powerdns-admin/powerdnsadmin
Nigel Kukard 138532fb95 fix: allow the specification of any combination of groups in LDAP group security configuration
Previous behavior required the specification of all three group security groups before the
"Save Settings" button would be enabled.

This adds a check into users.py which checks that the group is set before searching and
removes the javascript preventing the specification of any combination of groups.

Tested:
- Tested all combinations on AD after MR 1238
- Tested all combinations on OpenLDAP
- Tested enabling the Group Security with no groups set which correctly prevents login

Resolves #1462
2023-03-18 20:30:52 +00:00
..
lib Change domain(s) to zone(s) in the python code and docs 2023-03-16 17:02:23 +01:00
models fix: allow the specification of any combination of groups in LDAP group security configuration 2023-03-18 20:30:52 +00:00
routes fix: fixed session clearing and let logout_user take care of cleanup 2023-03-18 19:14:58 +00:00
services Finished adding new OAuth Server Metadata URL setting to Google, GitHub, and Microsoft OAuth service configuration features. 2023-03-12 09:13:54 -04:00
static Diff-ify changelog view for zone changes 2023-03-03 13:22:29 +01:00
templates fix: allow the specification of any combination of groups in LDAP group security configuration 2023-03-18 20:30:52 +00:00
__init__.py Read flask session type from environment variable and create sessions table if not exist. 2023-03-08 17:05:32 +02:00
assets.py Re-formatted the assets.py file to current PEP8 standards. 2023-03-11 08:48:19 -05:00
decorators.py Change domain(s) to zone(s) in the python code and docs 2023-03-16 17:02:23 +01:00
default_config.py Tweaked PR to include the latest asset build changes for CSS minimizer. Also updated the default session storage to use SQLAlchemy instead of the file system. 2023-03-10 16:34:55 -05:00
swagger-spec.yaml Updated the unknown state 2022-05-23 16:46:11 +00:00