profile
viewpoint
Stephane de Labrusse stephdl France, Rodez https://geekeries.de-labrusse.fr/ I'm French and I do love free software...If my code can help you, I'm fine with that.

NethServer/nethserver-docker 3

Docker configuration for NethServer

NethServer/nethserver-fail2ban 3

a contribs of fail2ban for nethserver

NethServer/nethserver-virtualbox 1

A rpm to configure virtualbox and phpvirtualbox

NethServer/nethserver-diagtools 0

a module to diagnostics network issues

NethServer/rspamd-spec 0

Spec file to build rspamd from source

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 53aab537c56638efc4264967a847c967c093af16

ui. do not delegate logs

view details

Stephane de Labrusse

commit sha 6370fb4edabebaba46d73d3778f121e9b9665532

Migrate fragment to remove logs from delegation prop

view details

push time in 3 hours

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 36494b9fa7048907a1e78bcf563807b6833c2207

Migrate fragment to remove logs from delegation prop

view details

push time in 4 hours

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 43b7fa817bcdaea4b4f784896957789810a79f9d

ui. do not delegate logs

view details

push time in 5 hours

issue commentNethServer/dev

Group-based access restriction for Cockpit and SSH

QA

install from testing

nethserver-sssd nethserver-cockpit nethserver-cockpit-lib nethserver-openssh

you need to install nethserver-dc or nethserver-directory

  • forced shell if the prop $sssd{ShellOverrideStatus} doesn't exist or set to disabled then nothing is changed, but if the prop is set to enabled, then any user with an account can use cockpit or ssh, the shell is forced to /bin/bash. You have to change the prop manually and use the event nethserver-sssd-save

you have to demonstrate that a user even with the fake shel can login, the shell checkbox in the user panel is hidden

  • allow group to cockpit if the prop ShellOverrideStatus is set to enabled, then a list of group is made to allow them to cockpit (root and members of admins are always allowed). The principle is, if you have at least one delegation, then you are allowed to use cockpit (check the list /etc/nethserver/cockpit.allow)

you have to demonstrate that a member of a group is allowed to use cockpit, and another member not listed is refused.

  • allow group to ssh and restrict group to sftp if the prop ShellOverrideStatus is set to enabled, then a list of group is made, stored under $sshd{AllowGroups}, you can decide what group to allow to ssh AND sftp or restrict a group to SFTP ONLY. Root and members of admins will always accepted

You have to demonstrate that a group is allowed to use ssh&sftp or restricted to sftp, a group not listed must be rejected

stephdl

comment created time in 6 hours

delete branch stephdl/nethserver-openssh

delete branch : groupSecuring

delete time in 6 hours

push eventNethServer/nethserver-openssh

Stephane de Labrusse

commit sha 55c8f6acd4378a6dad1ac873f83205121b89cd15

Enable sftp with umask

view details

Stephane de Labrusse

commit sha f3dea8e1890ee23e4482022e757a1b84f6c49677

Default Property for sftp no more hidden

view details

Stephane de Labrusse

commit sha 82db545146aaa34e649e2c1fcbfa8dcfbe72415a

Allow groups to connect to SSH & SFTP

view details

Stephane de Labrusse

commit sha 98c982402fad2f6b33cfd1199a748a6fcb950f10

Force the groups to use only SFTP

view details

Stephane de Labrusse

commit sha 09dbeda509fa1a6ff8d576407abac48a4f27f184

template & service restart with nethserver-sssd-save

view details

Stephane de Labrusse

commit sha d96477fdf34ea950a0966bc897d36e9fb4742ca2

code review from giacomo

view details

Stephane de Labrusse

commit sha 46c01c84ee9e6727e73f4f80958034784d6b547d

sftp use default file permission

view details

Stephane de Labrusse

commit sha de39079c361d900be7a2685f0bb8fc9afed3ad8f

Readme added

view details

Stephane de Labrusse

commit sha f07d1e5155a669e78eedfdb6d694e48ce1b2cf02

Merge pull request #8 from stephdl/groupSecuring Restrict the usage of SSH service to group NethServer/dev#6029

view details

push time in 6 hours

PR merged NethServer/nethserver-openssh

Restrict the usage of SSH service to group

https://github.com/NethServer/dev/issues/6029

+144 -3

23 comments

7 changed files

stephdl

pr closed time in 6 hours

delete branch stephdl/nethserver-sssd

delete branch : GH6029

delete time in 6 hours

push eventNethServer/nethserver-sssd

Stephane de Labrusse

commit sha f2ea1c890a12c65964874e4afaf20c3a8621a0ab

Prop to force the bash shell (disabled by default)

view details

Stephane de Labrusse

commit sha 45810502c46a6a07febdac6e2a8f48554cceb28b

Readme updated for ShellOverrideStatus

view details

Stephane de Labrusse

commit sha 369c18c63708a3825bf4597ab4e58bfd4823592e

Update README.rst Co-Authored-By: Davide Principi <davide.principi@nethesis.it>

view details

Stephane de Labrusse

commit sha 3a6c3355c2370ea374a17d632e9e1b1c7b9ec9dd

Update README.rst Co-Authored-By: Davide Principi <davide.principi@nethesis.it>

view details

Stephane de Labrusse

commit sha c46d9ccfaaa1c33e51d167a4abd3dc3c861daafb

Update README.rst

view details

Stephane de Labrusse

commit sha 04d23178fe66f3445ba451e6789c61bf6ca1914b

Merge pull request #115 from stephdl/GH6029 Prop to force the bash shell (disabled by default) NethServer/dev#6029

view details

push time in 6 hours

PR merged NethServer/nethserver-sssd

Prop to force the bash shell (disabled by default)

