Revert "run remark linter locally"

This reverts commit 97c348f1ae.
This commit is contained in:
A.Unger
2020-09-23 11:48:59 +02:00
parent 97c348f1ae
commit 8b9e02ec0b
447 changed files with 6088 additions and 6178 deletions

View File

@@ -1,4 +1,4 @@
# Changelog for [unreleased] \(UNRELEASED)
# Changelog for [unreleased] (UNRELEASED)
The following sections list the changes for ocis-proxy unreleased.
@@ -6,52 +6,52 @@ The following sections list the changes for ocis-proxy unreleased.
## Summary
- Bugfix - Fix director selection: [#99](https://github.com/owncloud/ocis/proxy/pull/99)
- Bugfix - Add settings API and app endpoints to example config: [#93](https://github.com/owncloud/ocis/proxy/pull/93)
- Change - Remove accounts caching: [#100](https://github.com/owncloud/ocis/proxy/pull/100)
- Enhancement - Add hello API and app endpoints to example config and builtin config: [#96](https://github.com/owncloud/ocis/proxy/pull/96)
- Enhancement - Add roleIDs to the access token: [#95](https://github.com/owncloud/ocis/proxy/pull/95)
* Bugfix - Fix director selection: [#99](https://github.com/owncloud/ocis/proxy/pull/99)
* Bugfix - Add settings API and app endpoints to example config: [#93](https://github.com/owncloud/ocis/proxy/pull/93)
* Change - Remove accounts caching: [#100](https://github.com/owncloud/ocis/proxy/pull/100)
* Enhancement - Add hello API and app endpoints to example config and builtin config: [#96](https://github.com/owncloud/ocis/proxy/pull/96)
* Enhancement - Add roleIDs to the access token: [#95](https://github.com/owncloud/ocis/proxy/pull/95)
## Details
- Bugfix - Fix director selection: [#99](https://github.com/owncloud/ocis/proxy/pull/99)
* Bugfix - Fix director selection: [#99](https://github.com/owncloud/ocis/proxy/pull/99)
We fixed a bug where simultaneous requests could be executed on the wrong backend.
We fixed a bug where simultaneous requests could be executed on the wrong backend.
<https://github.com/owncloud/ocis/proxy/pull/99>
https://github.com/owncloud/ocis/proxy/pull/99
- Bugfix - Add settings API and app endpoints to example config: [#93](https://github.com/owncloud/ocis/proxy/pull/93)
* Bugfix - Add settings API and app endpoints to example config: [#93](https://github.com/owncloud/ocis/proxy/pull/93)
We had the ocis-settings API and app endpoints in the builtin config already, but they were
missing in the example config. Added them for consistency.
We had the ocis-settings API and app endpoints in the builtin config already, but they were
missing in the example config. Added them for consistency.
<https://github.com/owncloud/ocis/proxy/pull/93>
https://github.com/owncloud/ocis/proxy/pull/93
- Change - Remove accounts caching: [#100](https://github.com/owncloud/ocis/proxy/pull/100)
* Change - Remove accounts caching: [#100](https://github.com/owncloud/ocis/proxy/pull/100)
We removed the accounts cache in order to avoid problems with accounts that have been updated in
the accounts service.
We removed the accounts cache in order to avoid problems with accounts that have been updated in
the accounts service.
<https://github.com/owncloud/ocis/proxy/pull/100>
https://github.com/owncloud/ocis/proxy/pull/100
- Enhancement - Add hello API and app endpoints to example config and builtin config: [#96](https://github.com/owncloud/ocis/proxy/pull/96)
* Enhancement - Add hello API and app endpoints to example config and builtin config: [#96](https://github.com/owncloud/ocis/proxy/pull/96)
We added the ocis-hello API and app endpoints to both the example config and the builtin config.
We added the ocis-hello API and app endpoints to both the example config and the builtin config.
<https://github.com/owncloud/ocis/proxy/pull/96>
https://github.com/owncloud/ocis/proxy/pull/96
- Enhancement - Add roleIDs to the access token: [#95](https://github.com/owncloud/ocis/proxy/pull/95)
* Enhancement - Add roleIDs to the access token: [#95](https://github.com/owncloud/ocis/proxy/pull/95)
We are using the roleIDs of the authenticated user for permission checks against
ocis-settings. We added the roleIDs to the access token to have them available quickly.
We are using the roleIDs of the authenticated user for permission checks against
ocis-settings. We added the roleIDs to the access token to have them available quickly.
<https://github.com/owncloud/ocis/proxy/pull/95>
https://github.com/owncloud/ocis/proxy/pull/95
# Changelog for [0.7.0] \(2020-08-21)
# Changelog for [0.7.0] (2020-08-21)
The following sections list the changes for ocis-proxy 0.7.0.
@@ -59,28 +59,28 @@ The following sections list the changes for ocis-proxy 0.7.0.
## Summary
- Enhancement - Add numeric uid and gid to the access token: [#89](https://github.com/owncloud/ocis/proxy/pull/89)
- Enhancement - Add configuration options for the pre-signed url middleware: [#91](https://github.com/owncloud/ocis/proxy/issues/91)
* Enhancement - Add numeric uid and gid to the access token: [#89](https://github.com/owncloud/ocis/proxy/pull/89)
* Enhancement - Add configuration options for the pre-signed url middleware: [#91](https://github.com/owncloud/ocis/proxy/issues/91)
## Details
- Enhancement - Add numeric uid and gid to the access token: [#89](https://github.com/owncloud/ocis/proxy/pull/89)
* Enhancement - Add numeric uid and gid to the access token: [#89](https://github.com/owncloud/ocis/proxy/pull/89)
The eos storage driver is fetching the uid and gid of a user from the access token. This PR is using
the response of the accounts service to mint them in the token.
The eos storage driver is fetching the uid and gid of a user from the access token. This PR is using
the response of the accounts service to mint them in the token.
<https://github.com/owncloud/ocis/proxy/pull/89>
https://github.com/owncloud/ocis/proxy/pull/89
- Enhancement - Add configuration options for the pre-signed url middleware: [#91](https://github.com/owncloud/ocis/proxy/issues/91)
* Enhancement - Add configuration options for the pre-signed url middleware: [#91](https://github.com/owncloud/ocis/proxy/issues/91)
Added an option to define allowed http methods for pre-signed url requests. This is useful
since we only want clients to GET resources and don't upload anything with presigned requests.
Added an option to define allowed http methods for pre-signed url requests. This is useful
since we only want clients to GET resources and don't upload anything with presigned requests.
<https://github.com/owncloud/ocis/proxy/issues/91>
<https://github.com/owncloud/product/issues/150>
https://github.com/owncloud/ocis/proxy/issues/91
https://github.com/owncloud/product/issues/150
# Changelog for [0.6.0] \(2020-08-17)
# Changelog for [0.6.0] (2020-08-17)
The following sections list the changes for ocis-proxy 0.6.0.
@@ -88,53 +88,53 @@ The following sections list the changes for ocis-proxy 0.6.0.
## Summary
- Bugfix - Enable new accounts by default: [#79](https://github.com/owncloud/ocis/proxy/pull/79)
- Bugfix - Lookup user by id for presigned URLs: [#85](https://github.com/owncloud/ocis/proxy/pull/85)
- Bugfix - Build docker images with alpine:latest instead of alpine:edge: [#78](https://github.com/owncloud/ocis/proxy/pull/78)
