diff --git a/dashboard/src/translation/en.json b/dashboard/src/translation/en.json index 4367dc03f..318c1ce4a 100644 --- a/dashboard/src/translation/en.json +++ b/dashboard/src/translation/en.json @@ -363,7 +363,7 @@ "description": "Cloudron can act as a central user directory server for external applications.", "enabled": "Enabled", "ipRestriction": { - "description": "The directory server can be limited to specific IPs or ranges.", + "description": "Limit Directory Server access to specific IPs or ranges. Lines starting with # are treated as comments.", "placeholder": "Line separated IP address or Subnet", "label": "Restrict Access" }, diff --git a/dashboard/src/views/user-settings.html b/dashboard/src/views/user-settings.html index ccbbc46b9..499965749 100644 --- a/dashboard/src/views/user-settings.html +++ b/dashboard/src/views/user-settings.html @@ -460,7 +460,7 @@
-

{{ 'users.exposedLdap.ipRestriction.description' | tr }}

+

{{ userDirectoryConfig.error.allowlist }}
diff --git a/src/test/directoryserver-test.js b/src/test/directoryserver-test.js index dab6b691e..58e382e4f 100644 --- a/src/test/directoryserver-test.js +++ b/src/test/directoryserver-test.js @@ -82,7 +82,7 @@ describe('Directory Server (LDAP)', function () { async.series([ setup, directoryServer.start.bind(null), - directoryServer.setConfig.bind(null, { enabled: true, secret: auth.secret, allowlist: '127.0.0.1' }), + directoryServer.setConfig.bind(null, { enabled: true, secret: auth.secret, allowlist: '127.0.0.1' }, auditSource), async () => { group = await groups.add({ name: 'ldap-test-1' }); await groups.setMembers(group.id, [ admin.id, user.id ]);