https://github.com/NethServer/dev/issues/6029

+14 -0

12 comments

3 changed files

stephdl

pr closed time in 6 hours

delete branch stephdl/nethserver-cockpit

delete branch : GH6029

delete time in 6 hours

push eventNethServer/nethserver-cockpit

Stephane de Labrusse

commit sha a81cfd89abd5528404f4b15ebceaff614a4fa281

Cockpit group based PAM permissions

view details

Stephane de Labrusse

commit sha 1d66a6b039181f7cd50223bf5dbbec756340b4d1

List of groups allowed to cockpit throught PAM

view details

Stephane de Labrusse

commit sha 474383e9f65fcf3caabb00589341d7d7e24859a9

Expand PAM and user group list

view details

Stephane de Labrusse

commit sha 05ebb2e5256c5ab198c26aa109fbd1ccb40ded46

use default file permission

view details

Stephane de Labrusse

commit sha 4c4b1f7439a6fc971b785fe569421d4f4263b6c1

expand cockpit PAM with nethserver-sssd-save

view details

Stephane de Labrusse

commit sha 5f48d37aee3a71d472aeb793860dc25eca448543

Split PAM file to allow custom settings

view details

Stephane de Labrusse

commit sha 49afeaeabe370341a87e76d9a184e43d0575f5d9

Merge pull request #206 from stephdl/GH6029 Group based permission access to cockpit

view details

push time in 6 hours

PR merged NethServer/nethserver-cockpit

Group based permission access to cockpit

https://github.com/NethServer/dev/issues/6029

+59 -0

14 comments

5 changed files

stephdl

pr closed time in 6 hours

delete branch stephdl/nethserver-cockpit

delete branch : groupSSH2

delete time in 6 hours

push eventNethServer/nethserver-cockpit

Stephane de Labrusse

commit sha eaeab981d54880c0571cf92bc41ce7277a7da2a0

api. display available groups

view details

Stephane de Labrusse

commit sha 7f1bb353b5b19d6833700c66e7b58280655a9a29

ui. multiple select for AllowGroups

view details

Stephane de Labrusse

commit sha bd90e6fbb485de92e5f4d2a9b1c544406d9a3bfa

api . update AllowGroups

view details

Stephane de Labrusse

commit sha e2aa17a2e101e769c4dae2dc3f7899793797117a

api. return if the account provider is created

view details

Stephane de Labrusse

commit sha e084f02811794b14d8488fd313de3a92e29b3630

ui. check if the Provider is created

view details

Stephane de Labrusse

commit sha cbc8d4cb588cfc9edb1e012898bfa57d74c09e14

ui missing translation

view details

Stephane de Labrusse

commit sha 7bab062eeac032c689786a441023a96fbab6b449

css add color to the removal cross

view details

Stephane de Labrusse

commit sha bdd942ac6a7ac7505b2bbe7f86d29ce01d828ff0

code review from giacomo

view details

Stephane de Labrusse

commit sha 0ebd01d65fe74e183ebe97918942da8794dca805

AllowGroups documented to api

view details

Stephane de Labrusse

commit sha f4ea29935e6821206fabab138bd99ec152520f3a

Fix suggestions css

view details

Stephane de Labrusse

commit sha 83dc904f4a8468e2c26aa1198aebda9bb36bbcbb

Merge pull request #208 from stephdl/groupSSH2 Grant SSH and SFTP access to groups NethServer/dev#6029

view details

push time in 6 hours

PR merged NethServer/nethserver-cockpit

Reviewers
Grant SSH and SFTP access to groups

https://github.com/NethServer/dev/issues/6029

+273 -30

7 comments

9 changed files

stephdl

pr closed time in 6 hours

PR merged NethServer/nethserver-cockpit

Reviewers
Hide shell checkbox in case of forced shell

https://github.com/NethServer/dev/issues/6029

+5 -1

6 comments

2 changed files

stephdl

pr closed time in 6 hours

delete branch stephdl/nethserver-cockpit

delete branch : ForcedShell

delete time in 6 hours

push eventNethServer/nethserver-cockpit

Stephane de Labrusse

commit sha d7287314069f5b2b387d32b336a2ecbdac8e633d

Hide shell checkbox in case of forced shell

view details

Stephane de Labrusse

commit sha 327007c2aef60718f69b0086fd760f4d9ad10b4f

Merge pull request #209 from stephdl/ForcedShell Hide shell checkbox in case of forced shell NethServer/dev#6029

view details

push time in 6 hours

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha f4ea29935e6821206fabab138bd99ec152520f3a

Fix suggestions css

view details

push time in 6 hours

push eventstephdl/nethserver-openssh

Stephane de Labrusse

commit sha de39079c361d900be7a2685f0bb8fc9afed3ad8f

Readme added

view details

push time in a day

Pull request review commentNethServer/nethserver-cockpit

Grant SSH and SFTP access to groups

  use JSON; use esmith::db;+use NethServer::ApiTools;+ my $db = esmith::db->open("configuration"); my $port = $db->get_prop('sshd', 'TCPPort');+my $provider = $db->get_prop('sssd', 'Provider') || 'none'; my @connections; +sub listGroups {+  my $groups = `/usr/libexec/nethserver/list-groups -s`;+  my %groups =  %{ NethServer::ApiTools::safe_decode_json(($groups), {}) };+  delete ($groups{'domain admins'});+  return [ keys %groups];+} open(H, "ss -Hn state established '( dport = $port or sport = $port )'|");  while (<H>) {   ($netid,$recvq,$sendq,$local,$peer) = split;   push(@connections, {'local' => $local, 'peer' => $peer}); } close(H);- my %out = (     'status' => { 'connections' => \@connections },-    'configuration' => $db->prepare_json('sshd')+    'configuration' => $db->prepare_json('sshd'),+    'groups' => [@{listGroups()}],+    'ShellOverrideStatus' => ($db->get_prop('sssd','ShellOverrideStatus') +            || 'disabled') eq 'enabled' ? JSON::true : JSON::false,+    'Provider' => $provider );++my %allow = ();+foreach my $g (split(',',$out{configuration}{props}{AllowGroups})) {

