(()=>{"use strict";var e,t,a,n={2393:(e,t,a)=>{var n=a(21777),r=a(65899),l=a(85471),i=a(81222),s=a(53334),o=a(19430),d=a(22238),p=a(61744),c=a(81045),u=a(65770),_=a(39999),g=a(85761),A=a(4732),f=a(74069),v=a(15502),C=a(49615),h=a(79825),b=a(90785),m=a(47611),x=a(10363),y=a(30688),w=a(99179),N=a(54048),P=a(123),D=a(27345),k=a(38588),F=a(43157),T=a(47254),L=a(73899),z=a(542),I=a(3905),S=a(97397),U=a(29333),B=a(50017),O=a(60258),G=a(44375),E=a(48091),M=a(17204),j=a(95091),R=a(67025),W=a(93474),Q=a(28329),Y=a(59238),q=a(76514),H=a(98261),K=a(59053),$=a(74434),V=a(90429),X=a(53449),J=a(65404),Z=a(44025),ee=a(71185),te=a(48198),ae=a(59372),ne=a(39290),re=a(83194),le=a(66272),ie=a(11275),se=a(66768),oe=a(53773),de=a(77130),pe=a(51550),ce=a(57833),ue=a(94589),_e=a(19487),ge=a(6562),Ae=a(88289),fe=a(80780),ve=a(31133),Ce=a(96097),he=a(77939),be=a(35290),me=a(37335),xe=a(57847),ye=a(14538),we=a(36079),Ne=a(68768),Pe=a(65043),De=(a(90690),a(52781),a(3168),a(88961)),ke=a(14211),Fe=a(75217),Te=(a(61338),a(71639)),Le=a(8),ze=a(3457),Ie=a(10080),Se=a(22047),Ue=a(80467),Be=a(37994),Oe=a(18127),Ge=a(60238),Ee=a(12617),Me=a(12318),je=a(23610),Re=(a(55581),a(91911),a(95462),a(23020),a(53429),a(23739),a(16343),a(29928),a(12311),a(18547),a(42892)),We=a(69885),Qe=(a(59656),a(75105),a(92471),a(16406),a(2508));o.N,d.N,p.A,c.N,u.N,_.A,g.N,A.A,v.A,C.A,h.N,f.N,b.N,m.A,x.A,y.N,w.N,N.A,P.N,D.A,k.N,F.N,T.N,L.N,z.A,I.N,S.A,U.N,B.N,O.A,G.N,E.A,M.N,Ne.N,j.N,R.N,W.N,Q.N,Y.N,q.N,H.N,K.N,$.N,V.N,X.N,J.N,Z.N,ee.default,te.A,ae.N,ne.N,re.A,le.N,ie.A,se.A,oe.N,de.N,pe.N,ce.N,ue.N,_e.N,ge.N,Ae.A,we.N,fe.A,ve.A,Ce.N,he.N,be.N,me.N,xe.N,ye.N,Ne.a,De.N,Te.N,ke.N,Le.N,ze.N,Ie.N,Se.N,Ue.N,Be.N,Fe.N,Oe.N,Ge.N,Ee.N,Me.N,je.A,Symbol.toStringTag,Re.A,We.A,Qe.yw,Symbol.toStringTag;var Ye=a(96078),qe=a(87485),He=a(85168),Ke=a(63814),$e=a(43627),Ve=a.n($e);const Xe=(0,a(35947).YK)().setApp("LDAP").detectUser().build(),Je=(0,Ke.Jv)("apps/user_ldap/ajax");async function Ze(e,t){let a=arguments.length>2&&void 0!==arguments[2]?arguments[2]:{};const n=new FormData;n.set("action",e),n.set("ldap_serverconfig_chooser",t),Object.entries(a).forEach(e=>{let[t,a]=e;n.set(t,a)});const r=await Pe.Ay.post(Ve().join(Je,"wizard.php"),n);if(Xe.debug(`Called wizard action: ${e}`,{configId:t,params:n,response:r}),"error"===r.data.status){const e=r.data.message??(0,s.t)("user_ldap","An error occurred");throw(0,He.Qg)(e),new Error(e)}return r.data}async function et(){return await tt((0,s.t)("user_ldap","Mode switch"),(0,s.t)("user_ldap","Switching the mode will enable automatic LDAP queries. Depending on your LDAP size they may take a while. Do you still want to switch the mode?"))}async function tt(e,t){return new Promise(a=>{const n=(0,He.As)(e).setText(t).setSeverity(He.aR.Warning).addButton({label:(0,s.t)("user_ldap","Cancel"),callback(){n.hide(),a(!1)}}).addButton({label:(0,s.t)("user_ldap","Confirm"),variant:"error",callback(){a(!0)}}).build();n.show()})}const at=(0,r.nY)("ldap-configs",()=>{const e=(0,l.KR)((0,i.C)("user_ldap","ldapConfigs")),t=(0,l.KR)(Object.keys(e.value)[0]),a=(0,l.EW)(()=>e.value[t.value]),n=(0,l.KR)(0);async function r(){const a=await async function(){const e=await Pe.Ay.post((0,Ke.KT)("apps/user_ldap/api/v1/config"));return Xe.debug("Created configuration",{configId:e.data.ocs.data.configID}),e.data.ocs.data.configID}();return l.Ay.set(e.value,a,await async function(e){const t=await Pe.Ay.get((0,Ke.KT)("apps/user_ldap/api/v1/config/{configId}",{configId:e}));return Xe.debug("Fetched configuration",{configId:e,config:t.data.ocs.data}),t.data.ocs.data}(a)),t.value=a,a}return{ldapConfigs:e,selectedConfigId:t,selectedConfig:a,updatingConfig:n,getConfigProxy:function(t){let a=arguments.length>1&&void 0!==arguments[1]?arguments[1]:{};return new Proxy(e.value[t],{get:(e,t)=>e[t],set:(e,r,l)=>(e[r]=l,(async()=>{n.value++,await Ze("save",t,{cfgkey:r,cfgval:l}),n.value--,void 0!==a[r]&&a[r](e[r])})(),!0)})},create:r,copyConfig:async function(a){const n=await async function(e){const t=new FormData;t.set("copyConfig",e);const a=await Pe.Ay.post(Ve().join(Je,"getNewServerConfigPrefix.php"),t);return Xe.debug("Created configuration",{configId:a.data.configPrefix}),a.data.configPrefix}(a);return l.Ay.set(e.value,n,{...e.value[a]}),t.value=n,n},removeConfig:async function(a){!0===await async function(e){try{if(!await tt((0,s.t)("user_ldap","Confirm action"),(0,s.t)("user_ldap","Are you sure you want to permanently delete this LDAP configuration? This cannot be undone.")))return!1;await Pe.Ay.delete((0,Ke.KT)("apps/user_ldap/api/v1/config/{configId}",{configId:e})),Xe.debug("Deleted configuration",{configId:e})}catch(e){const t=e.response;(0,He.Qg)(t?.data.ocs.meta.message||(0,s.t)("user_ldap","Fail to delete config"))}return!0}(a)&&l.Ay.delete(e.value,a),t.value=Object.keys(e.value)[0]??await r()}}}),nt=(0,l.pM)({__name:"AdvancedTab",props:{configId:null},setup(e){const t=e,a=at(),n=(0,l.EW)(()=>a.getConfigProxy(t.configId)),r=(0,qe.F)().theming.name;return{__sfc:!0,props:t,ldapConfigsStore:a,ldapConfigProxy:n,instanceName:r,groupMemberAssociation:{uniqueMember:"uniqueMember",memberUid:"memberUid",member:"member (AD)",gidNumber:"gidNumber",zimbraMailForwardingAddress:"zimbraMailForwardingAddress"},t:s.t,NcCheckboxRadioSwitch:q.N,NcSelect:ke.N,NcTextArea:Be.N,NcTextField:Fe.N}}});var rt=a(85072),lt=a.n(rt),it=a(97825),st=a.n(it),ot=a(77659),dt=a.n(ot),pt=a(55056),ct=a.n(pt),ut=a(10540),_t=a.n(ut),gt=a(41113),At=a.n(gt),ft=a(76253),vt={};vt.styleTagTransform=At(),vt.setAttributes=ct(),vt.insert=dt().bind(null,"head"),vt.domAPI=st(),vt.insertStyleElement=_t(),lt()(ft.A,vt),ft.A&&ft.A.locals&&ft.A.locals;var Ct=a(14486);const ht=(0,Ct.A)(nt,function(){var e=this,t=e._self._c,a=e._self._setupProxy;return t("fieldset",{staticClass:"ldap-wizard__advanced"},[t("details",{staticClass:"ldap-wizard__advanced__section",attrs:{open:"",name:"ldap-wizard__advanced__section"}},[t("summary",[t("h3",[e._v(e._s(a.t("user_ldap","Connection Settings")))])]),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Backup (Replica) Host"),value:a.ldapConfigProxy.ldapBackupHost,"helper-text":a.t("user_ldap","Give an optional backup host. It must be a replica of the main LDAP/AD server.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapBackupHost=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{type:"number",value:a.ldapConfigProxy.ldapBackupPort,label:a.t("user_ldap","Backup (Replica) Port")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapBackupPort=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcCheckboxRadioSwitch,{attrs:{checked:"1"===a.ldapConfigProxy.ldapOverrideMainServer,type:"switch","aria-label":a.t("user_ldap","Only connect to the replica server.")},on:{"update:checked":function(e){a.ldapConfigProxy.ldapOverrideMainServer=e?"1":"0"}}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Disable Main Server"))+"\n\t\t")]),e._v(" "),t(a.NcCheckboxRadioSwitch,{attrs:{checked:"1"===a.ldapConfigProxy.turnOffCertCheck,"aria-label":a.t("user_ldap","Not recommended, use it for testing only! If connection only works with this option, import the LDAP server's SSL certificate in your {instanceName} server.",{instanceName:a.instanceName})},on:{"update:checked":function(e){a.ldapConfigProxy.turnOffCertCheck=e?"1":"0"}}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Turn off SSL certificate validation."))+"\n\t\t")]),e._v(" "),t(a.NcTextField,{attrs:{type:"number",label:a.t("user_ldap","Cache Time-To-Live"),value:a.ldapConfigProxy.ldapCacheTTL,"helper-text":a.t("user_ldap","in seconds. A change empties the cache.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapCacheTTL=e.target.value).apply(null,arguments)}}})],1),e._v(" "),t("details",{staticClass:"ldap-wizard__advanced__section",attrs:{name:"ldap-wizard__advanced__section"}},[t("summary",[t("h3",[e._v(e._s(a.t("user_ldap","Directory Settings")))])]),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",value:a.ldapConfigProxy.ldapUserDisplayName,label:a.t("user_ldap","User Display Name Field"),"helper-text":a.t("user_ldap","The LDAP attribute to use to generate the user's display name.