- Change - Add settings and ocs group routes: [#81](https://github.com/owncloud/ocis/proxy/pull/81)
- Change - Add route for user provisioning API in ocis-ocs: [#80](https://github.com/owncloud/ocis/proxy/pull/80)
* Bugfix - Enable new accounts by default: [#79](https://github.com/owncloud/ocis/proxy/pull/79)
* Bugfix - Lookup user by id for presigned URLs: [#85](https://github.com/owncloud/ocis/proxy/pull/85)
* Bugfix - Build docker images with alpine:latest instead of alpine:edge: [#78](https://github.com/owncloud/ocis/proxy/pull/78)
* Change - Add settings and ocs group routes: [#81](https://github.com/owncloud/ocis/proxy/pull/81)
* Change - Add route for user provisioning API in ocis-ocs: [#80](https://github.com/owncloud/ocis/proxy/pull/80)
## Details
- Bugfix - Enable new accounts by default: [#79](https://github.com/owncloud/ocis/proxy/pull/79)
* Bugfix - Enable new accounts by default: [#79](https://github.com/owncloud/ocis/proxy/pull/79)
When new accounts are created, they also need to be enabled to be useable.
When new accounts are created, they also need to be enabled to be useable.
<https://github.com/owncloud/ocis/proxy/pull/79>
https://github.com/owncloud/ocis/proxy/pull/79
- Bugfix - Lookup user by id for presigned URLs: [#85](https://github.com/owncloud/ocis/proxy/pull/85)
* Bugfix - Lookup user by id for presigned URLs: [#85](https://github.com/owncloud/ocis/proxy/pull/85)
Phoenix will send the `userid`, not the `username` as the `OC-Credential` for presigned URLs.
This PR uses the new `ocisid` claim in the OIDC userinfo to pass the userid to the account
middleware.
Phoenix will send the `userid`, not the `username` as the `OC-Credential` for presigned URLs.
This PR uses the new `ocisid` claim in the OIDC userinfo to pass the userid to the account
middleware.
<https://github.com/owncloud/ocis/issues/436>
<https://github.com/owncloud/ocis/proxy/pull/85>
<https://github.com/owncloud/ocis-pkg/pull/50>
https://github.com/owncloud/ocis/issues/436
https://github.com/owncloud/ocis/proxy/pull/85
https://github.com/owncloud/ocis-pkg/pull/50
- Bugfix - Build docker images with alpine:latest instead of alpine:edge: [#78](https://github.com/owncloud/ocis/proxy/pull/78)
* Bugfix - Build docker images with alpine:latest instead of alpine:edge: [#78](https://github.com/owncloud/ocis/proxy/pull/78)
ARM builds were failing when built on alpine:edge, so we switched to alpine:latest instead.
ARM builds were failing when built on alpine:edge, so we switched to alpine:latest instead.
<https://github.com/owncloud/ocis/proxy/pull/78>
https://github.com/owncloud/ocis/proxy/pull/78
- Change - Add settings and ocs group routes: [#81](https://github.com/owncloud/ocis/proxy/pull/81)
* Change - Add settings and ocs group routes: [#81](https://github.com/owncloud/ocis/proxy/pull/81)
Route settings requests and ocs group related requests to new services
Route settings requests and ocs group related requests to new services
<https://github.com/owncloud/ocis/proxy/pull/81>
https://github.com/owncloud/ocis/proxy/pull/81
- Change - Add route for user provisioning API in ocis-ocs: [#80](https://github.com/owncloud/ocis/proxy/pull/80)
* Change - Add route for user provisioning API in ocis-ocs: [#80](https://github.com/owncloud/ocis/proxy/pull/80)
We added a route to send requests on the user provisioning API endpoints to ocis-ocs.
We added a route to send requests on the user provisioning API endpoints to ocis-ocs.
<https://github.com/owncloud/ocis/proxy/pull/80>
https://github.com/owncloud/ocis/proxy/pull/80
# Changelog for [0.5.0] \(2020-07-23)
# Changelog for [0.5.0] (2020-07-23)
The following sections list the changes for ocis-proxy 0.5.0.
@@ -142,104 +142,104 @@ The following sections list the changes for ocis-proxy 0.5.0.
## Summary
- Bugfix - Provide token configuration from config: [#69](https://github.com/owncloud/ocis/proxy/pull/69)
- Bugfix - Provide token configuration from config: [#76](https://github.com/owncloud/ocis/proxy/pull/76)
- Change - Add OIDC config flags: [#66](https://github.com/owncloud/ocis/proxy/pull/66)
- Change - Mint new username property in the reva token: [#62](https://github.com/owncloud/ocis/proxy/pull/62)
- Enhancement - Add Accounts UI routes: [#65](https://github.com/owncloud/ocis/proxy/pull/65)
- Enhancement - Add option to disable TLS: [#71](https://github.com/owncloud/ocis/proxy/issues/71)
- Enhancement - Only send create home request if an account has been migrated: [#52](https://github.com/owncloud/ocis/proxy/issues/52)
- Enhancement - Create a root span on proxy that propagates down to consumers: [#64](https://github.com/owncloud/ocis/proxy/pull/64)
- Enhancement - Support signed URLs: [#73](https://github.com/owncloud/ocis/proxy/issues/73)
* Bugfix - Provide token configuration from config: [#69](https://github.com/owncloud/ocis/proxy/pull/69)
* Bugfix - Provide token configuration from config: [#76](https://github.com/owncloud/ocis/proxy/pull/76)
* Change - Add OIDC config flags: [#66](https://github.com/owncloud/ocis/proxy/pull/66)
* Change - Mint new username property in the reva token: [#62](https://github.com/owncloud/ocis/proxy/pull/62)
* Enhancement - Add Accounts UI routes: [#65](https://github.com/owncloud/ocis/proxy/pull/65)
* Enhancement - Add option to disable TLS: [#71](https://github.com/owncloud/ocis/proxy/issues/71)
* Enhancement - Only send create home request if an account has been migrated: [#52](https://github.com/owncloud/ocis/proxy/issues/52)
* Enhancement - Create a root span on proxy that propagates down to consumers: [#64](https://github.com/owncloud/ocis/proxy/pull/64)
* Enhancement - Support signed URLs: [#73](https://github.com/owncloud/ocis/proxy/issues/73)
## Details
- Bugfix - Provide token configuration from config: [#69](https://github.com/owncloud/ocis/proxy/pull/69)
* Bugfix - Provide token configuration from config: [#69](https://github.com/owncloud/ocis/proxy/pull/69)
Fixed a bug that causes the createHome middleware to crash if no configuration for the
TokenManager is propagated.
Fixed a bug that causes the createHome middleware to crash if no configuration for the
TokenManager is propagated.
<https://github.com/owncloud/ocis/proxy/pull/69>
https://github.com/owncloud/ocis/proxy/pull/69
- Bugfix - Provide token configuration from config: [#76](https://github.com/owncloud/ocis/proxy/pull/76)
* Bugfix - Provide token configuration from config: [#76](https://github.com/owncloud/ocis/proxy/pull/76)
Fixed a bug that causes the createHome middleware to crash if the createHome response has no
Status set
Fixed a bug that causes the createHome middleware to crash if the createHome response has no
Status set
<https://github.com/owncloud/ocis/proxy/pull/76>
https://github.com/owncloud/ocis/proxy/pull/76
- Change - Add OIDC config flags: [#66](https://github.com/owncloud/ocis/proxy/pull/66)
* Change - Add OIDC config flags: [#66](https://github.com/owncloud/ocis/proxy/pull/66)
To authenticate requests with an oidc provider we added two environment variables: -
`PROXY_OIDC_ISSUER="https://localhost:9200"` and - `PROXY_OIDC_INSECURE=true`
To authenticate requests with an oidc provider we added two environment variables: -