documented to api

stephdl

comment created time in a day

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha bdd942ac6a7ac7505b2bbe7f86d29ce01d828ff0

code review from giacomo

view details

Stephane de Labrusse

commit sha 0ebd01d65fe74e183ebe97918942da8794dca805

AllowGroups documented to api

view details

push time in a day

Pull request review commentNethServer/nethserver-cockpit

Grant SSH and SFTP access to groups

 # along with NethServer.  If not, see COPYING. # -. /usr/libexec/nethserver/api/lib/helper_functions+use strict;+use esmith::ConfigDB;+use esmith::event;+use JSON;+use NethServer::ApiTools;+my $data = NethServer::ApiTools::readInput();+my $cdb = esmith::ConfigDB->open() || die("Could not open ConfigDB");+my $action = $data->{'action'}; -data=$(cat /dev/stdin)+foreach my $prop (qw(+    PasswordAuthentication+    PermitRootLogin+    TCPPort+    )) {+        $cdb->set_prop('sshd', $prop, $data->{props}{$prop});

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-cockpit

Grant SSH and SFTP access to groups

 # along with NethServer.  If not, see COPYING. # -. /usr/libexec/nethserver/api/lib/helper_functions+use strict;+use esmith::ConfigDB;+use esmith::event;+use JSON;+use NethServer::ApiTools;+my $data = NethServer::ApiTools::readInput();+my $cdb = esmith::ConfigDB->open() || die("Could not open ConfigDB");+my $action = $data->{'action'}; -data=$(cat /dev/stdin)+foreach my $prop (qw(+    PasswordAuthentication+    PermitRootLogin+    TCPPort+    )) {+        $cdb->set_prop('sshd', $prop, $data->{props}{$prop});+    } -function _get-{-    field=$1-    echo $data | jq -r ".props.$field"-}--# Read JSON from stdin and set the record-/sbin/e-smith/config setprop sshd PasswordAuthentication "$(_get PasswordAuthentication)" PermitRootLogin "$(_get PermitRootLogin)" TCPPort "$(_get TCPPort)"+my $AllowGroups = '';+foreach my $g (keys $data->{props}{AllowGroups} ) {+    if ($data->{props}{AllowGroups}{$g} eq 'ssh') {

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-cockpit

Grant SSH and SFTP access to groups

 # along with NethServer.  If not, see COPYING. # -. /usr/libexec/nethserver/api/lib/helper_functions+use strict;+use esmith::ConfigDB;+use esmith::event;+use JSON;+use NethServer::ApiTools;+my $data = NethServer::ApiTools::readInput();+my $cdb = esmith::ConfigDB->open() || die("Could not open ConfigDB");+my $action = $data->{'action'}; -data=$(cat /dev/stdin)+foreach my $prop (qw(+    PasswordAuthentication+    PermitRootLogin+    TCPPort+    )) {+        $cdb->set_prop('sshd', $prop, $data->{props}{$prop});+    } -function _get-{-    field=$1-    echo $data | jq -r ".props.$field"-}--# Read JSON from stdin and set the record-/sbin/e-smith/config setprop sshd PasswordAuthentication "$(_get PasswordAuthentication)" PermitRootLogin "$(_get PermitRootLogin)" TCPPort "$(_get TCPPort)"+my $AllowGroups = '';+foreach my $g (keys $data->{props}{AllowGroups} ) {+    if ($data->{props}{AllowGroups}{$g} eq 'ssh') {+        $AllowGroups .= "$g,";+    } elsif ($data->{props}{AllowGroups}{$g} eq 'sftp') {

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-cockpit

Grant SSH and SFTP access to groups

 # along with NethServer.  If not, see COPYING. # -. /usr/libexec/nethserver/api/lib/helper_functions+use strict;+use esmith::ConfigDB;+use esmith::event;+use JSON;+use NethServer::ApiTools;+my $data = NethServer::ApiTools::readInput();+my $cdb = esmith::ConfigDB->open() || die("Could not open ConfigDB");+my $action = $data->{'action'}; -data=$(cat /dev/stdin)+foreach my $prop (qw(+    PasswordAuthentication+    PermitRootLogin+    TCPPort+    )) {+        $cdb->set_prop('sshd', $prop, $data->{props}{$prop});+    } -function _get-{-    field=$1-    echo $data | jq -r ".props.$field"-}--# Read JSON from stdin and set the record-/sbin/e-smith/config setprop sshd PasswordAuthentication "$(_get PasswordAuthentication)" PermitRootLogin "$(_get PermitRootLogin)" TCPPort "$(_get TCPPort)"+my $AllowGroups = '';+foreach my $g (keys $data->{props}{AllowGroups} ) {

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-cockpit

Grant SSH and SFTP access to groups

  use JSON; use esmith::db;+use NethServer::ApiTools;+ my $db = esmith::db->open("configuration"); my $port = $db->get_prop('sshd', 'TCPPort');+my $provider = $db->get_prop('sssd', 'Provider') || 'none'; my @connections; +sub listGroups {+  my $groups = `/usr/libexec/nethserver/list-groups -s`;+  my %groups =  %{ NethServer::ApiTools::safe_decode_json(($groups), {}) };+  delete ($groups{'domain admins'});+  return [ keys %groups];+} open(H, "ss -Hn state established '( dport = $port or sport = $port )'|");  while (<H>) {   ($netid,$recvq,$sendq,$local,$peer) = split;   push(@connections, {'local' => $local, 'peer' => $peer}); } close(H);- my %out = (     'status' => { 'connections' => \@connections },-    'configuration' => $db->prepare_json('sshd')+    'configuration' => $db->prepare_json('sshd'),+    'groups' => [@{listGroups()}],+    'ShellOverrideStatus' => ($db->get_prop('sssd','ShellOverrideStatus') +            || 'disabled') eq 'enabled' ? JSON::true : JSON::false,+    'Provider' => $provider );++my %allow = ();+foreach my $g (split(',',$out{configuration}{props}{AllowGroups})) {+  my ($group,$sftp) = split (':',$g);+  if (!$group) {+    next;+  }+  if ($sftp eq 'sftp') {+    $allow{$group} = 'sftp';+  } else {+    $allow{$group} = 'ssh';+  }+}+$out{configuration}{props}{AllowGroups} = \%allow;