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapUserDisplayName=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",value:a.ldapConfigProxy.ldapUserDisplayName2,label:a.t("user_ldap","2nd User Display Name Field"),"helper-text":a.t("user_ldap","Optional. An LDAP attribute to be added to the display name in brackets. Results in e.g. »John Doe (john.doe@example.org)«.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapUserDisplayName2=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextArea,{attrs:{value:a.ldapConfigProxy.ldapBaseUsers,placeholder:a.t("user_ldap","One User Base DN per line"),label:a.t("user_ldap","Base User Tree")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapBaseUsers=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextArea,{attrs:{value:a.ldapConfigProxy.ldapAttributesForUserSearch,placeholder:a.t("user_ldap","Optional; one attribute per line"),label:a.t("user_ldap","User Search Attributes")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributesForUserSearch=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcCheckboxRadioSwitch,{attrs:{checked:"1"===a.ldapConfigProxy.markRemnantsAsDisabled,"aria-label":a.t("user_ldap","When switched on, users imported from LDAP which are then missing will be disabled")},on:{"update:checked":function(e){a.ldapConfigProxy.markRemnantsAsDisabled=e?"1":"0"}}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Disable users missing from LDAP"))+"\n\t\t")]),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",value:a.ldapConfigProxy.ldapGroupDisplayName,label:a.t("user_ldap","Group Display Name Field"),title:a.t("user_ldap","The LDAP attribute to use to generate the groups's display name.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapGroupDisplayName=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextArea,{attrs:{value:a.ldapConfigProxy.ldapBaseGroups,placeholder:a.t("user_ldap","One Group Base DN per line"),label:a.t("user_ldap","Base Group Tree")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapBaseGroups=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextArea,{attrs:{value:a.ldapConfigProxy.ldapAttributesForGroupSearch,placeholder:a.t("user_ldap","Optional; one attribute per line"),label:a.t("user_ldap","Group Search Attributes")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributesForGroupSearch=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcSelect,{attrs:{options:Object.keys(a.groupMemberAssociation),"input-label":a.t("user_ldap","Group-Member association")},scopedSlots:e._u([{key:"option",fn:function(t){let{label:n}=t;return[e._v("\n\t\t\t\t"+e._s(a.groupMemberAssociation[n])+"\n\t\t\t")]}},{key:"selected-option",fn:function(t){let{label:n}=t;return[e._v("\n\t\t\t\t"+e._s(a.groupMemberAssociation[n])+"\n\t\t\t")]}}]),model:{value:a.ldapConfigProxy.ldapGroupMemberAssocAttr,callback:function(t){e.$set(a.ldapConfigProxy,"ldapGroupMemberAssocAttr",t)},expression:"ldapConfigProxy.ldapGroupMemberAssocAttr"}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Dynamic Group Member URL"),value:a.ldapConfigProxy.ldapDynamicGroupMemberURL,"helper-text":a.t("user_ldap","The LDAP attribute that on group objects contains an LDAP search URL that determines what objects belong to the group. (An empty setting disables dynamic group membership functionality.)")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapDynamicGroupMemberURL=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcCheckboxRadioSwitch,{attrs:{checked:"1"===a.ldapConfigProxy.ldapNestedGroups,"aria-label":a.t("user_ldap","When switched on, groups that contain groups are supported. (Only works if the group member attribute contains DNs.)")},on:{"update:checked":function(e){a.ldapConfigProxy.ldapNestedGroups=e?"1":"0"}}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Nested Groups"))+"\n\t\t")]),e._v(" "),t(a.NcTextField,{attrs:{type:"number",label:a.t("user_ldap","Paging chunksize"),value:a.ldapConfigProxy.ldapPagingSize,"helper-text":a.t("user_ldap","Chunksize used for paged LDAP searches that may return bulky results like user or group enumeration. (Setting it 0 disables paged LDAP searches in those situations.)")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapPagingSize=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcCheckboxRadioSwitch,{attrs:{checked:"1"===a.ldapConfigProxy.turnOnPasswordChange,"aria-label":a.t("user_ldap","Allow LDAP users to change their password and allow Super Administrators and Group Administrators to change the password of their LDAP users. Only works when access control policies are configured accordingly on the LDAP server. As passwords are sent in plaintext to the LDAP server, transport encryption must be used and password hashing should be configured on the LDAP server.")},on:{"update:checked":function(e){a.ldapConfigProxy.turnOnPasswordChange=e?"1":"0"}}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Enable LDAP password changes per user"))+"\n\t\t")]),e._v(" "),t("span",{staticClass:"tablecell"},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","(New password is sent as plain text to LDAP)"))+"\n\t\t")]),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Default password policy DN"),value:a.ldapConfigProxy.ldapDefaultPPolicyDN,"helper-text":a.t("user_ldap","The DN of a default password policy that will be used for password expiry handling. Works only when LDAP password changes per user are enabled and is only supported by OpenLDAP. Leave empty to disable password expiry handling.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapDefaultPPolicyDN=e.target.value).apply(null,arguments)}}})],1),e._v(" "),t("details",{staticClass:"ldap-wizard__advanced__section",attrs:{name:"ldap-wizard__advanced__section"}},[t("summary",[t("h3",[e._v(e._s(a.t("user_ldap","Special Attributes")))])]),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",value:a.ldapConfigProxy.ldapQuotaAttribute,label:a.t("user_ldap","Quota Field"),"helper-text":a.t("user_ldap","Leave empty for user's default quota. Otherwise, specify an LDAP/AD attribute.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapQuotaAttribute=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",value:a.ldapConfigProxy.ldapQuotaDefault,label:a.t("user_ldap","Quota Default"),"helper-text":a.t("user_ldap","Override default quota for LDAP users who do not have a quota set in the Quota Field.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapQuotaDefault=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",value:a.ldapConfigProxy.ldapEmailAttribute,label:a.t("user_ldap","Email Field"),"helper-text":a.t("user_ldap","Set the user's email from their LDAP attribute. Leave it empty for default behaviour.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapEmailAttribute=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","User Home Folder Naming Rule"),value:a.ldapConfigProxy.homeFolderNamingRule,"helper-text":a.t("user_ldap","Leave empty for username (default). Otherwise, specify an LDAP/AD attribute.")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.homeFolderNamingRule=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","`$home` Placeholder Field"),value:a.ldapConfigProxy.ldapExtStorageHomeAttribute,"helper-text":a.t("user_ldap","$home in an external storage configuration will be replaced with the value of the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapExtStorageHomeAttribute=e.target.value).apply(null,arguments)}}})],1),e._v(" "),t("details",{staticClass:"ldap-wizard__advanced__section",attrs:{name:"ldap-wizard__advanced__section"}},[t("summary",[t("h3",[e._v(e._s(a.t("user_ldap","User Profile Attributes")))])]),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Phone Field"),value:a.ldapConfigProxy.ldapAttributePhone,"helper-text":a.t("user_ldap","User profile Phone will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributePhone=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Website Field"),value:a.ldapConfigProxy.ldapAttributeWebsite,"helper-text":a.t("user_ldap","User profile Website will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeWebsite=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Address Field"),value:a.ldapConfigProxy.ldapAttributeAddress,"helper-text":a.t("user_ldap","User profile Address