`PROXY_OIDC_ISSUER="https://localhost:9200"` and - `PROXY_OIDC_INSECURE=true`
This changes ocis-proxy to now load the oidc-middleware by default, requiring a bearer token
and exchanging the email in the OIDC claims for an account id at the ocis-accounts service.
This changes ocis-proxy to now load the oidc-middleware by default, requiring a bearer token
and exchanging the email in the OIDC claims for an account id at the ocis-accounts service.
Setting `PROXY_OIDC_ISSUER=""` will disable the OIDC middleware.
Setting `PROXY_OIDC_ISSUER=""` will disable the OIDC middleware.
<https://github.com/owncloud/ocis/proxy/pull/66>
https://github.com/owncloud/ocis/proxy/pull/66
- Change - Mint new username property in the reva token: [#62](https://github.com/owncloud/ocis/proxy/pull/62)
* Change - Mint new username property in the reva token: [#62](https://github.com/owncloud/ocis/proxy/pull/62)
An accounts username is now taken from the on_premises_sam_account_name property instead of
the preferred_name. Furthermore the group name (also from on_premises_sam_account_name
property) is now minted into the token as well.
An accounts username is now taken from the on_premises_sam_account_name property instead of
the preferred_name. Furthermore the group name (also from on_premises_sam_account_name
property) is now minted into the token as well.
<https://github.com/owncloud/ocis/proxy/pull/62>
https://github.com/owncloud/ocis/proxy/pull/62
- Enhancement - Add Accounts UI routes: [#65](https://github.com/owncloud/ocis/proxy/pull/65)
* Enhancement - Add Accounts UI routes: [#65](https://github.com/owncloud/ocis/proxy/pull/65)
The accounts service has a ui that requires routing - `/api/v0/accounts` and - `/accounts.js`
The accounts service has a ui that requires routing - `/api/v0/accounts` and - `/accounts.js`
To http&#x3A;//localhost:9181
To http://localhost:9181
<https://github.com/owncloud/ocis/proxy/pull/65>
https://github.com/owncloud/ocis/proxy/pull/65
- Enhancement - Add option to disable TLS: [#71](https://github.com/owncloud/ocis/proxy/issues/71)
* Enhancement - Add option to disable TLS: [#71](https://github.com/owncloud/ocis/proxy/issues/71)
Can be used to disable TLS when the ocis-proxy is behind an TLS-Terminating reverse proxy.
Can be used to disable TLS when the ocis-proxy is behind an TLS-Terminating reverse proxy.
Env PROXY_TLS=false or --tls=false
Env PROXY_TLS=false or --tls=false
<https://github.com/owncloud/ocis/proxy/issues/71>
<https://github.com/owncloud/ocis/proxy/pull/72>
https://github.com/owncloud/ocis/proxy/issues/71
https://github.com/owncloud/ocis/proxy/pull/72
- Enhancement - Only send create home request if an account has been migrated: [#52](https://github.com/owncloud/ocis/proxy/issues/52)
* Enhancement - Only send create home request if an account has been migrated: [#52](https://github.com/owncloud/ocis/proxy/issues/52)
This change adds a check if an account has been migrated by getting it from the ocis-accounts
service. If no account is returned it means it hasn't been migrated.
This change adds a check if an account has been migrated by getting it from the ocis-accounts
service. If no account is returned it means it hasn't been migrated.
<https://github.com/owncloud/ocis/proxy/issues/52>
<https://github.com/owncloud/ocis/proxy/pull/63>
https://github.com/owncloud/ocis/proxy/issues/52
https://github.com/owncloud/ocis/proxy/pull/63
- Enhancement - Create a root span on proxy that propagates down to consumers: [#64](https://github.com/owncloud/ocis/proxy/pull/64)
* Enhancement - Create a root span on proxy that propagates down to consumers: [#64](https://github.com/owncloud/ocis/proxy/pull/64)
In order to propagate and correctly associate a span with a request we need a root span that gets
sent to other services.
In order to propagate and correctly associate a span with a request we need a root span that gets
sent to other services.
<https://github.com/owncloud/ocis/proxy/pull/64>
https://github.com/owncloud/ocis/proxy/pull/64
- Enhancement - Support signed URLs: [#73](https://github.com/owncloud/ocis/proxy/issues/73)
* Enhancement - Support signed URLs: [#73](https://github.com/owncloud/ocis/proxy/issues/73)
We added a middleware that verifies signed urls as generated by the owncloud-sdk. This allows
directly downloading large files with browsers instead of using `blob://` urls, which eats
memory ...
We added a middleware that verifies signed urls as generated by the owncloud-sdk. This allows
directly downloading large files with browsers instead of using `blob://` urls, which eats
memory ...
<https://github.com/owncloud/ocis/proxy/issues/73>
<https://github.com/owncloud/ocis/proxy/pull/75>
<https://github.com/owncloud/ocis-ocs/pull/18>
<https://github.com/owncloud/owncloud-sdk/pull/504>
https://github.com/owncloud/ocis/proxy/issues/73
https://github.com/owncloud/ocis/proxy/pull/75
https://github.com/owncloud/ocis-ocs/pull/18
https://github.com/owncloud/owncloud-sdk/pull/504
# Changelog for [0.4.0] \(2020-06-25)
# Changelog for [0.4.0] (2020-06-25)
The following sections list the changes for ocis-proxy 0.4.0.
@@ -247,100 +247,100 @@ The following sections list the changes for ocis-proxy 0.4.0.
## Summary
- Bugfix - Accounts service response was ignored: [#43](https://github.com/owncloud/ocis/proxy/pull/43)
- Bugfix - Fix x-access-token in header: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
- Change - Point /data endpoint to reva frontend: [#45](https://github.com/owncloud/ocis/proxy/pull/45)
- Change - Send autocreate home request to reva gateway: [#51](https://github.com/owncloud/ocis/proxy/pull/51)
- Change - Update to new accounts API: [#39](https://github.com/owncloud/ocis/proxy/issues/39)
- Enhancement - Retrieve Account UUID From User Claims: [#36](https://github.com/owncloud/ocis/proxy/pull/36)
- Enhancement - Create account if it doesn't exist in ocis-accounts: [#55](https://github.com/owncloud/ocis/proxy/issues/55)
- Enhancement - Disable keep-alive on server-side OIDC requests: [#268](https://github.com/owncloud/ocis/issues/268)
- Enhancement - Make jwt secret configurable: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
- Enhancement - Respect account_enabled flag: [#53](https://github.com/owncloud/ocis/proxy/issues/53)
* Bugfix - Accounts service response was ignored: [#43](https://github.com/owncloud/ocis/proxy/pull/43)
* Bugfix - Fix x-access-token in header: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
* Change - Point /data endpoint to reva frontend: [#45](https://github.com/owncloud/ocis/proxy/pull/45)
* Change - Send autocreate home request to reva gateway: [#51](https://github.com/owncloud/ocis/proxy/pull/51)
* Change - Update to new accounts API: [#39](https://github.com/owncloud/ocis/proxy/issues/39)
* Enhancement - Retrieve Account UUID From User Claims: [#36](https://github.com/owncloud/ocis/proxy/pull/36)
* Enhancement - Create account if it doesn't exist in ocis-accounts: [#55](https://github.com/owncloud/ocis/proxy/issues/55)
* Enhancement - Disable keep-alive on server-side OIDC requests: [#268](https://github.com/owncloud/ocis/issues/268)
* Enhancement - Make jwt secret configurable: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