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-cockpit

Grant SSH and SFTP access to groups

  use JSON; use esmith::db;+use NethServer::ApiTools;+ my $db = esmith::db->open("configuration"); my $port = $db->get_prop('sshd', 'TCPPort');+my $provider = $db->get_prop('sssd', 'Provider') || 'none'; my @connections; +sub listGroups {+  my $groups = `/usr/libexec/nethserver/list-groups -s`;+  my %groups =  %{ NethServer::ApiTools::safe_decode_json(($groups), {}) };+  delete ($groups{'domain admins'});+  return [ keys %groups];+} open(H, "ss -Hn state established '( dport = $port or sport = $port )'|");  while (<H>) {   ($netid,$recvq,$sendq,$local,$peer) = split;   push(@connections, {'local' => $local, 'peer' => $peer}); } close(H);- my %out = (     'status' => { 'connections' => \@connections },-    'configuration' => $db->prepare_json('sshd')+    'configuration' => $db->prepare_json('sshd'),+    'groups' => [@{listGroups()}],+    'ShellOverrideStatus' => ($db->get_prop('sssd','ShellOverrideStatus') +            || 'disabled') eq 'enabled' ? JSON::true : JSON::false,+    'Provider' => $provider );++my %allow = ();+foreach my $g (split(',',$out{configuration}{props}{AllowGroups})) {

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

      my $SubsystemSftp = $sshd{"SubsystemSftp"} || "yes"; -    $OUT = ($SubsystemSftp eq "yes") ? -	"Subsystem      sftp    /usr/libexec/openssh/sftp-server" : -	"# The sftp Subsystem is disabled in the configuration database";+    if ($SubsystemSftp eq "yes") {+      $OUT .= "Subsystem sftp internal-sftp -u 0077\n";

ok

stephdl

comment created time in a day

push eventstephdl/nethserver-openssh

Stephane de Labrusse

commit sha d96477fdf34ea950a0966bc897d36e9fb4742ca2

code review from giacomo

view details

Stephane de Labrusse

commit sha 46c01c84ee9e6727e73f4f80958034784d6b547d

sftp use default file permission

view details

push time in a day

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

+{+    # restrict groups to sftp, ssh access is refused+    my $domain = $DomainName || die ('Cannot retrieve DomainName');

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

+{+    # Allow groups to sftp/ssh with different policies+    #+    # if $sssd{ShellOverrideStatus} is disabled we are in legacy (everybody is allowed with a shell access)+    # if $sssd{ShellOverrideStatus} is enabled we allow to root and members of domain admins group+    # if $sssd{ShellOverrideStatus} is enabled  with non empty $sshd{AllowGroups} +    #   we allow root, members of domain admins group and members of groups inside the AllowGroups prop+    #+    # members restricted to sftp (SftpRestrictedGroups) must be allowed to sshd also++    sub uniq {+        my %seen;+        return grep { !$seen{$_}++ } @_;+    }++    # ssh doesn't accept to login if we restrict with short group name+    # It seems to want the long group name group@domain.com+    my $domain = $DomainName || die ('Cannot retrieve DomainName');

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

+{+    # restrict groups to sftp, ssh access is refused+    my $domain = $DomainName || die ('Cannot retrieve DomainName');+    my @SftpRestricted = ();++    foreach ( split(',',$sshd{'AllowGroups'} || '')) {+        my ($group, $sftp) = split(':', $_);+        if(!$group || !$sftp) {+            next;+        }+        $group .= "\@$domain" if ($group !~ '@');+        push @SftpRestricted, $group if ($sftp eq 'sftp');+    }++    if (@SftpRestricted) {+        my $matchGroup = join (",", map { $_ } @SftpRestricted);

ok

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

+{+    # Allow groups to sftp/ssh with different policies+    #+    # if $sssd{ShellOverrideStatus} is disabled we are in legacy (everybody is allowed with a shell access)+    # if $sssd{ShellOverrideStatus} is enabled we allow to root and members of domain admins group+    # if $sssd{ShellOverrideStatus} is enabled  with non empty $sshd{AllowGroups} +    #   we allow root, members of domain admins group and members of groups inside the AllowGroups prop+    #+    # members restricted to sftp (SftpRestrictedGroups) must be allowed to sshd also++    sub uniq {+        my %seen;+        return grep { !$seen{$_}++ } @_;+    }++    # ssh doesn't accept to login if we restrict with short group name+    # It seems to want the long group name group@domain.com+    my $domain = $DomainName || die ('Cannot retrieve DomainName');+    my $PermitRootLogin = $sshd{'PermitRootLogin'} || "no";

if possible I would prefer to hide the root if not allowed, else I need to test it and check to be sure

stephdl

comment created time in a day

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

      my $SubsystemSftp = $sshd{"SubsystemSftp"} || "yes"; -    $OUT = ($SubsystemSftp eq "yes") ? -	"Subsystem      sftp    /usr/libexec/openssh/sftp-server" : -	"# The sftp Subsystem is disabled in the configuration database";+    if ($SubsystemSftp eq "yes") {+      $OUT .= "Subsystem sftp internal-sftp -u 0077\n";

@DavidePrincipi proposed a umask, but less restrictive...only user can read/modify files in their home

:-?

stephdl

comment created time in a day

pull request commentNethServer/nethserver-cockpit

Grant SSH and SFTP access to groups

Sorry @edospadoni I am a bit stuck on the scrollbar and suggestion, I tried to add