will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeAddress=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Twitter Field"),value:a.ldapConfigProxy.ldapAttributeTwitter,"helper-text":a.t("user_ldap","User profile Twitter will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeTwitter=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Fediverse Field"),value:a.ldapConfigProxy.ldapAttributeFediverse,"helper-text":a.t("user_ldap","User profile Fediverse will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeFediverse=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Organisation Field"),value:a.ldapConfigProxy.ldapAttributeOrganisation,"helper-text":a.t("user_ldap","User profile Organisation will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeOrganisation=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Role Field"),value:a.ldapConfigProxy.ldapAttributeRole,"helper-text":a.t("user_ldap","User profile Role will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeRole=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Headline Field"),value:a.ldapConfigProxy.ldapAttributeHeadline,"helper-text":a.t("user_ldap","User profile Headline will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeHeadline=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Biography Field"),value:a.ldapConfigProxy.ldapAttributeBiography,"helper-text":a.t("user_ldap","User profile Biography will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeBiography=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","Birthdate Field"),value:a.ldapConfigProxy.ldapAttributeBirthDate,"helper-text":a.t("user_ldap","User profile Date of birth will be set from the specified attribute")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapAttributeBirthDate=e.target.value).apply(null,arguments)}}})],1)])},[],!1,null,"5b57c0d9",null).exports,bt=(0,l.pM)({__name:"ExpertTab",props:{configId:null},setup(e){const t=e,a=at(),n=(0,l.EW)(()=>a.getConfigProxy(t.configId));return{__sfc:!0,props:t,ldapConfigsStore:a,ldapConfigProxy:n,t:s.t,NcTextField:Fe.N}}});var mt=a(28953),xt={};xt.styleTagTransform=At(),xt.setAttributes=ct(),xt.insert=dt().bind(null,"head"),xt.domAPI=st(),xt.insertStyleElement=_t(),lt()(mt.A,xt),mt.A&&mt.A.locals&&mt.A.locals;const yt=(0,Ct.A)(bt,function(){var e=this,t=e._self._c,a=e._self._setupProxy;return t("fieldset",{staticClass:"ldap-wizard__expert"},[t("div",{staticClass:"ldap-wizard__expert__line"},[t("strong",[e._v(e._s(a.t("user_ldap","Internal Username")))]),e._v(" "),t("p",{attrs:{id:"ldap_expert_username_attr"}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","By default the internal username will be created from the UUID attribute. It makes sure that the username is unique and characters do not need to be converted. The internal username has the restriction that only these characters are allowed: [a-zA-Z0-9_.@-]. Other characters are replaced with their ASCII correspondence or simply omitted. On collisions a number will be added/increased. The internal username is used to identify a user internally. It is also the default name for the user home folder. It is also a part of remote URLs, for instance for all DAV services. With this setting, the default behavior can be overridden. Changes will have effect only on newly mapped (added) LDAP users. Leave it empty for default behavior."))+"\n\t\t")]),e._v(" "),t(a.NcTextField,{attrs:{"aria-describedby":"ldap_expert_username_attr",autocomplete:"off",label:a.t("user_ldap","Internal Username Attribute:"),value:a.ldapConfigProxy.ldapExpertUsernameAttr,"label-outside":!0},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapExpertUsernameAttr=e.target.value).apply(null,arguments)}}})],1),e._v(" "),t("div",{staticClass:"ldap-wizard__expert__line"},[t("strong",[e._v(e._s(a.t("user_ldap","Override UUID detection")))]),e._v(" "),t("p",{attrs:{id:"ldap_expert_uuid_user_attr"}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","By default, the UUID attribute is automatically detected. The UUID attribute is used to doubtlessly identify LDAP users and groups. Also, the internal username will be created based on the UUID, if not specified otherwise above. You can override the setting and pass an attribute of your choice. You must make sure that the attribute of your choice can be fetched for both users and groups and it is unique. Leave it empty for default behavior. Changes will have effect only on newly mapped (added) LDAP users and groups."))+"\n\t\t")]),e._v(" "),t(a.NcTextField,{attrs:{"aria-describedby":"ldap_expert_uuid_user_attr",autocomplete:"off",label:a.t("user_ldap","UUID Attribute for Users"),value:a.ldapConfigProxy.ldapExpertUUIDUserAttr},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapExpertUUIDUserAttr=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcTextField,{attrs:{autocomplete:"off",label:a.t("user_ldap","UUID Attribute for Groups"),value:a.ldapConfigProxy.ldapExpertUUIDGroupAttr},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapExpertUUIDGroupAttr=e.target.value).apply(null,arguments)}}})],1)])},[],!1,null,"1b8d07c0",null).exports,wt=(0,l.pM)({__name:"GroupsTab",props:{configId:null},setup(e){const t=e,a=at(),{ldapConfigs:n}=(0,r.bP)(a),i=(0,l.EW)(()=>a.getConfigProxy(t.configId,{ldapGroupFilterObjectclass:f,ldapGroupFilterGroups:f})),o=(0,qe.F)().theming.name,d=(0,l.KR)(void 0),p=(0,l.KR)([]),c=(0,l.KR)([]),u=(0,l.KR)(!1),_=(0,l.EW)({get:()=>i.value.ldapGroupFilterObjectclass.split(";").filter(e=>""!==e),set(e){i.value.ldapGroupFilterObjectclass=e.join(";")}}),g=(0,l.EW)({get:()=>i.value.ldapGroupFilterGroups.split(";").filter(e=>""!==e),set(e){i.value.ldapGroupFilterGroups=e.join(";")}});async function A(){const e=await Ze("determineGroupObjectClasses",t.configId);p.value=e.options.ldap_groupfilter_objectclass;const a=await Ze("determineGroupsForGroups",t.configId);c.value=a.options.ldap_groupfilter_groups}async function f(){const e=await Ze("getGroupFilter",t.configId);n.value[t.configId].ldapGroupFilter=e.changes.ldap_group_filter}return A(),{__sfc:!0,props:t,ldapConfigsStore:a,ldapConfigs:n,ldapConfigProxy:i,instanceName:o,groupsCountLabel:d,groupObjectClasses:p,groupGroups:c,loadingGroupCount:u,ldapGroupFilterObjectclass:_,ldapGroupFilterGroups:g,init:A,getGroupFilter:f,countGroups:async function(){try{u.value=!0;const e=await Ze("countGroups",t.configId);d.value=e.changes.ldap_group_count}finally{u.value=!1}},toggleFilterMode:async function(e){i.value.ldapGroupFilterMode=e?"1":await et()?"0":"1"},t:s.t,NcButton:Y.N,NcCheckboxRadioSwitch:q.N,NcLoadingIcon:Ae.A,NcSelect:ke.N,NcTextArea:Be.N}}});var Nt=a(49328),Pt={};Pt.styleTagTransform=At(),Pt.setAttributes=ct(),Pt.insert=dt().bind(null,"head"),Pt.domAPI=st(),Pt.insertStyleElement=_t(),lt()(Nt.A,Pt),Nt.A&&Nt.A.locals&&Nt.A.locals;const Dt=(0,Ct.A)(wt,function(){var e=this,t=e._self._c,a=e._self._setupProxy;return t("fieldset",{staticClass:"ldap-wizard__groups"},[t("legend",[e._v("\n\t\t"+e._s(a.t("user_ldap","Groups meeting these criteria are available in {instanceName}:",{instanceName:a.instanceName}))+"\n\t")]),e._v(" "),t("div",{staticClass:"ldap-wizard__groups__line ldap-wizard__groups__filter-selection"},[t(a.NcSelect,{staticClass:"ldap-wizard__groups__group-filter-groups__select",attrs:{options:a.groupObjectClasses,disabled:"1"===a.ldapConfigProxy.ldapGroupFilterMode,"input-label":a.t("user_ldap","Only these object classes:"),multiple:!0},model:{value:a.ldapGroupFilterObjectclass,callback:function(e){a.ldapGroupFilterObjectclass=e},expression:"ldapGroupFilterObjectclass"}}),e._v(" "),t(a.NcSelect,{staticClass:"ldap-wizard__groups__group-filter-groups__select",attrs:{options:a.groupGroups,disabled:"1"===a.ldapConfigProxy.ldapGroupFilterMode,"input-label":a.t("user_ldap","Only from these groups:"),multiple:!0},model:{value:a.ldapGroupFilterGroups,callback:function(e){a.ldapGroupFilterGroups=e},expression:"ldapGroupFilterGroups"}})],1),e._v(" "),t("div",{staticClass:"ldap-wizard__groups__line ldap-wizard__groups__groups-filter"},[t(a.NcCheckboxRadioSwitch,{attrs:{checked:"1"===a.ldapConfigProxy.ldapGroupFilterMode},on:{"update:checked":a.toggleFilterMode}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Edit LDAP Query"))+"\n\t\t")]),e._v(" "),"1"===a.ldapConfigProxy.ldapGroupFilterMode?t("div",[t(a.NcTextArea,{attrs:{value:a.ldapConfigProxy.ldapGroupFilter,placeholder:a.t("user_ldap","Edit LDAP Query"),"helper-text":a.t("user_ldap","The filter specifies which LDAP groups shall have access to the {instanceName} instance.",{instanceName:a.instanceName})},on:{"update:value":function(t){return e.