mirror of
https://github.com/bitwarden/server.git
synced 2024-12-01 13:43:23 +01:00
19b8d8281a
* scim project stub * some scim models and v2 controllers * implement some v2 scim endpoints * fix spacing * api key auth * EC-261 - SCIM Org API Key and connection type config * EC-261 - Fix lint errors/formatting * updates for okta implementation testing * fix var ref * updates from testing with Okta * implement scim context via provider parsing * support single and list of ids for add/remove groups * log ops not handled * touch up scim context * group list filtering * EC-261 - Additional SCIM provider types * EC-265 - UseScim flag and license update * EC-265 - SCIM provider type of default (0) * EC-265 - Add Scim URL and update connection validation * EC-265 - Model validation and cleanup for SCIM keys * implement scim org connection * EC-265 - Ensure ServiceUrl is not persisted to DB * EC-265 - Exclude provider type from DB if not configured * EC-261 - EF Migrations for SCIM * add docker builds for scim * EC-261 - Fix failing permissions tests * EC-261 - Fix unit tests and pgsql migrations * Formatting fixes from linter * EC-265 - Remove service URL from scim config * EC-265 - Fix unit tests, removed wayward validation * EC-265 - Require self-hosted for billing sync org conn * EC-265 - Fix formatting issues - whitespace * EC-261 - PR feedback and cleanup * scim constants rename * no scim settings right now * update project name * delete package lock * update appsettings configs for scim * use default scim provider for context Co-authored-by: Kyle Spearrin <kyle.spearrin@gmail.com>
38 lines
1.0 KiB
PowerShell
38 lines
1.0 KiB
PowerShell
#!/usr/bin/env pwsh
|
|
# Helper script for applying the same user secrets to each project
|
|
param (
|
|
[bool]$clear,
|
|
[Parameter(ValueFromRemainingArguments = $true, Position=1)]
|
|
$cmdArgs
|
|
)
|
|
|
|
if (!(Test-Path "secrets.json")) {
|
|
Write-Warning "No secrets.json file found, please copy and modify the provided example";
|
|
exit;
|
|
}
|
|
|
|
if ($clear -eq $true) {
|
|
Write-Output "Deleting all existing user secrets"
|
|
}
|
|
|
|
$projects = @{
|
|
Admin = "../src/Admin"
|
|
Api = "../src/Api"
|
|
Billing = "../src/Billing"
|
|
Events = "../src/Events"
|
|
EventsProcessor = "../src/EventsProcessor"
|
|
Icons = "../src/Icons"
|
|
Identity = "../src/Identity"
|
|
Notifications = "../src/Notifications"
|
|
Sso = "../bitwarden_license/src/Sso"
|
|
Scim = "../bitwarden_license/src/Scim"
|
|
}
|
|
|
|
foreach ($key in $projects.keys) {
|
|
if ($clear -eq $true) {
|
|
dotnet user-secrets clear -p $projects[$key]
|
|
}
|
|
$output = Get-Content secrets.json | & dotnet user-secrets set -p $projects[$key]
|
|
Write-Output "$output - $key"
|
|
}
|