.suggestions-override {
  position: initial !important;
}

in different way, either inside SSH.vue or App.vue, but it still not work like I would like, when you have several groups, the suggestion widget make a scrollbar in the right. After the update of the rpm & nethserver-directory, create some random groups and do the CL below

config setprop sssd ShellOverrideStatus enabled
config setprop sshd sshd AllowGroups ''
stephdl

comment created time in 2 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 7bab062eeac032c689786a441023a96fbab6b449

css add color to the removal cross

view details

push time in 2 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha e2aa17a2e101e769c4dae2dc3f7899793797117a

api. return if the account provider is created

view details

Stephane de Labrusse

commit sha e084f02811794b14d8488fd313de3a92e29b3630

ui. check if the Provider is created

view details

Stephane de Labrusse

commit sha cbc8d4cb588cfc9edb1e012898bfa57d74c09e14

ui missing translation

view details

push time in 2 days

push eventstephdl/nethserver-openssh

Stephane de Labrusse

commit sha 82db545146aaa34e649e2c1fcbfa8dcfbe72415a

Allow groups to connect to SSH & SFTP

view details

Stephane de Labrusse

commit sha 98c982402fad2f6b33cfd1199a748a6fcb950f10

Force the groups to use only SFTP

view details

Stephane de Labrusse

commit sha 09dbeda509fa1a6ff8d576407abac48a4f27f184

template & service restart with nethserver-sssd-save

view details

push time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

++#+# Allow groups to use cockpit +#+root+{ $admins{'group'} || 'domain admins'}

done, thank you

stephdl

comment created time in 2 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 1d66a6b039181f7cd50223bf5dbbec756340b4d1

List of groups allowed to cockpit throught PAM

view details

Stephane de Labrusse

commit sha 474383e9f65fcf3caabb00589341d7d7e24859a9

Expand PAM and user group list

view details

Stephane de Labrusse

commit sha 05ebb2e5256c5ab198c26aa109fbd1ccb40ded46

use default file permission

view details

Stephane de Labrusse

commit sha 4c4b1f7439a6fc971b785fe569421d4f4263b6c1

expand cockpit PAM with nethserver-sssd-save

view details

Stephane de Labrusse

commit sha 5f48d37aee3a71d472aeb793860dc25eca448543

Split PAM file to allow custom settings

view details

push time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

++#+# Allow groups to use cockpit +#+root+{ $admins{'group'} || 'domain admins'}

yep in my code inside openssh

stephdl

comment created time in 2 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 54b56b49a561aa445d00441fe6db5ad6a04299bc

List of groups allowed to cockpit throught PAM

view details

Stephane de Labrusse

commit sha 667e1c91b175ddbca067db5decfa2df0baec0fe7

Expand PAM and user group list

view details

Stephane de Labrusse

commit sha e68c8671a42dc6f3e99f6d8f309bea244b297806

use default file permission

view details

Stephane de Labrusse

commit sha 3a86195db27c0c1d9034740d1dc1ae9f239ddc72

expand cockpit PAM with nethserver-sssd-save

view details

Stephane de Labrusse

commit sha 63d3cdce96473a998f6e964d737f2dda94114d42

Split PAM file to allow custom settings

view details

push time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

++#+# Allow groups to use cockpit +#+root+{ $admins{'group'} || 'domain admins'}

@davidep what about if the prop gets several group, in theory it is possible ?

Maybe we should split it ?

stephdl

comment created time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

++#+# Allow groups to use cockpit +#+root+domain admins

done

stephdl

comment created time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

 event_templates('nethserver-cockpit-update', qw(     /etc/nethserver/ldappasswd.conf     /etc/sudoers.d/30_nethserver_cockpit_roles     /etc/sudoers.d/55_nsapi_perms+    /etc/nethserver/cockpit.allow+    /etc/pam.d/cockpit+));++# expand cockpit PAM following `ShellOverrideStatus`+event_templates('nethserver-sssd-save', qw(+    /etc/pam.d/cockpit

done

stephdl

comment created time in 2 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 23a1de56bdfb5d092e257cbb3f3c34b2c1fd72de

List of groups allowed to cockpit throught PAM

view details

Stephane de Labrusse

commit sha 0e7f23e7a5e0a3c8b7e518de9ce4d5dcac8eccbd

Expand PAM and user group list

view details

Stephane de Labrusse

commit sha 311f910d02d16d84f4ee9bb0cc30cf38bdbbdfad

use default file permission

view details

Stephane de Labrusse

commit sha e2cc366a380046b6118b7711e2d83c42ef4f3e39

expand cockpit PAM with nethserver-sssd-save

view details

Stephane de Labrusse

commit sha 04be2f28c64a9426118dabd2e5b6dcdb74431509

Split PAM file to allow custom settings

view details

push time in 2 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 4eea95692c04ab4f1b6183c6dae7f262ae83cd82

Split PAM file to allow custom settings

view details

push time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

 event_templates('nethserver-cockpit-update', qw(     /etc/nethserver/ldappasswd.conf     /etc/sudoers.d/30_nethserver_cockpit_roles     /etc/sudoers.d/55_nsapi_perms+    /etc/nethserver/cockpit.allow+    /etc/pam.d/cockpit+));++# expand cockpit PAM following `ShellOverrideStatus`+event_templates('nethserver-sssd-save', qw(+    /etc/pam.d/cockpit+));++# delegate cockpit access via PAM+event_templates('group-modify', qw(+    /etc/nethserver/cockpit.allow

done we expand the list of group with delegation-save

stephdl

comment created time in 2 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 942767b2e77ba508f788b311b9edfb91f59ea234