$set(a.ldapConfigProxy,"ldapGroupFilter",t)}}})],1):t("div",[t("span",[e._v(e._s(a.t("user_ldap","LDAP Filter:")))]),e._v(" "),t("code",[e._v(e._s(a.ldapConfigProxy.ldapGroupFilter))])])],1),e._v(" "),t("div",{staticClass:"ldap-wizard__groups__line ldap-wizard__groups__groups-count-check"},[t(a.NcButton,{attrs:{disabled:a.loadingGroupCount},on:{click:a.countGroups}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Verify settings and count the groups"))+"\n\t\t")]),e._v(" "),a.loadingGroupCount?t(a.NcLoadingIcon,{attrs:{size:20}}):e._e(),e._v(" "),void 0===a.groupsCountLabel||a.loadingGroupCount?e._e():t("span",[e._v(e._s(a.groupsCountLabel))])],1)])},[],!1,null,"3200ed48",null).exports,kt=(0,l.pM)({__name:"LoginTab",props:{configId:null},setup(e){const t=e,a=at(),{ldapConfigs:n}=(0,r.bP)(a),i=(0,l.EW)(()=>a.getConfigProxy(t.configId,{ldapLoginFilterAttributes:A,ldapLoginFilterUsername:A,ldapLoginFilterEmail:A})),o=(0,qe.F)().theming.name,d=(0,l.KR)(""),p=(0,l.KR)([]),c=(0,l.EW)({get:()=>i.value.ldapLoginFilterAttributes.split(";").filter(e=>""!==e),set(e){i.value.ldapLoginFilterAttributes=e.join(";")}}),u=(0,l.EW)(()=>"1"===i.value.ldapLoginFilterMode),_=(0,l.EW)(()=>p.value.filter(e=>!c.value.includes(e)));async function g(){const e=await Ze("determineAttributes",t.configId);p.value=e.options.ldap_loginfilter_attributes}async function A(){if("0"===i.value.ldapLoginFilterMode){const e=await Ze("getUserLoginFilter",t.configId);n.value[t.configId].ldapLoginFilter=e.changes.ldap_login_filter}}return g(),{__sfc:!0,props:t,ldapConfigsStore:a,ldapConfigs:n,ldapConfigProxy:i,instanceName:o,testUsername:d,loginFilterOptions:p,ldapLoginFilterAttributes:c,ldapLoginFilterMode:u,filteredLoginFilterOptions:_,init:g,getUserLoginFilter:A,verifyLoginName:async function(){try{const e=await Ze("testLoginName",t.configId,{ldap_test_loginname:d.value}),a=e.changes.ldap_test_loginname,n=e.changes.ldap_test_effective_filter;a<1?(0,He.Qg)((0,s.t)("user_ldap","User not found. Please check your login attributes and username. Effective filter (to copy-and-paste for command-line validation): {filter}",{filter:n})):1===a?(0,He.Te)((0,s.t)("user_ldap","User found and settings verified.")):a>1&&(0,He.I9)((0,s.t)("user_ldap","Consider narrowing your search, as it encompassed many users, only the first one of whom will be able to log in."))}catch(e){switch(e??(0,s.t)("user_ldap","An unspecified error occurred. Please check log and settings.")){case"Bad search filter":(0,He.Qg)((0,s.t)("user_ldap","The search filter is invalid, probably due to syntax issues like uneven number of opened and closed brackets. Please revise."));break;case"connection error":(0,He.Qg)((0,s.t)("user_ldap","A connection error to LDAP/AD occurred. Please check host, port and credentials."));break;case"missing placeholder":(0,He.Qg)((0,s.t)("user_ldap",'The "%uid" placeholder is missing. It will be replaced with the login name when querying LDAP/AD.'))}}},toggleFilterMode:async function(e){i.value.ldapLoginFilterMode=e?"1":await et()?"0":"1"},t:s.t,NcButton:Y.N,NcCheckboxRadioSwitch:q.N,NcSelect:ke.N,NcTextArea:Be.N,NcTextField:Fe.N}}});var Ft=a(34810),Tt={};Tt.styleTagTransform=At(),Tt.setAttributes=ct(),Tt.insert=dt().bind(null,"head"),Tt.domAPI=st(),Tt.insertStyleElement=_t(),lt()(Ft.A,Tt),Ft.A&&Ft.A.locals&&Ft.A.locals;const Lt=(0,Ct.A)(kt,function(){var e=this,t=e._self._c,a=e._self._setupProxy;return t("fieldset",{staticClass:"ldap-wizard__login"},[t("legend",[e._v("\n\t\t"+e._s(a.t("user_ldap","When logging in, {instanceName} will find the user based on the following attributes:",{instanceName:a.instanceName}))+"\n\t")]),e._v(" "),t("div",{staticClass:"ldap-wizard__login__line ldap-wizard__login__login-attributes"},[t(a.NcSelect,{attrs:{"keep-open":"",disabled:a.ldapLoginFilterMode,options:a.filteredLoginFilterOptions,"input-label":a.t("user_ldap","Other Attributes:"),multiple:!0},model:{value:a.ldapLoginFilterAttributes,callback:function(e){a.ldapLoginFilterAttributes=e},expression:"ldapLoginFilterAttributes"}})],1),e._v(" "),t("div",{staticClass:"ldap-wizard__login__line ldap-wizard__login__user-login-filter"},[t(a.NcCheckboxRadioSwitch,{attrs:{"model-value":a.ldapLoginFilterMode},on:{"update:checked":a.toggleFilterMode}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Edit LDAP Query"))+"\n\t\t")]),e._v(" "),a.ldapLoginFilterMode?t(a.NcTextArea,{attrs:{value:a.ldapConfigProxy.ldapLoginFilter,placeholder:a.t("user_ldap","Edit LDAP Query"),"helper-text":a.t("user_ldap","Defines the filter to apply, when login is attempted. `%%uid` replaces the username in the login action. Example: `uid=%%uid`")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapLoginFilter=e.target.value).apply(null,arguments)}}}):t("div",[t("span",[e._v(e._s(a.t("user_ldap","LDAP Filter:")))]),e._v(" "),t("code",[e._v(e._s(a.ldapConfigProxy.ldapLoginFilter))])])],1),e._v(" "),t("div",{staticClass:"ldap-wizard__login__line"},[t(a.NcTextField,{attrs:{"helper-text":a.t("user_ldap","Attempts to receive a DN for the given login name and the current login filter"),placeholder:a.t("user_ldap","Test Login name"),autocomplete:"off"},model:{value:a.testUsername,callback:function(e){a.testUsername=e},expression:"testUsername"}}),e._v(" "),t(a.NcButton,{attrs:{disabled:0===a.testUsername.length},on:{click:a.verifyLoginName}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Verify settings"))+"\n\t\t")])],1)])},[],!1,null,"4b9d7382",null).exports;var zt=a(31773);const It={name:"DeleteIcon",emits:["click"],props:{title:{type:String},fillColor:{type:String,default:"currentColor"},size:{type:Number,default:24}}},St=(0,Ct.A)(It,function(){var e=this,t=e._self._c;return t("span",e._b({staticClass:"material-design-icon delete-icon",attrs:{"aria-hidden":e.title?null:"true","aria-label":e.title,role:"img"},on:{click:function(t){return e.$emit("click",t)}}},"span",e.$attrs,!1),[t("svg",{staticClass:"material-design-icon__svg",attrs:{fill:e.fillColor,width:e.size,height:e.size,viewBox:"0 0 24 24"}},[t("path",{attrs:{d:"M19,4H15.5L14.5,3H9.5L8.5,4H5V6H19M6,19A2,2 0 0,0 8,21H16A2,2 0 0,0 18,19V7H6V19Z"}},[e.title?t("title",[e._v(e._s(e.title))]):e._e()])])])},[],!1,null,null,null).exports,Ut=(0,l.pM)({__name:"ServerTab",props:{configId:null},setup(e){const t=e,a=at(),{ldapConfigs:n}=(0,r.bP)(a),i=(0,l.EW)(()=>a.getConfigProxy(t.configId)),o=(0,l.KR)(!1),d=(0,l.KR)(!1),p=(0,l.KR)(!1),c=(0,l.KR)(i.value.ldapAgentName),u=(0,l.KR)(i.value.ldapAgentPassword),_=(0,l.EW)(()=>i.value.ldapAgentName!==c.value||i.value.ldapAgentPassword!==u.value);return{__sfc:!0,props:t,ldapConfigsStore:a,ldapConfigs:n,ldapConfigProxy:i,loadingGuessPortAndTLS:o,loadingCountInBaseDN:d,loadingGuessBaseDN:p,localLdapAgentName:c,localLdapAgentPassword:u,needsToSaveCredentials:_,updateCredentials:function(){i.value.ldapAgentName=c.value,i.value.ldapAgentPassword=u.value},guessPortAndTLS:async function(){try{o.value=!0;const{changes:e}=await Ze("guessPortAndTLS",t.configId);n.value[t.configId].ldapPort=e.ldap_port??""}finally{o.value=!1}},guessBaseDN:async function(){try{p.value=!0;const{changes:e}=await Ze("guessBaseDN",t.configId);n.value[t.configId].ldapBase=e.ldap_base??""}finally{p.value=!1}},countInBaseDN:async function(){try{d.value=!0;const{changes:e}=await Ze("countInBaseDN",t.configId),a=e.ldap_test_base;a<1?(0,He.cf)((0,s.t)("user_ldap","No object found in the given Base DN. Please revise.")):a>1e3?(0,He.cf)((0,s.t)("user_ldap","More than 1,000 directory entries available.")):(0,He.cf)((0,s.n)("user_ldap","{ldapTestBase} entry available within the provided Base DN","{ldapTestBase} entries available within the provided Base DN",a,{ldapTestBase:a}))}finally{d.value=!1}},t:s.t,NcButton:Y.N,NcCheckboxRadioSwitch:q.N,NcTextArea:Be.N,NcTextField:Fe.N,ContentCopy:zt.A,Delete:St}}});var Bt=a(25706),Ot={};Ot.styleTagTransform=At(),Ot.setAttributes=ct(),Ot.insert=dt().bind(null,"head"),Ot.domAPI=st(),Ot.insertStyleElement=_t(),lt()(Bt.A,Ot),Bt.A&&Bt.A.locals&&Bt.A.locals;const Gt=(0,Ct.A)(Ut,function(){var e=this,t=e._self._c,a=e._self._setupProxy;return t("fieldset",{staticClass:"ldap-wizard__server"},[t("div",{staticClass:"ldap-wizard__server__line"},[t(a.NcCheckboxRadioSwitch,{attrs:{checked:"1"===a.ldapConfigProxy.ldapConfigurationActive,type:"switch","aria-label":a.t("user_ldap","When unchecked, this configuration will be skipped.")