* Enhancement - Respect account_enabled flag: [#53](https://github.com/owncloud/ocis/proxy/issues/53)
## Details
- Bugfix - Accounts service response was ignored: [#43](https://github.com/owncloud/ocis/proxy/pull/43)
* Bugfix - Accounts service response was ignored: [#43](https://github.com/owncloud/ocis/proxy/pull/43)
We fixed an error in the AccountUUID middleware that was responsible for ignoring an account
uuid provided by the accounts service.
We fixed an error in the AccountUUID middleware that was responsible for ignoring an account
uuid provided by the accounts service.
<https://github.com/owncloud/ocis/proxy/pull/43>
https://github.com/owncloud/ocis/proxy/pull/43
- Bugfix - Fix x-access-token in header: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
* Bugfix - Fix x-access-token in header: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
We fixed setting the x-access-token in the request header, which was broken before.
We fixed setting the x-access-token in the request header, which was broken before.
<https://github.com/owncloud/ocis/proxy/pull/41>
<https://github.com/owncloud/ocis/proxy/pull/46>
https://github.com/owncloud/ocis/proxy/pull/41
https://github.com/owncloud/ocis/proxy/pull/46
- Change - Point /data endpoint to reva frontend: [#45](https://github.com/owncloud/ocis/proxy/pull/45)
* Change - Point /data endpoint to reva frontend: [#45](https://github.com/owncloud/ocis/proxy/pull/45)
Adjusted example config files to point /data to the reva frontend.
Adjusted example config files to point /data to the reva frontend.
<https://github.com/owncloud/ocis/proxy/pull/45>
https://github.com/owncloud/ocis/proxy/pull/45
- Change - Send autocreate home request to reva gateway: [#51](https://github.com/owncloud/ocis/proxy/pull/51)
* Change - Send autocreate home request to reva gateway: [#51](https://github.com/owncloud/ocis/proxy/pull/51)
Send autocreate home request to reva gateway
Send autocreate home request to reva gateway
<https://github.com/owncloud/ocis/proxy/pull/51>
https://github.com/owncloud/ocis/proxy/pull/51
- Change - Update to new accounts API: [#39](https://github.com/owncloud/ocis/proxy/issues/39)
* Change - Update to new accounts API: [#39](https://github.com/owncloud/ocis/proxy/issues/39)
Update to new accounts API
Update to new accounts API
<https://github.com/owncloud/ocis/proxy/issues/39>
https://github.com/owncloud/ocis/proxy/issues/39
- Enhancement - Retrieve Account UUID From User Claims: [#36](https://github.com/owncloud/ocis/proxy/pull/36)
* Enhancement - Retrieve Account UUID From User Claims: [#36](https://github.com/owncloud/ocis/proxy/pull/36)
OIDC Middleware can make use of uuidFromClaims to trade claims.Email for an account's UUID.
For this, a general purpose cache was added that caches on a per-request basis, meaning
whenever the request parameters match a set of keys, the cached value is returned, saving a
round trip to the accounts service that otherwise would happen in every single request.
OIDC Middleware can make use of uuidFromClaims to trade claims.Email for an account's UUID.
For this, a general purpose cache was added that caches on a per-request basis, meaning
whenever the request parameters match a set of keys, the cached value is returned, saving a
round trip to the accounts service that otherwise would happen in every single request.
<https://github.com/owncloud/ocis/proxy/pull/36>
https://github.com/owncloud/ocis/proxy/pull/36
- Enhancement - Create account if it doesn't exist in ocis-accounts: [#55](https://github.com/owncloud/ocis/proxy/issues/55)
* Enhancement - Create account if it doesn't exist in ocis-accounts: [#55](https://github.com/owncloud/ocis/proxy/issues/55)
The accounts_uuid middleware tries to get the account from ocis-accounts. If it doens't exist
there yet the proxy creates the account using the ocis-account api.
The accounts_uuid middleware tries to get the account from ocis-accounts. If it doens't exist
there yet the proxy creates the account using the ocis-account api.
<https://github.com/owncloud/ocis/proxy/issues/55>
<https://github.com/owncloud/ocis/proxy/issues/58>
https://github.com/owncloud/ocis/proxy/issues/55
https://github.com/owncloud/ocis/proxy/issues/58
- Enhancement - Disable keep-alive on server-side OIDC requests: [#268](https://github.com/owncloud/ocis/issues/268)
* Enhancement - Disable keep-alive on server-side OIDC requests: [#268](https://github.com/owncloud/ocis/issues/268)
This should reduce file-descriptor counts
This should reduce file-descriptor counts
<https://github.com/owncloud/ocis/issues/268>
<https://github.com/owncloud/ocis/proxy/pull/42>
<https://github.com/cs3org/reva/pull/787>
https://github.com/owncloud/ocis/issues/268
https://github.com/owncloud/ocis/proxy/pull/42
https://github.com/cs3org/reva/pull/787
- Enhancement - Make jwt secret configurable: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
* Enhancement - Make jwt secret configurable: [#41](https://github.com/owncloud/ocis/proxy/pull/41)
We added a config option for the reva token manager JWTSecret. It was hardcoded before and is now
configurable.
We added a config option for the reva token manager JWTSecret. It was hardcoded before and is now
configurable.
<https://github.com/owncloud/ocis/proxy/pull/41>
https://github.com/owncloud/ocis/proxy/pull/41
- Enhancement - Respect account_enabled flag: [#53](https://github.com/owncloud/ocis/proxy/issues/53)
* Enhancement - Respect account_enabled flag: [#53](https://github.com/owncloud/ocis/proxy/issues/53)
If the account returned by the accounts service has the account_enabled flag set to false, the
proxy will return immediately with the status code unauthorized.
If the account returned by the accounts service has the account_enabled flag set to false, the
proxy will return immediately with the status code unauthorized.
<https://github.com/owncloud/ocis/proxy/issues/53>
https://github.com/owncloud/ocis/proxy/issues/53
# Changelog for [0.3.1] \(2020-03-31)
# Changelog for [0.3.1] (2020-03-31)
The following sections list the changes for ocis-proxy 0.3.1.
@@ -348,17 +348,17 @@ The following sections list the changes for ocis-proxy 0.3.1.
## Summary
- Change - Update ocis-pkg: [#30](https://github.com/owncloud/ocis/proxy/pull/30)
* Change - Update ocis-pkg: [#30](https://github.com/owncloud/ocis/proxy/pull/30)
## Details
- Change - Update ocis-pkg: [#30](https://github.com/owncloud/ocis/proxy/pull/30)
* Change - Update ocis-pkg: [#30](https://github.com/owncloud/ocis/proxy/pull/30)
We updated ocis-pkg from 2.0.2 to 2.2.0.
We updated ocis-pkg from 2.0.2 to 2.2.0.
<https://github.com/owncloud/ocis/proxy/pull/30>
https://github.com/owncloud/ocis/proxy/pull/30
# Changelog for [0.3.0] \(2020-03-30)
# Changelog for [0.3.0] (2020-03-30)
The following sections list the changes for ocis-proxy 0.3.0.
@@ -366,37 +366,37 @@ The following sections list the changes for ocis-proxy 0.3.0.
## Summary
- Change - Insecure http-requests are now redirected to https&#x3A; [#29](https://github.com/owncloud/ocis/proxy/pull/29)
- Enhancement - Configurable OpenID Connect client: [#27](https://github.com/owncloud/ocis/proxy/pull/27)