Expand PAM and user group list

view details

Stephane de Labrusse

commit sha ad4a1803717b1b1bfa284a9b7e479e16112c65b5

use default file permission

view details

Stephane de Labrusse

commit sha a1d1ee045f9d7f47a0f800d5a65a72b1653c4ea6

expand cockpit PAM with nethserver-sssd-save

view details

push time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

 event_templates('nethserver-cockpit-update', qw(     /etc/nethserver/ldappasswd.conf     /etc/sudoers.d/30_nethserver_cockpit_roles     /etc/sudoers.d/55_nsapi_perms+    /etc/nethserver/cockpit.allow+    /etc/pam.d/cockpit+));++# expand cockpit PAM following `ShellOverrideStatus`+event_templates('nethserver-sssd-save', qw(+    /etc/pam.d/cockpit+));++# delegate cockpit access via PAM+event_templates('group-modify', qw(+    /etc/nethserver/cockpit.allow

an alternative is to use delegation-save. I will commit to use it

stephdl

comment created time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

 event_templates('nethserver-cockpit-update', qw(     /etc/nethserver/ldappasswd.conf     /etc/sudoers.d/30_nethserver_cockpit_roles     /etc/sudoers.d/55_nsapi_perms+    /etc/nethserver/cockpit.allow+    /etc/pam.d/cockpit+));++# expand cockpit PAM following `ShellOverrideStatus`+event_templates('nethserver-sssd-save', qw(+    /etc/pam.d/cockpit+));++# delegate cockpit access via PAM+event_templates('group-modify', qw(+    /etc/nethserver/cockpit.allow

you are right we miss the group delete, we have to maintain a list following the permission stored under ${cockpit.socket}{delegation}, so with group-{create,delete,modify} it entends to add or remove permission to login to cockpit

For a remote account provider, it is out of the scope of this issue, but our group panel should allow to add permission locally even if the group is remote

stephdl

comment created time in 2 days

Pull request review commentNethServer/nethserver-sssd

Prop to force the bash shell (disabled by default)

 event_actions('nethserver-sssd-save', qw( )); event_services('nethserver-sssd-save', qw(     sssd restart+    sshd restart

done

stephdl

comment created time in 2 days

Pull request review commentNethServer/nethserver-sssd

Prop to force the bash shell (disabled by default)

 event_templates('nethserver-sssd-save', qw(     /etc/samba/smb.conf     /etc/openldap/ldap.conf     /etc/backup-config.d/nethserver-sssd.include+    /etc/pam.d/cockpit+    /etc/ssh/sshd_config

done

stephdl

comment created time in 2 days

push eventstephdl/nethserver-sssd

Stephane de Labrusse

commit sha 369c18c63708a3825bf4597ab4e58bfd4823592e

Update README.rst Co-Authored-By: Davide Principi <davide.principi@nethesis.it>

view details

Stephane de Labrusse

commit sha 3a6c3355c2370ea374a17d632e9e1b1c7b9ec9dd

Update README.rst Co-Authored-By: Davide Principi <davide.principi@nethesis.it>

view details

Stephane de Labrusse

commit sha c46d9ccfaaa1c33e51d167a4abd3dc3c861daafb

Update README.rst

view details

push time in 2 days

push eventstephdl/nethserver-openssh

Stephane de Labrusse

commit sha 5a1c48e64cde00cdf5cb4366a15fdba2392b0c2d

template & service restart with nethserver-sssd-save

view details

push time in 2 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha b65693f72142e039a8f51e958dff582735885fd6

expand cockpit PAM with nethserver-sssd-save

view details

push time in 2 days

Pull request review commentNethServer/nethserver-sssd

Prop to force the bash shell (disabled by default)

 event_templates('nethserver-sssd-save', qw(     /etc/samba/smb.conf     /etc/openldap/ldap.conf     /etc/backup-config.d/nethserver-sssd.include+    /etc/pam.d/cockpit+    /etc/ssh/sshd_config

ok it is clear, thank

stephdl

comment created time in 2 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

+UID="root"+GID="root"+PERMS="0644"

done

stephdl

comment created time in 3 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

+UID="root"+GID="root"+PERMS="0440"

done

stephdl

comment created time in 3 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

+#%PAM-1.0+auth	   required	pam_sepermit.so+auth       substack     password-auth+auth       include      postlogin+auth       optional     pam_ssh_add.so+# the root and members of domain admins are always allowed+# if pam auth succeed, it ignores  pam_listfile.so+auth [success=2 default=ignore] pam_succeed_if.so user in [root]+auth [success=1 default=ignore] pam_succeed_if.so user ingroup [domain admins]+# select group allowed to login to cockpit (root & domain admins alway OK)

done

stephdl

comment created time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 008b7c6a691a274954da563bf0863a7eaaf545c4

use default file permission

view details

push time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 838275117377025072a60804652ae55ee2d96796

test3

view details

push time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 93478235025b2b50afbb1138657794dcc53d43a4

test2

view details

push time in 3 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

+UID="root"+GID="root"+PERMS="0644"

yes this one is on my own, maybe we could be less strict :-?

stephdl

comment created time in 3 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

+UID="root"+GID="root"+PERMS="0440"

yes this one is on my own, maybe we could be less strict :-?

stephdl

comment created time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha a91b5d1de5953a422400fdb470adf41d765b1f91

test

view details

push time in 3 days

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

+{+    # restrict groups to sftp, ssh access is refused+    my $domain = $DomainName || die ('Cannot retrieve DomainName');+    my @SftpRestricted = ();++    foreach ( split(',',$sshd{'AllowGroups'} || '')) {+        my ($group, $sftp) = split(':', $_);+        if(!$group || !$sftp) {+            next;+        }+        $group .= "\@$domain" if ($group !~ '@');+        push @SftpRestricted, $group if ($sftp eq 'sftp');+    }++    if (@SftpRestricted) {+        my $matchGroup = join (",", map { $_ } @SftpRestricted);

we need a comma separated list see the explanation below

stephdl

comment created time in 3 days

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

+{+    # restrict groups to sftp, ssh access is refused+    my $domain = $DomainName || die ('Cannot retrieve DomainName');+    my @SftpRestricted = ();++    foreach ( split(',',$sshd{'AllowGroups'} || '')) {+        my ($group, $sftp) = split(':', $_);+        if(!$group || !$sftp) {+            next;+        }+        $group .= "\@$domain" if ($group !~ '@');+        push @SftpRestricted, $group if ($sftp eq 'sftp');+    }++    if (@SftpRestricted) {+        my $matchGroup = join (",", map { $_ } @SftpRestricted);+        $OUT .= "Match Group \"$matchGroup\"\n";

no the way to protect group name against space for sftp is completely different from AllowGroups, for example it is a comma separated list, and not a space separated list like you see above. If we do not use comma and protect against spaces, the service crash

stephdl

comment created time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 2f8863fabf4afa604aa5f1b7c3ee9a71d4945575

api. do not delegate logs

view details

Stephane de Labrusse

commit sha 7f53770c3245e1c5ba36a828ea178bcbbcc84d4b

ui. do not delegate logs

view details

push time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 0da45fa8bc5a9d14b92713d5f7c3b1caa70d2592