},on:{"update:checked":function(e){a.ldapConfigProxy.ldapConfigurationActive=e?"1":"0"}}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Configuration Active"))+"\n\t\t")]),e._v(" "),t(a.NcButton,{attrs:{title:a.t("user_ldap","Copy current configuration into new directory binding")},on:{click:function(t){return a.ldapConfigsStore.copyConfig(e.configId)}},scopedSlots:e._u([{key:"icon",fn:function(){return[t(a.ContentCopy,{attrs:{size:20}})]},proxy:!0}])},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Copy configuration"))+"\n\t\t")]),e._v(" "),t(a.NcButton,{attrs:{variant:"error"},on:{click:function(t){return a.ldapConfigsStore.removeConfig(e.configId)}},scopedSlots:e._u([{key:"icon",fn:function(){return[t(a.Delete,{attrs:{size:20}})]},proxy:!0}])},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Delete configuration"))+"\n\t\t")])],1),e._v(" "),t("div",{staticClass:"ldap-wizard__server__line"},[t(a.NcTextField,{attrs:{value:a.ldapConfigProxy.ldapHost,"helper-text":a.t("user_ldap","You can omit the protocol, unless you require SSL. If so, start with ldaps://"),placeholder:a.t("user_ldap","Host"),autocomplete:"off"},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapHost=e.target.value).apply(null,arguments)}}}),e._v(" "),t("div",{staticClass:"ldap-wizard__server__host__port"},[t(a.NcTextField,{attrs:{value:a.ldapConfigProxy.ldapPort,placeholder:a.t("user_ldap","Port"),type:"number",autocomplete:"off"},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapPort=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcButton,{attrs:{disabled:a.loadingGuessPortAndTLS},on:{click:a.guessPortAndTLS}},[e._v("\n\t\t\t\t"+e._s(a.t("user_ldap","Detect Port"))+"\n\t\t\t")])],1)],1),e._v(" "),t("div",{staticClass:"ldap-wizard__server__line"},[t(a.NcTextField,{attrs:{"helper-text":a.t("user_ldap","The DN of the client user with which the bind shall be done, e.g. uid=agent,dc=example,dc=com. For anonymous access, leave DN and Password empty."),placeholder:a.t("user_ldap","User DN"),autocomplete:"off"},model:{value:a.localLdapAgentName,callback:function(e){a.localLdapAgentName=e},expression:"localLdapAgentName"}})],1),e._v(" "),t("div",{staticClass:"ldap-wizard__server__line"},[t(a.NcTextField,{attrs:{type:"password","helper-text":a.t("user_ldap","For anonymous access, leave DN and Password empty."),placeholder:a.t("user_ldap","Password"),autocomplete:"off"},model:{value:a.localLdapAgentPassword,callback:function(e){a.localLdapAgentPassword=e},expression:"localLdapAgentPassword"}}),e._v(" "),t(a.NcButton,{attrs:{disabled:!a.needsToSaveCredentials},on:{click:a.updateCredentials}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Save Credentials"))+"\n\t\t")])],1),e._v(" "),t("div",{staticClass:"ldap-wizard__server__line"},[t(a.NcTextArea,{attrs:{label:a.t("user_ldap","Base DN"),value:a.ldapConfigProxy.ldapBase,placeholder:a.t("user_ldap","One Base DN per line"),"helper-text":a.t("user_ldap","You can specify Base DN for users and groups in the Advanced tab")},nativeOn:{change:function(e){return(e=>a.ldapConfigProxy.ldapBase=e.target.value).apply(null,arguments)}}}),e._v(" "),t(a.NcButton,{attrs:{disabled:a.loadingGuessBaseDN},on:{click:a.guessBaseDN}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Detect Base DN"))+"\n\t\t")]),e._v(" "),t(a.NcButton,{attrs:{disabled:a.loadingCountInBaseDN},on:{click:a.countInBaseDN}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Test Base DN"))+"\n\t\t")])],1)])},[],!1,null,"d79b8f6a",null).exports,Et=(0,l.pM)({__name:"UsersTab",props:{configId:null},setup(e){const t=e,a=at(),{ldapConfigs:n}=(0,r.bP)(a),i=(0,l.EW)(()=>a.getConfigProxy(t.configId,{ldapUserFilterObjectclass:f,ldapUserFilterGroups:f})),o=(0,l.KR)(void 0),d=(0,l.KR)(!1),p=(0,qe.F)().theming.name,c=(0,l.KR)([]),u=(0,l.KR)([]),_=(0,l.EW)({get:()=>i.value.ldapUserFilterObjectclass?.split(";").filter(e=>""!==e)??[],set(e){i.value.ldapUserFilterObjectclass=e.join(";")}}),g=(0,l.EW)({get:()=>i.value.ldapUserFilterGroups.split(";").filter(e=>""!==e),set(e){i.value.ldapUserFilterGroups=e.join(";")}});async function A(){const e=await Ze("determineUserObjectClasses",t.configId);c.value=e.options.ldap_userfilter_objectclass,n.value[t.configId].ldapUserFilterObjectclass=e.changes.ldap_userfilter_objectclass?.join(";")??"";const a=await Ze("determineGroupsForUsers",t.configId);u.value=a.options.ldap_userfilter_groups,n.value[t.configId].ldapUserFilterGroups=a.changes.ldap_userfilter_groups?.join(";")??""}async function f(){if("0"===i.value.ldapUserFilterMode){const e=await Ze("getUserListFilter",t.configId);n.value[t.configId].ldapUserFilter=e.changes.ldap_userlist_filter;const a=await Ze("getUserLoginFilter",t.configId);n.value[t.configId].ldapLoginFilter=a.changes.ldap_userlogin_filter}}return A(),{__sfc:!0,props:t,ldapConfigsStore:a,ldapConfigs:n,ldapConfigProxy:i,usersCount:o,loadingUserCount:d,instanceName:p,userObjectClasses:c,userGroups:u,ldapUserFilterObjectclass:_,ldapUserFilterGroups:g,init:A,reloadFilters:f,countUsers:async function(){try{d.value=!0;const e=await Ze("countUsers",t.configId);o.value=e.changes.ldap_user_count}finally{d.value=!1}},toggleFilterMode:async function(e){i.value.ldapUserFilterMode=e?"1":await et()?"0":"1"},t:s.t,NcButton:Y.N,NcCheckboxRadioSwitch:q.N,NcLoadingIcon:Ae.A,NcSelect:ke.N,NcTextArea:Be.N}}});var Mt=a(23441),jt={};jt.styleTagTransform=At(),jt.setAttributes=ct(),jt.insert=dt().bind(null,"head"),jt.domAPI=st(),jt.insertStyleElement=_t(),lt()(Mt.A,jt),Mt.A&&Mt.A.locals&&Mt.A.locals;const Rt=(0,Ct.A)(Et,function(){var e=this,t=e._self._c,a=e._self._setupProxy;return t("fieldset",{staticClass:"ldap-wizard__users"},[e._v("\n\t"+e._s(a.t("user_ldap","Listing and searching for users is constrained by these criteria:"))+"\n\n\t"),t("div",{staticClass:"ldap-wizard__users__line ldap-wizard__users__user-filter-object-class"},[t(a.NcSelect,{staticClass:"ldap-wizard__users__user-filter-object-class__select",attrs:{disabled:"1"===a.ldapConfigProxy.ldapUserFilterMode,options:a.userObjectClasses,"input-label":a.t("user_ldap","Only these object classes:"),multiple:!0},model:{value:a.ldapUserFilterObjectclass,callback:function(e){a.ldapUserFilterObjectclass=e},expression:"ldapUserFilterObjectclass"}}),e._v("\n\t\t"+e._s(a.t("user_ldap","The most common object classes for users are organizationalPerson, person, user, and inetOrgPerson. If you are not sure which object class to select, please consult your directory admin."))+"\n\t")],1),e._v(" "),t("div",{staticClass:"ldap-wizard__users__line ldap-wizard__users__user-filter-groups"},[t(a.NcSelect,{staticClass:"ldap-wizard__users__user-filter-groups__select",attrs:{disabled:"1"===a.ldapConfigProxy.ldapUserFilterMode,options:a.userGroups,"input-label":a.t("user_ldap","Only from these groups:"),multiple:!0},model:{value:a.ldapUserFilterGroups,callback:function(e){a.ldapUserFilterGroups=e},expression:"ldapUserFilterGroups"}})],1),e._v(" "),t("div",{staticClass:"ldap-wizard__users__line ldap-wizard__users__user-filter"},[t(a.NcCheckboxRadioSwitch,{attrs:{checked:"1"===a.ldapConfigProxy.ldapUserFilterMode},on:{"update:checked":a.toggleFilterMode}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Edit LDAP Query"))+"\n\t\t")]),e._v(" "),"1"===a.ldapConfigProxy.ldapUserFilterMode?t("div",[t(a.NcTextArea,{attrs:{value:a.ldapConfigProxy.ldapUserFilter,placeholder:a.t("user_ldap","Edit LDAP Query"),"helper-text":a.t("user_ldap","The filter specifies which LDAP users shall have access to the {instanceName} instance.",{instanceName:a.instanceName})},on:{"update:value":function(t){return e.