- Enhancement - Add policy selectors: [#4](https://github.com/owncloud/ocis/proxy/issues/4)
* Change - Insecure http-requests are now redirected to https: [#29](https://github.com/owncloud/ocis/proxy/pull/29)
* Enhancement - Configurable OpenID Connect client: [#27](https://github.com/owncloud/ocis/proxy/pull/27)
* Enhancement - Add policy selectors: [#4](https://github.com/owncloud/ocis/proxy/issues/4)
## Details
- Change - Insecure http-requests are now redirected to https&#x3A; [#29](https://github.com/owncloud/ocis/proxy/pull/29)
* Change - Insecure http-requests are now redirected to https: [#29](https://github.com/owncloud/ocis/proxy/pull/29)
<https://github.com/owncloud/ocis/proxy/pull/29>
https://github.com/owncloud/ocis/proxy/pull/29
- Enhancement - Configurable OpenID Connect client: [#27](https://github.com/owncloud/ocis/proxy/pull/27)
* Enhancement - Configurable OpenID Connect client: [#27](https://github.com/owncloud/ocis/proxy/pull/27)
The proxy will try to authenticate every request with the configured OIDC provider.
The proxy will try to authenticate every request with the configured OIDC provider.
See configs/proxy-example.oidc.json for an example-configuration.
See configs/proxy-example.oidc.json for an example-configuration.
<https://github.com/owncloud/ocis/proxy/pull/27>
https://github.com/owncloud/ocis/proxy/pull/27
- Enhancement - Add policy selectors: [#4](https://github.com/owncloud/ocis/proxy/issues/4)
* Enhancement - Add policy selectors: [#4](https://github.com/owncloud/ocis/proxy/issues/4)
"Static-Policy" can be configured to always select a specific policy. See:
config/proxy-example.json.
"Static-Policy" can be configured to always select a specific policy. See:
config/proxy-example.json.
"Migration-Policy" selects policy depending on existence of the uid in the ocis-accounts
service. See: config/proxy-example-migration.json
"Migration-Policy" selects policy depending on existence of the uid in the ocis-accounts
service. See: config/proxy-example-migration.json
<https://github.com/owncloud/ocis/proxy/issues/4>
https://github.com/owncloud/ocis/proxy/issues/4
# Changelog for [0.2.1] \(2020-03-25)
# Changelog for [0.2.1] (2020-03-25)
The following sections list the changes for ocis-proxy 0.2.1.
@@ -404,15 +404,15 @@ The following sections list the changes for ocis-proxy 0.2.1.
## Summary
- Bugfix - Set TLS-Certificate correctly: [#25](https://github.com/owncloud/ocis/proxy/pull/25)
* Bugfix - Set TLS-Certificate correctly: [#25](https://github.com/owncloud/ocis/proxy/pull/25)
## Details
- Bugfix - Set TLS-Certificate correctly: [#25](https://github.com/owncloud/ocis/proxy/pull/25)
* Bugfix - Set TLS-Certificate correctly: [#25](https://github.com/owncloud/ocis/proxy/pull/25)
<https://github.com/owncloud/ocis/proxy/pull/25>
https://github.com/owncloud/ocis/proxy/pull/25
# Changelog for [0.2.0] \(2020-03-25)
# Changelog for [0.2.0] (2020-03-25)
The following sections list the changes for ocis-proxy 0.2.0.
@@ -420,34 +420,34 @@ The following sections list the changes for ocis-proxy 0.2.0.
## Summary
- Change - Route requests based on regex or query parameters: [#21](https://github.com/owncloud/ocis/proxy/issues/21)
- Enhancement - Proxy client urls in default configuration: [#19](https://github.com/owncloud/ocis/proxy/issues/19)
- Enhancement - Make TLS-Cert configurable: [#14](https://github.com/owncloud/ocis/proxy/pull/14)
* Change - Route requests based on regex or query parameters: [#21](https://github.com/owncloud/ocis/proxy/issues/21)
* Enhancement - Proxy client urls in default configuration: [#19](https://github.com/owncloud/ocis/proxy/issues/19)
* Enhancement - Make TLS-Cert configurable: [#14](https://github.com/owncloud/ocis/proxy/pull/14)
## Details
- Change - Route requests based on regex or query parameters: [#21](https://github.com/owncloud/ocis/proxy/issues/21)
* Change - Route requests based on regex or query parameters: [#21](https://github.com/owncloud/ocis/proxy/issues/21)
Some requests needed to be distinguished based on a pattern or a query parameter. We've
implemented the functionality to route requests based on different conditions.
Some requests needed to be distinguished based on a pattern or a query parameter. We've
implemented the functionality to route requests based on different conditions.
<https://github.com/owncloud/ocis/proxy/issues/21>
https://github.com/owncloud/ocis/proxy/issues/21
- Enhancement - Proxy client urls in default configuration: [#19](https://github.com/owncloud/ocis/proxy/issues/19)
* Enhancement - Proxy client urls in default configuration: [#19](https://github.com/owncloud/ocis/proxy/issues/19)
Proxy /status.php and index.php/\*
Proxy /status.php and index.php/*
<https://github.com/owncloud/ocis/proxy/issues/19>
https://github.com/owncloud/ocis/proxy/issues/19
- Enhancement - Make TLS-Cert configurable: [#14](https://github.com/owncloud/ocis/proxy/pull/14)
* Enhancement - Make TLS-Cert configurable: [#14](https://github.com/owncloud/ocis/proxy/pull/14)
Before a generates certificates on every start was used for dev purposes.
Before a generates certificates on every start was used for dev purposes.
<https://github.com/owncloud/ocis/proxy/pull/14>
https://github.com/owncloud/ocis/proxy/pull/14
# Changelog for [0.1.0] \(2020-03-18)
# Changelog for [0.1.0] (2020-03-18)
The following sections list the changes for ocis-proxy 0.1.0.
@@ -455,23 +455,24 @@ The following sections list the changes for ocis-proxy 0.1.0.
## Summary
- Change - Initial release of basic version: [#1](https://github.com/owncloud/ocis/proxy/issues/1)
- Enhancement - Load Proxy Policies at Runtime: [#17](https://github.com/owncloud/ocis/proxy/issues/17)
* Change - Initial release of basic version: [#1](https://github.com/owncloud/ocis/proxy/issues/1)
* Enhancement - Load Proxy Policies at Runtime: [#17](https://github.com/owncloud/ocis/proxy/issues/17)
## Details
- Change - Initial release of basic version: [#1](https://github.com/owncloud/ocis/proxy/issues/1)
* Change - Initial release of basic version: [#1](https://github.com/owncloud/ocis/proxy/issues/1)
Just prepared an initial basic version.
Just prepared an initial basic version.
<https://github.com/owncloud/ocis/proxy/issues/1>
https://github.com/owncloud/ocis/proxy/issues/1
- Enhancement - Load Proxy Policies at Runtime: [#17](https://github.com/owncloud/ocis/proxy/issues/17)
* Enhancement - Load Proxy Policies at Runtime: [#17](https://github.com/owncloud/ocis/proxy/issues/17)
While a proxy without policies is of no use, the current state of ocis-proxy expects a config
file either at an expected Viper location or specified via -- config-file flag. To ease
deployments and ensure a working set of policies out of the box we need a series of defaults.
While a proxy without policies is of no use, the current state of ocis-proxy expects a config
file either at an expected Viper location or specified via -- config-file flag. To ease
deployments and ensure a working set of policies out of the box we need a series of defaults.
https://github.com/owncloud/ocis/proxy/issues/17
https://github.com/owncloud/ocis/proxy/pull/16
<https://github.com/owncloud/ocis/proxy/issues/17>
<https://github.com/owncloud/ocis/proxy/pull/16>