Do not delegate logs

view details

push time in 3 days

PR opened NethServer/nethserver-cockpit

Do not delegate logs

https://github.com/NethServer/dev/issues/6033

+20 -2

0 comment

2 changed files

pr created time in 3 days

create barnchstephdl/nethserver-cockpit

branch : GH6033

created branch time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha a81cfd89abd5528404f4b15ebceaff614a4fa281

Cockpit group based PAM permissions

view details

Stephane de Labrusse

commit sha fd9add0893d06062947a2729e621170ece5208d0

List of groups allowed to cockpit throught PAM

view details

Stephane de Labrusse

commit sha 947eff33ec4f881a1cefb80e32dc954b9c5c8c39

Expand PAM and user group list

view details

push time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha d7287314069f5b2b387d32b336a2ecbdac8e633d

Hide shell checkbox in case of forced shell

view details

push time in 3 days

push eventstephdl/nethserver-openssh

Stephane de Labrusse

commit sha 55c8f6acd4378a6dad1ac873f83205121b89cd15

Enable sftp with umask

view details

Stephane de Labrusse

commit sha f3dea8e1890ee23e4482022e757a1b84f6c49677

Default Property for sftp no more hidden

view details

Stephane de Labrusse

commit sha 30cb95575d2db65115039f361a3efe71f56a51fa

Allow groups to connect to SSH & SFTP

view details

Stephane de Labrusse

commit sha 8171b01c160cb38f1877e48b0eee299e04a81ac9

Force the groups to use only SFTP

view details

push time in 3 days

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

+{+    # restrict groups to sftp, ssh access is refused+    use strict;+    use esmith::ConfigDB;

done

stephdl

comment created time in 3 days

Pull request review commentNethServer/nethserver-openssh

Restrict the usage of SSH service to group

+{+    # Allow groups to sftp/ssh with different policies+    #+    # if $sssd{ShellOverrideStatus} is disabled we are in legacy (everybody is allowed with a shell access)+    # if $sssd{ShellOverrideStatus} is enabled we allow to root and members of domain admins group+    # if $sssd{ShellOverrideStatus} is enabled  with non empty $sshd{AllowGroups} +    #   we allow root, members of domain admins group and members of groups inside the AllowGroups prop+    #+    # members restricted to sftp (SftpRestrictedGroups) must be allowed to sshd also++    use strict;+    use esmith::ConfigDB;

done

stephdl

comment created time in 3 days

Pull request review commentNethServer/nethserver-cockpit

Group based permission access to cockpit

++#+# Allow groups to use cockpit +#++{

ok

stephdl

comment created time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha 3e1722e7b0c630ba7e30f5c0cccd2cbbca3fb830

Hide shell checkbox in case of forced shell

view details

push time in 3 days

issue commentNethServer/dev

Delegation of logs page doesn't have any effect

the user admin (and members of domain\ admins) are not granted to see the logs, they have a blank page, do I need to remove that delegation for all members of domain\ admins group ?

gsanchietti

comment created time in 3 days

Pull request review commentNethServer/nethserver-sssd

Prop to force the bash shell (disabled by default)

 event_templates('nethserver-sssd-save', qw(     /etc/samba/smb.conf     /etc/openldap/ldap.conf     /etc/backup-config.d/nethserver-sssd.include+    /etc/pam.d/cockpit+    /etc/ssh/sshd_config

ok, I am not sure to understand clearly, but let me advocate with another mind What about if a sysadmin want to change the props ShellOverrideStatus to enabled manually, with only one evnt he can propagate his changes to any bound services ?

stephdl

comment created time in 3 days

push eventstephdl/nethserver-cockpit

Stephane de Labrusse

commit sha fc164bb4440c8aa2b4fba5cba79a759cedfea87d

Hide shell checkbox in case of forced shell

view details

push time in 3 days

PR opened NethServer/nethserver-cockpit

Hide shell checkbox in case of forced shell

https://github.com/NethServer/dev/issues/6029

+6 -2

0 comment

2 changed files

pr created time in 3 days

create barnchstephdl/nethserver-cockpit

branch : ForcedShell

created branch time in 3 days

created tagstephdl/nethserver-cockpit

tag1.3.15

NethServer Cockpit UI and new Server Manager

created time in 3 days

created tagstephdl/nethserver-cockpit

tag1.3.16

NethServer Cockpit UI and new Server Manager

created time in 3 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha 3f4b4badfe4b80197a25fb1febc8b959600a2c97