$set(a.ldapConfigProxy,"ldapUserFilter",t)}}})],1):t("div",[t("label",[e._v(e._s(a.t("user_ldap","LDAP Filter:")))]),e._v(" "),t("code",[e._v(e._s(a.ldapConfigProxy.ldapUserFilter))])])],1),e._v(" "),t("div",{staticClass:"ldap-wizard__users__line ldap-wizard__users__user-count-check"},[t(a.NcButton,{attrs:{disabled:a.loadingUserCount},on:{click:a.countUsers}},[e._v("\n\t\t\t"+e._s(a.t("user_ldap","Verify settings and count users"))+"\n\t\t")]),e._v(" "),a.loadingUserCount?t(a.NcLoadingIcon,{attrs:{size:16}}):e._e(),e._v(" "),void 0===a.usersCount||a.loadingUserCount?e._e():t("span",[e._v(e._s(a.t("user_ldap","User count: {usersCount}",{usersCount:a.usersCount},{escape:!1})))])],1)])},[],!1,null,"47c76aa2",null).exports,Wt=(0,l.pM)({__name:"WizardControls",props:{configId:null},setup(e){const t=e,a=at(),{updatingConfig:n}=(0,r.bP)(a),i=(0,l.KR)(!1),o=(0,l.KR)(null),d=(0,l.EW)(()=>"success"===o.value?.status);return(0,l.wB)(n,()=>{o.value=null}),{__sfc:!0,props:t,ldapConfigsStore:a,updatingConfig:n,loading:i,result:o,isValide:d,testSelectedConfig:async function(){try{i.value=!0,o.value=await async function(e){const t=new FormData;t.set("ldap_serverconfig_chooser",e);const a=await Pe.Ay.post(Ve().join(Je,"testConfiguration.php"),t);return Xe.debug("Configuration is "+("success"===a.data.status?"valide":"invalide"),{configId:e,params:t,response:a}),a.data}(t.configId)}finally{i.value=!1}},t:s.t,NcButton:Y.N,NcLoadingIcon:Ae.A,Information:zt.A}}});var Qt=a(51214),Yt={};Yt.styleTagTransform=At(),Yt.setAttributes=ct(),Yt.insert=dt().bind(null,"head"),Yt.domAPI=st(),Yt.insertStyleElement=_t(),lt()(Qt.A,Yt),Qt.A&&Qt.A.locals&&Qt.A.locals;const qt=(0,Ct.A)(Wt,function(){var e=this,t=e._self._c,a=e._self._setupProxy;return t("div",{staticClass:"ldap-wizard__controls"},[t(a.NcButton,{attrs:{variant:"primary",disabled:a.loading},on:{click:a.testSelectedConfig}},[e._v("\n\t\t"+e._s(a.t("user_ldap","Test Configuration"))+"\n\t")]),e._v(" "),t(a.NcButton,{attrs:{variant:"tertiary",href:"https://docs.nextcloud.com/server/stable/go.php?to=admin-ldap",target:"_blank",rel:"noreferrer noopener"},scopedSlots:e._u([{key:"icon",fn:function(){return[t(a.Information,{attrs:{size:20}})]},proxy:!0}])},[e._v(" "),t("span",[e._v(e._s(a.t("user_ldap","Help")))])]),e._v(" "),null===a.result||a.loading?e._e():[t("span",{staticClass:"ldap-wizard__controls__state_indicator",class:{"ldap-wizard__controls__state_indicator--valid":a.isValide}}),e._v(" "),t("span",{staticClass:"ldap-wizard__controls__state_message"},[e._v("\n\t\t\t"+e._s(a.result.message)+"\n\t\t")])],e._v(" "),a.loading?t(a.NcLoadingIcon,{attrs:{size:16}}):e._e()],2)},[],!1,null,"d316db68",null).exports,Ht=(0,l.pM)({__name:"Settings",setup(e){const t=(0,i.C)("user_ldap","ldapModuleInstalled"),a={server:(0,s.t)("user_ldap","Server"),users:(0,s.t)("user_ldap","Users"),login:(0,s.t)("user_ldap","Login Attributes"),groups:(0,s.t)("user_ldap","Groups"),advanced:(0,s.t)("user_ldap","Advanced"),expert:(0,s.t)("user_ldap","Expert")},n=at(),{ldapConfigs:o,selectedConfigId:d,selectedConfig:p}=(0,r.bP)(n),c=(0,l.KR)("server"),u=(0,l.KR)(!1),_=(0,l.EW)(()=>""!==p.value.ldapHost&&""!==p.value.ldapPort&&""!==p.value.ldapBase&&""!==p.value.ldapAgentName&&""!==p.value.ldapAgentPassword);return{__sfc:!0,ldapModuleInstalled:t,tabs:a,ldapConfigsStore:n,ldapConfigs:o,selectedConfigId:d,selectedConfig:p,selectedTab:c,clearMappingLoading:u,selectedConfigHasServerInfo:_,requestClearMapping:async function(e){try{u.value=!0,await async function(e){if(!await tt((0,s.t)("user_ldap","Confirm action"),(0,s.t)("user_ldap","Are you sure you want to permanently clear the LDAP mapping? This cannot be undone.")))return!1;const t=new FormData;t.set("ldap_clear_mapping",e);const a=await Pe.Ay.post(Ve().join(Je,"clearMappings.php"),t);"success"===a.data.status?(Xe.debug("Cleared mapping",{subject:e,params:t,response:a}),(0,He.Te)((0,s.t)("user_ldap","Mapping cleared"))):(0,He.Qg)((0,s.t)("user_ldap","Failed to clear mapping"))}(e)}finally{u.value=!1}},t:s.t,NcButton:Y.N,NcCheckboxRadioSwitch:q.N,NcNoteCard:ve.A,NcSelect:ke.N,Plus:Ye.A,AdvancedTab:ht,ExpertTab:yt,GroupsTab:Dt,LoginTab:Lt,ServerTab:Gt,UsersTab:Rt,WizardControls:qt}}});var Kt=a(87932),$t={};$t.styleTagTransform=At(),$t.setAttributes=ct(),$t.insert=dt().bind(null,"head"),$t.domAPI=st(),$t.insertStyleElement=_t(),lt()(Kt.A,$t),Kt.A&&Kt.A.locals&&Kt.A.locals;const Vt=(0,Ct.A)(Ht,function(){var e=this,t=e._self._c,a=e._self._setupProxy;return t("form",{staticClass:"ldap-wizard"},[t("h2",[e._v(e._s(a.t("user_ldap","LDAP/AD integration")))]),e._v(" "),a.ldapModuleInstalled?e._e():t(a.NcNoteCard,{attrs:{type:"warning",text:a.t("user_ldap","The PHP LDAP module is not installed, the backend will not work. Please ask your system administrator to install it.")}}),e._v(" "),a.ldapModuleInstalled?[t("div",{staticClass:"ldap-wizard__config-selection"},[void 0!==a.selectedConfigId?t(a.NcSelect,{attrs:{options:Object.keys(a.ldapConfigs),"input-label":a.t("user_ldap","Select LDAP Config")},scopedSlots:e._u([{key:"option",fn:function(t){let{label:n}=t;return[e._v("\n\t\t\t\t\t"+e._s(`${n}: ${a.ldapConfigs[n].ldapHost}`)+"\n\t\t\t\t")]}},{key:"selected-option",fn:function(t){let{label:n}=t;return[e._v("\n\t\t\t\t\t"+e._s(`${n}: ${a.ldapConfigs[n].ldapHost}`)+"\n\t\t\t\t")]}}],null,!1,2170402317),model:{value:a.selectedConfigId,callback:function(e){a.selectedConfigId=e},expression:"selectedConfigId"}}):e._e(),e._v(" "),t(a.NcButton,{staticClass:"ldap-wizard__config-selection__create-button",attrs:{label:a.t("user_ldap","Create New Config")},on:{click:a.ldapConfigsStore.create},scopedSlots:e._u([{key:"icon",fn:function(){return[t(a.Plus,{attrs:{size:20}})]},proxy:!0}],null,!1,1086138354)},[e._v("\n\t\t\t\t"+e._s(a.t("user_ldap","Create configuration"))+"\n\t\t\t")])],1),e._v(" "),void 0!==a.selectedConfigId?t("div",{staticClass:"ldap-wizard__tab-container"},[t("div",{staticClass:"ldap-wizard__tab-selection-container"},[t("div",{staticClass:"ldap-wizard__tab-selection"},e._l(a.tabs,function(n,r){return t(a.NcCheckboxRadioSwitch,{key:r,attrs:{"button-variant":!0,checked:a.selectedTab,value:r,type:"radio",disabled:"server"!==r&&!a.selectedConfigHasServerInfo,"button-variant-grouped":"horizontal"},on:{"update:checked":function(e){a.selectedTab=e}}},[e._v("\n\t\t\t\t\t\t"+e._s(n)+"\n\t\t\t\t\t")])}),1)]),e._v(" "),"server"===a.selectedTab?t(a.ServerTab,{attrs:{"config-id":a.selectedConfigId}}):"users"===a.selectedTab?t(a.UsersTab,{attrs:{"config-id":a.selectedConfigId}}):"login"===a.selectedTab?t(a.LoginTab,{attrs:{"config-id":a.selectedConfigId}}):"groups"===a.selectedTab?t(a.GroupsTab,{attrs:{"config-id":a.selectedConfigId}}):"expert"===a.selectedTab?t(a.ExpertTab,{attrs:{"config-id":a.selectedConfigId}}):"advanced"===a.selectedTab?t(a.AdvancedTab,{attrs:{"config-id":a.selectedConfigId}}):e._e(),e._v(" "),t(a.WizardControls,{staticClass:"ldap-wizard__controls",attrs:{"config-id":a.selectedConfigId}})],1):e._e(),e._v(" "),t("div",{staticClass:"ldap-wizard__clear-mapping"},[t("strong",[e._v(e._s(a.t("user_ldap","Username-LDAP User Mapping")))]),e._v("\n\t\t\t"+e._s(a.t("user_ldap","Usernames are used to store and assign metadata. In order to precisely identify and recognize users, each LDAP user will have an internal username. This requires a mapping from username to LDAP user. The created username is mapped to the UUID of the LDAP user. Additionally the DN is cached as well to reduce LDAP interaction, but it is not used for identification. If the DN changes, the changes will be found. The internal username is used all over. Clearing the mappings will have leftovers everywhere. Clearing the mappings is not configuration sensitive, it affects all LDAP configurations! Never clear the mappings in a production environment, only in a testing or experimental stage."))+"\n\n\t\t\t"),t("div",{staticClass:"ldap-wizard__clear-mapping__buttons"},[t(a.NcButton,{attrs:{variant:"error",disabled:a.clearMappingLoading},on:{click:function(e){return a.requestClearMapping("user")}}},[e._v("\n\t\t\t\t\t"+e._s(a.t("user_ldap","Clear Username-LDAP User Mapping"))+"\n\t\t\t\t")]),e._v(" "),t(a.NcButton,{attrs:{variant:"error",disabled:a.clearMappingLoading},on:{click:function(e){return a.requestClearMapping("group")}}},[e._v("\n\t\t\t\t\t"+e._s(a.t("user_ldap","Clear Groupname-LDAP Group Mapping"))+"\n\t\t\t\t")])],1)])]:e._e()],2)},[],!1,null,"51715f32",null).exports,Xt=(0,l.pM)({__name:"LDAPSettingsApp",setup:e=>({__sfc:!0,Settings:Vt})}),Jt=(0,Ct.A)(Xt,function(){return(0,this._self._c)(this._self._setupProxy.Settings)},[],!1,null,null,null).exports,Zt=(0,r.Ey)();a.nc=(0,n.aV)(),l.Ay.use(r.R2),new(l.Ay.extend(Jt))({name:"LDAPSettingsApp",pinia:Zt}).