View File

@@ -1,7 +1,7 @@
# ownCloud Infinite Scale: Proxy
[![Build Status](https://cloud.drone.io/api/badges/owncloud/ocis-proxy/status.svg)](https://cloud.drone.io/owncloud/ocis-proxy)
[![Codacy Badge](https://api.codacy.com/project/badge/Grade/636af6e2270e4c7ca0f3eb2efc814c21)](https://www.codacy.com/gh/owncloud/ocis-proxy?utm_source=github.com&utm_medium=referral&utm_content=owncloud/ocis-bridge&utm_campaign=Badge_Grade)
[![Codacy Badge](https://api.codacy.com/project/badge/Grade/636af6e2270e4c7ca0f3eb2efc814c21)](https://www.codacy.com/gh/owncloud/ocis-proxy?utm_source=github.com&amp;utm_medium=referral&amp;utm_content=owncloud/ocis-bridge&amp;utm_campaign=Badge_Grade)
[![Codacy Badge](https://api.codacy.com/project/badge/Coverage/636af6e2270e4c7ca0f3eb2efc814c21)](https://www.codacy.com/gh/owncloud/ocis-proxy?utm_source=github.com&utm_medium=referral&utm_content=owncloud/ocis-bridge&utm_campaign=Badge_Coverage)
[![Go Doc](https://godoc.org/github.com/owncloud/ocis-proxy?status.svg)](http://godoc.org/github.com/owncloud/ocis-proxy)
[![Go Report](http://goreportcard.com/badge/github.com/owncloud/ocis-proxy)](http://goreportcard.com/report/github.com/owncloud/ocis-proxy)
@@ -12,9 +12,7 @@
## Install
You can download prebuilt binaries from the GitHub releases or from our [download mirrors](http://download.owncloud.com/ocis/proxy/). For instructions how to install this on your platform you should take a look at our [documentation](https://owncloud.github.io/ocis-proxy/)
* * *
****
## Development
Make sure you have a working Go environment, for further reference or a guide take a look at the [install instructions](http://golang.org/doc/install.html). This project requires Go >= v1.13.
@@ -30,7 +28,7 @@ make generate build
## Security
If you find a security issue please contact [security@owncloud.com](mailto:security@owncloud.com) first.
If you find a security issue please contact security@owncloud.com first.
## Contributing