scaffold the cockpit files

view details

Stephane de Labrusse

commit sha 326c3ee2eaa150381e0e2a021797ffd1140e5490

%changelog must be final

view details

Stephane de Labrusse

commit sha 5b62dd763f91a909b592c32bbf44224d53883992

api. read file

view details

Stephane de Labrusse

commit sha aca98627a3e6106c97cadff9be99d5d4a1d536e5

api. update,read,validate

view details

Stephane de Labrusse

commit sha 3ac947f2498582bc25357e54579fcde610ea7499

api. update

view details

Stephane de Labrusse

commit sha baa3ec9ec088413780310ce07298b5a21c7fea30

cockpit. scaffold files

view details

Stephane de Labrusse

commit sha 46d1f6b2496c2f4c7af8f2324949649ab971f83e

api. NFSStatus always disabled

view details

Stephane de Labrusse

commit sha 5585068505b73794e8d953dba8293d088fa769d4

ui. logo for NFS sharedfolders

view details

Stephane de Labrusse

commit sha 1eff6a85db28de0877879c25b372d617bd21d280

ui. NfsSharedfolders.vue

view details

Stephane de Labrusse

commit sha 8ae365b468bb89f4b6a93984833506e57a825bdb

ui. dashboard removal

view details

Stephane de Labrusse

commit sha 0f3c36c88ca8c58a2ee16ff135359f726a8d9ccc

ui. new log display

view details

Stephane de Labrusse

commit sha bbab935dbe042676f2456c6baf8f58c9d2be41e6

ui. translations

view details

Stephane de Labrusse

commit sha 0f39b5cc7adf3275e5e4997e3df9d98546de27de

ui. adapt to translation lenght

view details

Stephane de Labrusse

commit sha 4adff7f2b914e29fbe32e39dd427386df063f317

sudoers.d delegation

view details

Stephane de Labrusse

commit sha 3b46e7136baf521f5c4e4f9cc375a5e2c3253d75

transifex conf for cockpit

view details

Stephane de Labrusse

commit sha cc231027ecaff328c77dd71af1bbd723ed4ccd24

api fix update bugs

view details

Stephane de Labrusse

commit sha d7487c8c9b13fadd7868f3421ede4a931f6cf582

ui fix NfsHide checkbox bug

view details

Stephane de Labrusse

commit sha a4f05ee5c8fd5107ec1cf64a78e94171fee576ac

api.validate the nfs form

view details

Stephane de Labrusse

commit sha 6590d13544879f85f67d594dd25b32e9196cc71d

translation adjustements

view details

Stephane de Labrusse

commit sha fcf526ba7b348ae3d80b7f6d31f6ef786fcdef9e

help inside the UI

view details

push time in 4 days

PR merged stephdl/nethserver-nfs

Create a nfs cockpit application
+13900 -21

0 comment

29 changed files

stephdl

pr closed time in 4 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha 501b6f3e3be5656fcd790ed3df358a47271570fd

spec version bumped

view details

push time in 4 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha 2ecb8187c1da55e0ac8b9d11c4fb4a23ddead169

Verifiy if IPs are not listed several times

view details

push time in 4 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha fcf526ba7b348ae3d80b7f6d31f6ef786fcdef9e

help inside the UI

view details

Stephane de Labrusse

commit sha 6a0a87824c27aed89476dd3ab888df40376c2ac5

wdelay depends on sync

view details

Stephane de Labrusse

commit sha 197e72e42d646a5ae3fde2a7637737da318ea401

Ips are no more restricted to local network

view details

push time in 4 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha a4f05ee5c8fd5107ec1cf64a78e94171fee576ac

api.validate the nfs form

view details

Stephane de Labrusse

commit sha 6590d13544879f85f67d594dd25b32e9196cc71d

translation adjustements

view details

push time in 5 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha 1eff6a85db28de0877879c25b372d617bd21d280

ui. NfsSharedfolders.vue

view details

Stephane de Labrusse

commit sha 8ae365b468bb89f4b6a93984833506e57a825bdb

ui. dashboard removal

view details

Stephane de Labrusse

commit sha 0f3c36c88ca8c58a2ee16ff135359f726a8d9ccc

ui. new log display

view details

Stephane de Labrusse

commit sha bbab935dbe042676f2456c6baf8f58c9d2be41e6

ui. translations

view details

Stephane de Labrusse

commit sha 0f39b5cc7adf3275e5e4997e3df9d98546de27de

ui. adapt to translation lenght

view details

Stephane de Labrusse

commit sha 4adff7f2b914e29fbe32e39dd427386df063f317

sudoers.d delegation

view details

Stephane de Labrusse

commit sha 3b46e7136baf521f5c4e4f9cc375a5e2c3253d75

transifex conf for cockpit

view details

Stephane de Labrusse

commit sha cc231027ecaff328c77dd71af1bbd723ed4ccd24

api fix update bugs

view details

Stephane de Labrusse

commit sha d7487c8c9b13fadd7868f3421ede4a931f6cf582

ui fix NfsHide checkbox bug

view details

push time in 5 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha fc147b0a77d9a2d106dc30d914c22cbc72b54eb0

api fix update bugs

view details

Stephane de Labrusse

commit sha 87e380a20fdc2fe52b11999294a65880f9bc8680

ui fix NfsHide checkbox bug

view details

push time in 5 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha 82e3a277ec9ff6b8868c4725d22d7a975ed03188

ui. new log display

view details

Stephane de Labrusse

commit sha f4fda3dfaab0cb2bdd65bed3f1137677886335ba

ui. translations

view details

Stephane de Labrusse

commit sha 3b189f24522df0faa881af0fd1198d3f6984a3d6

ui. adapt to translation lenght

view details

Stephane de Labrusse

commit sha 30f1083c80e6e6baed48090c3feb255d165c6f17

sudoers.d delegation

view details

Stephane de Labrusse

commit sha bc324d94f2b0af40797cbf711d59a159cf92714b

transifex conf for cockpit

view details

push time in 5 days

push eventstephdl/nethserver-cockpit-empty-VueJS

Stephane de Labrusse

commit sha d1d9be64c557dd0dcadc5ec606fdb6c8877468de

ui. new log display

view details

push time in 5 days

push eventstephdl/nethserver-nfs

Stephane de Labrusse

commit sha fd5e6f54f75d5a262f6a68478c55fd365e2e872d

ui. dashboard removal

view details

push time in 6 days

PR closed stephdl/nethserver-nfs

Create a cockpit UI
+14631 -15

1 comment

34 changed files

stephdl

pr closed time in 6 days

more