$mount("#content-ldap-settings")},23441:(e,t,a)=>{a.d(t,{A:()=>s});var n=a(71354),r=a.n(n),l=a(76314),i=a.n(l)()(r());i.push([e.id,".ldap-wizard__users[data-v-47c76aa2]{display:flex;flex-direction:column;gap:16px}.ldap-wizard__users__line[data-v-47c76aa2]{display:flex;align-items:start}.ldap-wizard__users__user-filter-object-class[data-v-47c76aa2]{display:flex;gap:16px}.ldap-wizard__users__user-filter-object-class__select[data-v-47c76aa2]{min-width:50%;flex-grow:1}.ldap-wizard__users__user-filter-groups[data-v-47c76aa2]{display:flex;gap:16px}.ldap-wizard__users__user-filter[data-v-47c76aa2]{display:flex;flex-direction:column}.ldap-wizard__users__user-filter code[data-v-47c76aa2]{background-color:var(--color-background-dark);padding:4px;border-radius:4px}.ldap-wizard__users__user-count-check[data-v-47c76aa2]{display:flex;align-items:center;gap:16px}","",{version:3,sources:["webpack://./apps/user_ldap/src/components/SettingsTabs/UsersTab.vue"],names:[],mappings:"AACA,qCACC,YAAA,CACA,qBAAA,CACA,QAAA,CAEA,2CACC,YAAA,CACA,iBAAA,CAGD,+DACC,YAAA,CACA,QAAA,CAEA,uEACC,aAAA,CACA,WAAA,CAIF,yDACC,YAAA,CACA,QAAA,CAGD,kDACC,YAAA,CACA,qBAAA,CAEA,uDACC,6CAAA,CACA,WAAA,CACA,iBAAA,CAIF,uDACC,YAAA,CACA,kBAAA,CACA,QAAA",sourcesContent:["\n.ldap-wizard__users {\n\tdisplay: flex;\n\tflex-direction: column;\n\tgap: 16px;\n\n\t&__line {\n\t\tdisplay: flex;\n\t\talign-items: start;\n\t}\n\n\t&__user-filter-object-class {\n\t\tdisplay: flex;\n\t\tgap: 16px;\n\n\t\t&__select {\n\t\t\tmin-width: 50%;\n\t\t\tflex-grow: 1;\n\t\t}\n\t}\n\n\t&__user-filter-groups {\n\t\tdisplay: flex;\n\t\tgap: 16px;\n\t}\n\n\t&__user-filter {\n\t\tdisplay: flex;\n\t\tflex-direction: column;\n\n\t\tcode {\n\t\t\tbackground-color: var(--color-background-dark);\n\t\t\tpadding: 4px;\n\t\t\tborder-radius: 4px;\n\t\t}\n\t}\n\n\t&__user-count-check {\n\t\tdisplay: flex;\n\t\talign-items: center;\n\t\tgap: 16px;\n\t}\n}\n"],sourceRoot:""}]);const s=i},25706:(e,t,a)=>{a.d(t,{A:()=>s});var n=a(71354),r=a.n(n),l=a(76314),i=a.n(l)()(r());i.push([e.id,".ldap-wizard__server[data-v-d79b8f6a]{display:flex;flex-direction:column;gap:16px}.ldap-wizard__server button[data-v-d79b8f6a]{flex-shrink:0}.ldap-wizard__server__line[data-v-d79b8f6a]{display:flex;align-items:start;gap:16px}.ldap-wizard__server__host__port[data-v-d79b8f6a]{display:flex;align-items:center;flex-shrink:0;gap:16px}","",{version:3,sources:["webpack://./apps/user_ldap/src/components/SettingsTabs/ServerTab.vue"],names:[],mappings:"AACA,sCACC,YAAA,CACA,qBAAA,CACA,QAAA,CAEA,6CACC,aAAA,CAGD,4CACC,YAAA,CACA,iBAAA,CACA,QAAA,CAGD,kDACC,YAAA,CACA,kBAAA,CACA,aAAA,CACA,QAAA",sourcesContent:["\n.ldap-wizard__server {\n\tdisplay: flex;\n\tflex-direction: column;\n\tgap: 16px;\n\n\tbutton {\n\t\tflex-shrink: 0;\n\t}\n\n\t&__line {\n\t\tdisplay: flex;\n\t\talign-items: start;\n\t\tgap: 16px;\n\t}\n\n\t&__host__port {\n\t\tdisplay: flex;\n\t\talign-items: center;\n\t\tflex-shrink: 0;\n\t\tgap: 16px;\n\t}\n}\n"],sourceRoot:""}]);const s=i},27514:e=>{e.exports="data:image/svg+xml,%3c%21--%20-%20SPDX-FileCopyrightText:%202020%20Google%20Inc.%20-%20SPDX-License-Identifier:%20Apache-2.0%20--%3e%3csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width=%2724%27%20height=%2724%27%20fill=%27%23222%27%3e%3cpath%20d=%27M18.4%207.4L17%206l-6%206%206%206%201.4-1.4-4.6-4.6%204.6-4.6m-6%200L11%206l-6%206%206%206%201.4-1.4L7.8%2012l4.6-4.6z%27/%3e%3c/svg%3e"},27518:e=>{e.exports="data:image/svg+xml,%3c%21--%20-%20SPDX-FileCopyrightText:%202020%20Google%20Inc.%20-%20SPDX-License-Identifier:%20Apache-2.0%20--%3e%3csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width=%2724%27%20height=%2724%27%20fill=%27%23222%27%3e%3cpath%20d=%27M15.4%2016.6L10.8%2012l4.6-4.6L14%206l-6%206%206%206%201.4-1.4z%27/%3e%3c/svg%3e"},28953:(e,t,a)=>{a.d(t,{A:()=>s});var n=a(71354),r=a.n(n),l=a(76314),i=a.n(l)()(r());i.push([e.id,".ldap-wizard__expert[data-v-1b8d07c0]{display:flex;flex-direction:column;gap:16px}.ldap-wizard__expert__line[data-v-1b8d07c0]{display:flex;flex-direction:column;padding-inline-start:32px;gap:4px}","",{version:3,sources:["webpack://./apps/user_ldap/src/components/SettingsTabs/ExpertTab.vue"],names:[],mappings:"AACA,sCACC,YAAA,CACA,qBAAA,CACA,QAAA,CAEA,4CACC,YAAA,CACA,qBAAA,CACA,yBAAA,CACA,OAAA",sourcesContent:["\n.ldap-wizard__expert {\n\tdisplay: flex;\n\tflex-direction: column;\n\tgap: 16px;\n\n\t&__line {\n\t\tdisplay: flex;\n\t\tflex-direction: column;\n\t\tpadding-inline-start: 32px;\n\t\tgap: 4px;\n\t}\n}\n"],sourceRoot:""}]);const s=i},34810:(e,t,a)=>{a.d(t,{A:()=>s});var n=a(71354),r=a.n(n),l=a(76314),i=a.n(l)()(r());i.push([e.id,".ldap-wizard__login[data-v-4b9d7382]{display:flex;flex-direction:column;gap:16px}.ldap-wizard__login button[data-v-4b9d7382]{flex-shrink:0}.ldap-wizard__login__line[data-v-4b9d7382]{display:flex;align-items:start;gap:8px}.ldap-wizard__login__login-attributes[data-v-4b9d7382]{display:flex;flex-direction:column}.ldap-wizard__login__user-login-filter[data-v-4b9d7382]{display:flex;flex-direction:column}.ldap-wizard__login__user-login-filter code[data-v-4b9d7382]{background-color:var(--color-background-dark);padding:4px;border-radius:4px}","",{version:3,sources:["webpack://./apps/user_ldap/src/components/SettingsTabs/LoginTab.vue"],names:[],mappings:"AACA,qCACC,YAAA,CACA,qBAAA,CACA,QAAA,CAEA,4CACC,aAAA,CAGD,2CACC,YAAA,CACA,iBAAA,CACA,OAAA,CAGD,uDACC,YAAA,CACA,qBAAA,CAGD,wDACC,YAAA,CACA,qBAAA,CAEA,6DACC,6CAAA,CACA,WAAA,CACA,iBAAA",sourcesContent:["\n.ldap-wizard__login {\n\tdisplay: flex;\n\tflex-direction: column;\n\tgap: 16px;\n\n\tbutton {\n\t\tflex-shrink: 0;\n\t}\n\n\t&__line {\n\t\tdisplay: flex;\n\t\talign-items: start;\n\t\tgap: 8px;\n\t}\n\n\t&__login-attributes {\n\t\tdisplay: flex;\n\t\tflex-direction: column;\n\t}\n\n\t&__user-login-filter {\n\t\tdisplay: flex;\n\t\tflex-direction: column;\n\n\t\tcode {\n\t\t\tbackground-color: var(--color-background-dark);\n\t\t\tpadding: 4px;\n\t\t\tborder-radius: 4px;\n\t\t}\n\t}\n}\n"],sourceRoot:""}]);const s=i},49328:(e,t,a)=>{a.d(t,{A:()=>s});var n=a(71354),r=a.n(n),l=a(76314),i=a.n(l)()(r());i.push([e.id,".ldap-wizard__groups[data-v-3200ed48]{display:flex;flex-direction:column;gap:16px}.ldap-wizard__groups__line[data-v-3200ed48]{display:flex;align-items:start}.ldap-wizard__groups__filter-selection[data-v-3200ed48]{flex-direction:column}.ldap-wizard__groups__groups-filter[data-v-3200ed48]{display:flex;flex-direction:column}.ldap-wizard__groups__groups-filter code[data-v-3200ed48]{background-color:var(--color-background-dark);padding:4px;border-radius:4px}.ldap-wizard__groups__groups-count-check[data-v-3200ed48]{display:flex;align-items:center;gap:16px}","",{version:3,sources:["webpack://./apps/user_ldap/src/components/SettingsTabs/GroupsTab.vue"],names:[],mappings:"AACA,sCACC,YAAA,CACA,qBAAA,CACA,QAAA,CAEA,4CACC,YAAA,CACA,iBAAA,CAGD,wDACC,qBAAA,CAGD,qDACC,YAAA,CACA,qBAAA,CAEA,0DACC,6CAAA,CACA,WAAA,CACA,iBAAA,CAIF,0DACC,YAAA,CACA,kBAAA,CACA,QAAA",sourcesContent:["\n.ldap-wizard__groups {\n\tdisplay: flex;\n\tflex-direction: column;\n\tgap: 16px;\n\n\t&__line {\n\t\tdisplay: flex;\n\t\talign-items: start;\n\t}\n\n\t&__filter-selection {\n\t\tflex-direction: column;\n\t}\n\n\t&__groups-filter {\n\t\tdisplay: flex;\n\t\tflex-direction: column;\n\n\t\tcode {\n\t\t\tbackground-color: var(--color-background-dark);\n\t\t\tpadding: 4px;\n\t\t\tborder-radius: 4px;\n\t\t}\n\t}\n\n\t&__groups-count-check {\n\t\tdisplay: flex;\n\t\talign-items: center;\n\t\tgap: 16px;\n\t}\n}\n"],sourceRoot:""}]);const s=i},51214:(e,t,a)=>{a.d(t,{A:()=>s});var n=a(71354),r=a.n(n),l=a(76314),i=a.n(l)()(r());i.push([e.id,".ldap-wizard__controls[data-v-d316db68]{display:flex;gap:16px;align-items:center;min-height:45px}.ldap-wizard__controls>*[data-v-d316db68]{flex-shrink:0}.ldap-wizard__controls__state_message[data-v-d316db68]{flex-shrink:1}.ldap-wizard__controls__state_indicator[data-v-d316db68]{width:16px;height:16px;border-radius:100%;background-color:var(--color-element-error)}.ldap-wizard__controls__state_indicator--valid[data-v-d316db68]{background-color:var(--color-element-success)}","",{version:3,sources:["webpack://./apps/user_ldap/src/components/WizardControls.vue"],names:[],mappings:"AACA,wCACC,YAAA,CACA,QAAA,CACA,kBAAA,CACA,eAAA,CAEA,0CACC,aAAA,CAGD,uDACC,aAAA,CAGD,yDACC,UAAA,CACA,WAAA,CACA,kBAAA,CACA,2CAAA,CAEA,gEACC,6CAAA",sourcesContent:["\n.ldap-wizard__controls {\n\tdisplay: flex;\n\tgap: 16px;\n\talign-items: center;\n\tmin-height: 45px; // Prevents jumping when the message length need two lines.