06:56:17 +00:00
value.rs Correctly return that uuid2spn changed on domain rename (#3402) 2025-02-06 08:50:45 +10:00