Skip to content

Commit

Permalink
commit 22c9999
Browse files Browse the repository at this point in the history
Merge: 29fa64a efba383
Author: David Christofas <[email protected]>
Date:   Wed Mar 1 12:59:18 2023 +0100

    Merge pull request #5690 from owncloud/create-public-link-permission

    add new permission 'publiclink.create' and assign it to the 'Admin', …
  • Loading branch information
David Christofas committed Mar 1, 2023
1 parent 0017bc8 commit 686ceef
Showing 1 changed file with 20 additions and 20 deletions.
40 changes: 20 additions & 20 deletions services/_includes/adoc/global_configvars.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ a| [subs=-attributes]
++false ++

a| [subs=-attributes]
Flag to enable or disable the creation of the demo users.
The default role assignments the demo users should be setup.

a| `LDAP_BIND_DN`

Expand All @@ -41,7 +41,7 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++uid=idp,ou=sysusers,o=libregraph-idm ++
++uid=reva,ou=sysusers,o=libregraph-idm ++

a| [subs=-attributes]
LDAP DN to use for simple bind authentication with the target LDAP server.
Expand Down Expand Up @@ -80,7 +80,7 @@ a| [subs=-attributes]
++~/.ocis/idm/ldap.crt ++

a| [subs=-attributes]
Path/File name for the root CA certificate (in PEM format) used to validate TLS server certificates of the LDAP service. If not definied, the root directory derives from $OCIS_BASE_DATA_PATH:/idp.
Path/File name for the root CA certificate (in PEM format) used to validate TLS server certificates of the LDAP service. If not definied, the root directory derives from $OCIS_BASE_DATA_PATH:/idm.

a| `LDAP_GROUP_BASE_DN`

Expand Down Expand Up @@ -282,7 +282,7 @@ a| [subs=-attributes]
++ldaps://localhost:9235 ++

a| [subs=-attributes]
Url of the LDAP service to use as IDP.
URI of the LDAP Server to connect to. Supported URI schemes are 'ldaps://' and 'ldap://'

a| `LDAP_USER_BASE_DN`

Expand Down Expand Up @@ -351,7 +351,7 @@ a| [subs=-attributes]
++inetOrgPerson ++

a| [subs=-attributes]
LDAP User ObjectClass like 'inetOrgPerson'.
The object class to use for users in the default user search filter ('inetOrgPerson').

a| `LDAP_USER_SCHEMA_DISPLAYNAME`

Expand Down Expand Up @@ -382,10 +382,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++uid ++
++ownclouduuid ++

a| [subs=-attributes]
LDAP User uuid attribute like 'uid'.
LDAP Attribute to use as the unique id for users. This should be a stable globally unique ID like a UUID.

a| `LDAP_USER_SCHEMA_ID_IS_OCTETSTRING`

Expand Down Expand Up @@ -419,7 +419,7 @@ a| [subs=-attributes]
++mail ++

a| [subs=-attributes]
LDAP User email attribute like 'mail'.
LDAP Attribute to use for the email address of users.

a| `LDAP_USER_SCHEMA_USERNAME`

Expand All @@ -434,10 +434,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++displayName ++
++uid ++

a| [subs=-attributes]
LDAP User name attribute like 'displayName'.
LDAP Attribute to use for username of users.

a| `LDAP_USER_SCOPE`

Expand All @@ -455,7 +455,7 @@ a| [subs=-attributes]
++sub ++

a| [subs=-attributes]
LDAP search scope to use when looking up users. Supported scopes are 'base', 'one' and 'sub'.
LDAP search scope to use when looking up users. Supported values are 'base', 'one' and 'sub'.

a| `OCIS_ADMIN_USER_ID`

Expand All @@ -471,7 +471,7 @@ a| [subs=-attributes]
++ ++

a| [subs=-attributes]
ID of the user that should receive admin privileges. Consider that the UUID can be encoded in some LDAP deployment configurations like in .ldif files. These need to be decoded beforehand.
ID of the user who collects all necessary information for deletion.

a| `OCIS_CACHE_STORE_ADDRESS`

Expand Down Expand Up @@ -905,7 +905,7 @@ a| [subs=-attributes]
++false ++

a| [subs=-attributes]
Whether to verify the server TLS certificates.
Whether the NATS server should skip the client certificate verification during the TLS handshake.

a| `OCIS_JWT_SECRET`

Expand Down Expand Up @@ -1161,10 +1161,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++https://localhost:9200 ++
++ ++

a| [subs=-attributes]
The OIDC issuer URL to use.
The identity provider href for the openid-discovery relation.

a| `OCIS_SPACES_MAX_QUOTA`

Expand All @@ -1179,7 +1179,7 @@ a| [subs=-attributes]
++0 ++

a| [subs=-attributes]
Set the global max quota value in bytes. A value of 0 equals unlimited. The value is provided via capabilities.
Set a global max quota for spaces in bytes. A value of 0 equals unlimited. If not using the global OCIS_SPACES_MAX_QUOTA, you must define the FRONTEND_MAX_QUOTA in the frontend service.

a| `OCIS_SYSTEM_USER_API_KEY`

Expand Down Expand Up @@ -1217,7 +1217,7 @@ a| [subs=-attributes]
++ ++

a| [subs=-attributes]
ID of the oCIS STORAGE-SYSTEM system user. Admins need to set the ID for the STORAGE-SYSTEM system user in this config option which is then used to reference the user. Any reasonable long string is possible, preferably this would be an UUIDv4 format.
ID of the oCIS storage-system system user. Admins need to set the ID for the STORAGE-SYSTEM system user in this config option which is then used to reference the user. Any reasonable long string is possible, preferably this would be an UUIDv4 format.

a| `OCIS_SYSTEM_USER_IDP`

Expand Down Expand Up @@ -1423,10 +1423,10 @@ a| [subs=-attributes]
++string ++

a| [subs=-attributes]
++https://localhost:9200 ++
++https://localhost:9200/ ++

a| [subs=-attributes]
The OIDC issuer URL to use.
Base url to navigate back from the app the containing folder in the file list.

a| `REVA_GATEWAY`

Expand Down Expand Up @@ -1477,7 +1477,7 @@ a| [subs=-attributes]
++ ++

a| [subs=-attributes]
Transfer secret for signing file up- and download requests.
The storage transfer secret.

a| `STORAGE_USERS_OCIS_ASYNC_UPLOADS`

Expand Down

0 comments on commit 686ceef

Please sign in to comment.