\n\n\t& > * {\n\t\tflex-shrink: 0;\n\t}\n\n\t&__state_message {\n\t\tflex-shrink: 1;\n\t}\n\n\t&__state_indicator {\n\t\twidth: 16px;\n\t\theight: 16px;\n\t\tborder-radius: 100%;\n\t\tbackground-color: var(--color-element-error);\n\n\t\t&--valid {\n\t\t\tbackground-color: var(--color-element-success);\n\t\t}\n\t}\n}\n"],sourceRoot:""}]);const s=i},76253:(e,t,a)=>{a.d(t,{A:()=>s});var n=a(71354),r=a.n(n),l=a(76314),i=a.n(l)()(r());i.push([e.id,".ldap-wizard__advanced[data-v-5b57c0d9]{display:flex;flex-direction:column;gap:16px}.ldap-wizard__advanced__section[data-v-5b57c0d9]{display:flex;flex-direction:column;border:1px solid var(--color-text-lighter);border-radius:var(--border-radius);padding:8px}.ldap-wizard__advanced__section>*[data-v-5b57c0d9]{margin-top:12px !important}.ldap-wizard__advanced__section summary[data-v-5b57c0d9]{margin-top:0 !important}.ldap-wizard__advanced__section summary h3[data-v-5b57c0d9]{margin:0;display:inline;cursor:pointer;color:var(--color-text-lighter);font-size:16px}.ldap-wizard__advanced__section:hover h3[data-v-5b57c0d9],.ldap-wizard__advanced__section[open] h3[data-v-5b57c0d9]{color:var(--color-text-light)}","",{version:3,sources:["webpack://./apps/user_ldap/src/components/SettingsTabs/AdvancedTab.vue"],names:[],mappings:"AACA,wCACC,YAAA,CACA,qBAAA,CACA,QAAA,CAEA,iDACC,YAAA,CACA,qBAAA,CACA,0CAAA,CACA,kCAAA,CACA,WAAA,CAEA,mDACC,0BAAA,CAGD,yDACC,uBAAA,CAEA,4DACC,QAAA,CACA,cAAA,CACA,cAAA,CACA,+BAAA,CACA,cAAA,CAMD,oHACC,6BAAA",sourcesContent:["\n.ldap-wizard__advanced {\n\tdisplay: flex;\n\tflex-direction: column;\n\tgap: 16px;\n\n\t&__section {\n\t\tdisplay: flex;\n\t\tflex-direction: column;\n\t\tborder: 1px solid var(--color-text-lighter);\n\t\tborder-radius: var(--border-radius);\n\t\tpadding: 8px;\n\n\t\t& > * {\n\t\t\tmargin-top: 12px !important;\n\t\t}\n\n\t\tsummary {\n\t\t\tmargin-top: 0 !important;\n\n\t\t\th3 {\n\t\t\t\tmargin: 0;\n\t\t\t\tdisplay: inline;\n\t\t\t\tcursor: pointer;\n\t\t\t\tcolor: var(--color-text-lighter);\n\t\t\t\tfont-size: 16px;\n\n\t\t\t}\n\t\t}\n\n\t\t&:hover, &[open] {\n\t\t\th3 {\n\t\t\t\tcolor: var(--color-text-light);\n\t\t\t}\n\t\t}\n\t}\n}\n"],sourceRoot:""}]);const s=i},79722:e=>{e.exports="data:image/svg+xml,%3c%21--%20-%20SPDX-FileCopyrightText:%202020%20Google%20Inc.%20-%20SPDX-License-Identifier:%20Apache-2.0%20--%3e%3csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width=%2724%27%20height=%2724%27%20fill=%27%23222%27%3e%3cpath%20d=%27M5.6%207.4L7%206l6%206-6%206-1.4-1.4%204.6-4.6-4.6-4.6m6%200L13%206l6%206-6%206-1.4-1.4%204.6-4.6-4.6-4.6z%27/%3e%3c/svg%3e"},86886:e=>{e.exports="data:image/svg+xml,%3c%21--%20-%20SPDX-FileCopyrightText:%202020%20Google%20Inc.%20-%20SPDX-License-Identifier:%20Apache-2.0%20--%3e%3csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width=%2724%27%20height=%2724%27%20fill=%27%23222%27%3e%3cpath%20d=%27M8.6%2016.6l4.6-4.6-4.6-4.6L10%206l6%206-6%206-1.4-1.4z%27/%3e%3c/svg%3e"},87932:(e,t,a)=>{a.d(t,{A:()=>s});var n=a(71354),r=a.n(n),l=a(76314),i=a.n(l)()(r());i.push([e.id,".ldap-wizard[data-v-51715f32]{padding:16px;max-width:1000px}.ldap-wizard__config-selection[data-v-51715f32]{display:flex;align-items:end;margin-bottom:8px;gap:16px}.ldap-wizard__config-selection__create-button[data-v-51715f32]{margin-bottom:4px}.ldap-wizard__tab-selection-container[data-v-51715f32]{display:flex}.ldap-wizard__tab-selection[data-v-51715f32]{display:flex;margin-inline-start:-16px;margin-bottom:16px}.ldap-wizard__tab-selection[data-v-51715f32]:last-of-type{margin-inline-end:-16px}.ldap-wizard__tab-container[data-v-51715f32]{border-bottom:1px solid var(--color-text-light);padding:0 16px 16px 16px}.ldap-wizard__controls[data-v-51715f32]{margin-top:16px}.ldap-wizard__clear-mapping[data-v-51715f32]{padding:16px}.ldap-wizard__clear-mapping__buttons[data-v-51715f32]{display:flex;margin-top:8px;gap:16px}","",{version:3,sources:["webpack://./apps/user_ldap/src/views/Settings.vue"],names:[],mappings:"AACA,8BACC,YAAA,CACA,gBAAA,CAEA,gDACC,YAAA,CACA,eAAA,CACA,iBAAA,CACA,QAAA,CAEA,+DACC,iBAAA,CAIF,uDACC,YAAA,CAGD,6CACC,YAAA,CACA,yBAAA,CACA,kBAAA,CAEA,0DACC,uBAAA,CAIF,6CACC,+CAAA,CACA,wBAAA,CAGD,wCACC,eAAA,CAGD,6CACC,YAAA,CAEA,sDACC,YAAA,CACA,cAAA,CACA,QAAA",sourcesContent:["\n.ldap-wizard {\n\tpadding: 16px;\n\tmax-width: 1000px;\n\n\t&__config-selection {\n\t\tdisplay: flex;\n\t\talign-items: end;\n\t\tmargin-bottom: 8px;\n\t\tgap: 16px;\n\n\t\t&__create-button {\n\t\t\tmargin-bottom: 4px;\n\t\t}\n\t}\n\n\t&__tab-selection-container {\n\t\tdisplay: flex;\n\t}\n\n\t&__tab-selection {\n\t\tdisplay: flex;\n\t\tmargin-inline-start: -16px;\n\t\tmargin-bottom: 16px;\n\n\t\t&:last-of-type {\n\t\t\tmargin-inline-end: -16px;\n\t\t}\n\t}\n\n\t&__tab-container {\n\t\tborder-bottom: 1px solid var(--color-text-light);\n\t\tpadding: 0 16px 16px 16px;\n\t}\n\n\t&__controls {\n\t\tmargin-top: 16px;\n\t}\n\n\t&__clear-mapping {\n\t\tpadding: 16px;\n\n\t\t&__buttons {\n\t\t\tdisplay: flex;\n\t\t\tmargin-top: 8px;\n\t\t\tgap: 16px;\n\t\t}\n\t}\n}\n"],sourceRoot:""}]);const s=i}},r={};function l(e){var t=r[e];if(void 0!==t)return t.exports;var a=r[e]={id:e,loaded:!1,exports:{}};return n[e].call(a.exports,a,a.exports,l),a.loaded=!0,a.exports}l.m=n,e=[],l.O=(t,a,n,r)=>{if(!a){var i=1/0;for(p=0;p=r)&&Object.keys(l.O).every(e=>l.O[e](a[o]))?a.splice(o--,1):(s=!1,r0&&e[p-1][2]>r;p--)e[p]=e[p-1];e[p]=[a,n,r]},l.n=e=>{var t=e&&e.__esModule?()=>e.default:()=>e;return l.d(t,{a:t}),t},l.d=(e,t)=>{for(var a in t)l.o(t,a)&&!l.o(e,a)&&Object.defineProperty(e,a,{enumerable:!0,get:t[a]})},l.f={},l.e=e=>Promise.all(Object.keys(l.f).reduce((t,a)=>(l.f[a](e,t),t),[])),l.u=e=>e+"-"+e+".js?v="+{640:"d4c5c018803ee8751b2a",780:"e3ee44fa7690af29d8d7",3564:"29e8338d43e0d4bd3995",5810:"b550a24d46f75f92c2d5",5862:"8bc76a21d9622c29e1a9",7471:"6423b9b898ffefeb7d1d"}[e],l.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),l.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),t={},a="nextcloud:",l.l=(e,n,r,i)=>{if(t[e])t[e].push(n);else{var s,o;if(void 0!==r)for(var d=document.getElementsByTagName("script"),p=0;p{s.onerror=s.onload=null,clearTimeout(_);var r=t[e];if(delete t[e],s.parentNode&&s.parentNode.removeChild(s),r&&r.forEach(e=>e(n)),a)return a(n)},_=setTimeout(u.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=u.bind(null,s.onerror),s.onload=u.bind(null,s.onload),o&&document.head.appendChild(s)}},l.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},l.nmd=e=>(e.paths=[],e.children||(e.children=[]),e),l.j=7044,(()=>{var e;l.g.importScripts&&(e=l.g.location+"");var t=l.g.document;if(!e&&t&&(t.currentScript&&"SCRIPT"===t.currentScript.tagName.toUpperCase()&&(e=t.currentScript.src),!e)){var a=t.getElementsByTagName("script");if(a.length)for(var n=a.length-1;n>-1&&(!e||!/^http(s?):/.test(e));)e=a[n--].src}if(!e)throw new Error("Automatic publicPath is not supported in this browser");e=e.replace(/^blob:/,"").replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),l.p=e})(),(()=>{l.b=document.baseURI||self.location.href;var e={7044:0,7471:0};l.f.j=(t,a)=>{var n=l.o(e,t)?e[t]:void 0;if(0!==n)if(n)a.push(n[2]);else{var r=new Promise((a,r)=>n=e[t]=[a,r]);a.push(n[2]=r);var i=l.p+l.u(t),s=new Error;l.l(i,a=>{if(l.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var r=a&&("load"===a.type?"missing":a.type),i=a&&a.target&&a.target.src;s.message="Loading chunk "+t+" failed.\n("+r+": "+i+")",s.name="ChunkLoadError",s.type=r,s.request=i,n[1](s)}},"chunk-"+t,t)}},l.O.j=t=>0===e[t];var t=(t,a)=>{var n,r,i=a[0],s=a[1],o=a[2],d=0;if(i.some(t=>0!==e[t])){for(n in s)l.o(s,n)&&(l.m[n]=s[n]);if(o)var p=o(l)}for(t&&t(a);dl(2393));i=l.O(i)})(); //# sourceMappingURL=user_ldap-main.js.map?v=01c89373345859f1302a