View File

@@ -3,5 +3,5 @@ Enhancement: Load Proxy Policies at Runtime
While a proxy without policies is of no use, the current state of ocis-proxy expects a config file either at an expected Viper location or specified via -- config-file flag.
To ease deployments and ensure a working set of policies out of the box we need a series of defaults.
<https://github.com/owncloud/ocis/proxy/issues/17>
<https://github.com/owncloud/ocis/proxy/pull/16>
https://github.com/owncloud/ocis/proxy/issues/17
https://github.com/owncloud/ocis/proxy/pull/16

View File

@@ -3,4 +3,4 @@ Change: Route requests based on regex or query parameters
Some requests needed to be distinguished based on a pattern or a query parameter.
We've implemented the functionality to route requests based on different conditions.
<https://github.com/owncloud/ocis/proxy/issues/21>
https://github.com/owncloud/ocis/proxy/issues/21

View File

@@ -1,5 +1,5 @@
Enhancement: Proxy client urls in default configuration
Proxy /status.php and index.php/\*
Proxy /status.php and index.php/*
<https://github.com/owncloud/ocis/proxy/issues/19>
https://github.com/owncloud/ocis/proxy/issues/19

View File

@@ -2,4 +2,4 @@ Enhancement: Make TLS-Cert configurable
Before a generates certificates on every start was used for dev purposes.
<https://github.com/owncloud/ocis/proxy/pull/14>
https://github.com/owncloud/ocis/proxy/pull/14

View File

@@ -1,3 +1,3 @@
Bugfix: Set TLS-Certificate correctly
<https://github.com/owncloud/ocis/proxy/pull/25>
https://github.com/owncloud/ocis/proxy/pull/25

View File

@@ -4,4 +4,5 @@ The proxy will try to authenticate every request with the configured OIDC provid
See configs/proxy-example.oidc.json for an example-configuration.
<https://github.com/owncloud/ocis/proxy/pull/27>
https://github.com/owncloud/ocis/proxy/pull/27

View File

@@ -6,4 +6,5 @@ See: config/proxy-example.json.
"Migration-Policy" selects policy depending on existence of the uid in the ocis-accounts service.
See: config/proxy-example-migration.json
<https://github.com/owncloud/ocis/proxy/issues/4>
https://github.com/owncloud/ocis/proxy/issues/4

View File

@@ -1,3 +1,4 @@
Change: Insecure http-requests are now redirected to https
<https://github.com/owncloud/ocis/proxy/pull/29>
https://github.com/owncloud/ocis/proxy/pull/29

View File

@@ -3,5 +3,5 @@ Enhancement: create account if it doesn't exist in ocis-accounts
The accounts_uuid middleware tries to get the account from ocis-accounts.
If it doens't exist there yet the proxy creates the account using the ocis-account api.
<https://github.com/owncloud/ocis/proxy/issues/55>
<https://github.com/owncloud/ocis/proxy/issues/58>
https://github.com/owncloud/ocis/proxy/issues/55
https://github.com/owncloud/ocis/proxy/issues/58

View File

@@ -3,4 +3,4 @@ Enhancement: respect account_enabled flag
If the account returned by the accounts service has the account_enabled flag
set to false, the proxy will return immediately with the status code unauthorized.
<https://github.com/owncloud/ocis/proxy/issues/53>
https://github.com/owncloud/ocis/proxy/issues/53

View File

@@ -1,10 +1,9 @@
Enhancement: Add Accounts UI routes
The accounts service has a ui that requires routing
- `/api/v0/accounts` and
- `/accounts.js`
- `/api/v0/accounts` and
- `/accounts.js`
to http://localhost:9181
to http&#x3A;//localhost:9181
<https://github.com/owncloud/ocis/proxy/pull/65>
https://github.com/owncloud/ocis/proxy/pull/65

View File

@@ -5,5 +5,5 @@ TLS-Terminating reverse proxy.
env PROXY_TLS=false or --tls=false
<https://github.com/owncloud/ocis/proxy/issues/71>
<https://github.com/owncloud/ocis/proxy/pull/72>
https://github.com/owncloud/ocis/proxy/issues/71
https://github.com/owncloud/ocis/proxy/pull/72

View File

@@ -1,12 +1,11 @@
Change: Add OIDC config flags
To authenticate requests with an oidc provider we added two environment variables:
- `PROXY_OIDC_ISSUER="https://localhost:9200"` and
- `PROXY_OIDC_INSECURE=true`
- `PROXY_OIDC_ISSUER="https://localhost:9200"` and
- `PROXY_OIDC_INSECURE=true`
This changes ocis-proxy to now load the oidc-middleware by default, requiring a bearer token and exchanging the email in the OIDC claims for an account id at the ocis-accounts service.
Setting `PROXY_OIDC_ISSUER=""` will disable the OIDC middleware.
<https://github.com/owncloud/ocis/proxy/pull/66>
https://github.com/owncloud/ocis/proxy/pull/66

View File

@@ -3,5 +3,5 @@ Enhancement: only send create home request if an account has been migrated
This change adds a check if an account has been migrated by getting it from the
ocis-accounts service. If no account is returned it means it hasn't been migrated.
<https://github.com/owncloud/ocis/proxy/issues/52>
<https://github.com/owncloud/ocis/proxy/pull/63>
https://github.com/owncloud/ocis/proxy/issues/52
https://github.com/owncloud/ocis/proxy/pull/63

View File

@@ -2,4 +2,4 @@ Bugfix: Provide token configuration from config
Fixed a bug that causes the createHome middleware to crash if no configuration for the TokenManager is propagated.
<https://github.com/owncloud/ocis/proxy/pull/69>
https://github.com/owncloud/ocis/proxy/pull/69

View File

@@ -2,4 +2,4 @@ Bugfix: Provide token configuration from config
Fixed a bug that causes the createHome middleware to crash if the createHome response has no Status set
<https://github.com/owncloud/ocis/proxy/pull/76>
https://github.com/owncloud/ocis/proxy/pull/76

View File

@@ -2,4 +2,4 @@ Enhancement: Create a root span on proxy that propagates down to consumers
In order to propagate and correctly associate a span with a request we need a root span that gets sent to other services.
<https://github.com/owncloud/ocis/proxy/pull/64>
https://github.com/owncloud/ocis/proxy/pull/64

View File

@@ -2,7 +2,7 @@ Enhancement: Support signed URLs
We added a middleware that verifies signed urls as generated by the owncloud-sdk. This allows directly downloading large files with browsers instead of using `blob://` urls, which eats memory ...
<https://github.com/owncloud/ocis/proxy/issues/73>
<https://github.com/owncloud/ocis/proxy/pull/75>
<https://github.com/owncloud/ocis-ocs/pull/18>
<https://github.com/owncloud/owncloud-sdk/pull/504>
https://github.com/owncloud/ocis/proxy/issues/73
https://github.com/owncloud/ocis/proxy/pull/75
https://github.com/owncloud/ocis-ocs/pull/18
https://github.com/owncloud/owncloud-sdk/pull/504

