LDAP Profile management service https://profile.hackerspace.pl
Go to file
radex 05cbc7163a Merge pull request 'Dust off the codebase.' (#8) from q3k/dustoff into master
Reviewed-on: #8
2024-07-08 12:10:23 +00:00
stubs *: blacken 2024-07-07 21:46:29 +02:00
webapp *: blacken 2024-07-07 21:46:29 +02:00
.gitignore rename config.py.dist to config.py 2023-09-23 18:28:02 +02:00
.python-version Fix build for Python 3.11 2023-09-19 22:14:09 +02:00
Dockerfile Dockerfile: don't run uwsgi as root 2023-09-19 22:16:07 +02:00
README.md Improve README 2023-11-23 17:35:52 +01:00
ci.sh ci.sh: create 2024-07-07 21:45:55 +02:00
krb5.conf Add hackerspace name config option 2018-02-26 10:03:33 +00:00
poetry.lock Implement LDAP avatar serving 2023-10-08 18:14:00 +02:00
pyproject.toml Implement LDAP avatar serving 2023-10-08 18:14:00 +02:00
shell.nix ci.sh: create 2024-07-07 21:45:55 +02:00
syrenka.png Implement LDAP avatar serving 2023-10-08 18:14:00 +02:00


LDAPWeb aka profile.hackerspace.pl


No configuration is required to see and change your own profile and password.

To test admin pages, notifications, and avatars, you need to configure these environment variables:

  • LDAPWEB_ADMIN_DN - LDAP user DN, e.g. uid=radex,ou=people,dc=hackerspace,dc=pl
  • LDAPWEB_ADMIN_PASSWORD - password to the above LDAP user
  • LDAPWEB_SMTP_USER - username with a @hackerspace.pl mailbox, e.g. radex
  • LDAPWEB_SMTP_PASSWORD - password to the above mailbox
  • LDAPWEB_ADMIN_GROUPS - comma-separated LDAP groups allowed to see admin pages (note that every user has a group with the same name), e.g. radex,zarzad
  • LDAPWEB_PAPERTRAIL_RECIPIENTS - comma-separated email addresses that will get email alerts for changes done via admin UI

See webapp/config.py for more details.

(Note that you don't need to be an LDAP admin to be able to hack on this - you just won't see all attributes, and won't be able to change other people's profiles)

Quick Start

poetry install
poetry run flask --app webapp run -p 5001 --debug

Open app at localhost:5001

To test changing password locally, you must add HACKERSPACE.PL realm to your /etc/krb5.conf. See krb5.conf for an example

Quick Start (Dockerized)

docker build -t ldapweb .
docker run -p 8000:8000 ldapweb

Open app at localhost:8000


Build Docker imagine manually and bump https://code.hackerspace.pl/hswaw/hscloud/src/branch/master/hswaw/ldapweb/prod.jsonnet