View File

@@ -3,4 +3,4 @@ Change: mint new username property in the reva token
An accounts username is now taken from the on_premises_sam_account_name property instead of the preferred_name.
Furthermore the group name (also from on_premises_sam_account_name property) is now minted into the token as well.
<https://github.com/owncloud/ocis/proxy/pull/62>
https://github.com/owncloud/ocis/proxy/pull/62

View File

@@ -2,4 +2,4 @@ Bugfix: enable new accounts by default
When new accounts are created, they also need to be enabled to be useable.
<https://github.com/owncloud/ocis/proxy/pull/79>
https://github.com/owncloud/ocis/proxy/pull/79

View File

@@ -2,6 +2,6 @@ Bugfix: Lookup user by id for presigned URLs
Phoenix will send the `userid`, not the `username` as the `OC-Credential` for presigned URLs. This PR uses the new `ocisid` claim in the OIDC userinfo to pass the userid to the account middleware.
<https://github.com/owncloud/ocis/proxy/pull/85>
<https://github.com/owncloud/ocis-pkg/pull/50>
<https://github.com/owncloud/ocis/issues/436>
https://github.com/owncloud/ocis/proxy/pull/85
https://github.com/owncloud/ocis-pkg/pull/50
https://github.com/owncloud/ocis/issues/436

View File

@@ -2,4 +2,4 @@ Bugfix: build docker images with alpine:latest instead of alpine:edge
ARM builds were failing when built on alpine:edge, so we switched to alpine:latest instead.
<https://github.com/owncloud/ocis/proxy/pull/78>
https://github.com/owncloud/ocis/proxy/pull/78

View File

@@ -2,4 +2,4 @@ Change: Add route for user provisioning API in ocis-ocs
We added a route to send requests on the user provisioning API endpoints to ocis-ocs.
<https://github.com/owncloud/ocis/proxy/pull/80>
https://github.com/owncloud/ocis/proxy/pull/80

View File

@@ -2,4 +2,4 @@ Enhancement: Add numeric uid and gid to the access token
The eos storage driver is fetching the uid and gid of a user from the access token. This PR is using the response of the accounts service to mint them in the token.
<https://github.com/owncloud/ocis/proxy/pull/89>
https://github.com/owncloud/ocis/proxy/pull/89

View File

@@ -3,5 +3,5 @@ Enhancement: add configuration options for the pre-signed url middleware
Added an option to define allowed http methods for pre-signed url requests.
This is useful since we only want clients to GET resources and don't upload anything with presigned requests.
<https://github.com/owncloud/ocis/proxy/issues/91>
<https://github.com/owncloud/product/issues/150>
https://github.com/owncloud/ocis/proxy/issues/91
https://github.com/owncloud/product/issues/150

View File

@@ -2,4 +2,4 @@ Bugfix: Fix director selection
We fixed a bug where simultaneous requests could be executed on the wrong backend.
<https://github.com/owncloud/ocis/proxy/pull/99>
https://github.com/owncloud/ocis/proxy/pull/99

View File

@@ -2,4 +2,4 @@ Enhancement: Add hello API and app endpoints to example config and builtin confi
We added the ocis-hello API and app endpoints to both the example config and the builtin config.
<https://github.com/owncloud/ocis/proxy/pull/96>
https://github.com/owncloud/ocis/proxy/pull/96

View File

@@ -2,4 +2,4 @@ Enhancement: Add roleIDs to the access token
We are using the roleIDs of the authenticated user for permission checks against ocis-settings. We added the roleIDs to the access token to have them available quickly.
<https://github.com/owncloud/ocis/proxy/pull/95>
https://github.com/owncloud/ocis/proxy/pull/95

View File

@@ -2,4 +2,4 @@ Change: Remove accounts caching
We removed the accounts cache in order to avoid problems with accounts that have been updated in the accounts service.
<https://github.com/owncloud/ocis/proxy/pull/100>
https://github.com/owncloud/ocis/proxy/pull/100

View File

@@ -3,4 +3,4 @@ Bugfix: Add settings API and app endpoints to example config
We had the ocis-settings API and app endpoints in the builtin config already, but they were missing in the example
config. Added them for consistency.
<https://github.com/owncloud/ocis/proxy/pull/93>
https://github.com/owncloud/ocis/proxy/pull/93

View File

@@ -1,9 +1,8 @@
* * *
---
title: Proxy
geekdocRepo: <https://github.com/owncloud/ocis-proxy>
geekdocRepo: https://github.com/owncloud/ocis-proxy
geekdocEditPath: edit/master/docs
## geekdocFilePath: \_index.md
geekdocFilePath: _index.md
---
This service provides a basic proxy in front of the public ocis services.

View File

@@ -1,11 +1,10 @@
* * *
---
title: "About"
date: 2020-02-07T00:00:00+00:00
weight: 10
geekdocRepo: <https://github.com/owncloud/ocis-proxy>
geekdocRepo: https://github.com/owncloud/ocis-proxy
geekdocEditPath: edit/master/docs
## geekdocFilePath: about.md
geekdocFilePath: about.md
---
This service provides an proxy service that routes requests to the correct services.

View File

@@ -1,29 +1,28 @@
* * *
---
title: "Building"
date: 2018-05-02T00:00:00+00:00
weight: 30
geekdocRepo: <https://github.com/owncloud/ocis-proxy>
geekdocRepo: https://github.com/owncloud/ocis-proxy
geekdocEditPath: edit/master/docs
geekdocFilePath: building.md
---
## geekdocFilePath: building.md
{{&lt; toc >}}
{{< toc >}}
As this project is built with Go, so you need to install that first. The installation of Go is out of the scope of this document, please follow the official documentation for [Go](https://golang.org/doc/install), to build this project you have to install Go >= v1.13. After the installation of the required tools you need to get the sources:
{{&lt; highlight txt >}}
git clone <https://github.com/owncloud/ocis-proxy.git>
{{< highlight txt >}}
git clone https://github.com/owncloud/ocis-proxy.git
cd ocis-proxy
{{&lt; / highlight >}}
{{< / highlight >}}
All required tool besides Go itself and make are bundled or getting automatically installed within the `GOPATH`. All commands to build this project are part of our `Makefile`.
## Backend
{{&lt; highlight txt >}}
{{< highlight txt >}}
make generate
make build
{{&lt; / highlight >}}
{{< / highlight >}}
Finally you should have the binary within the `bin/` folder now, give it a try with `./bin/ocis-proxy -h` to see all available options and subcommands.

View File

@@ -1,20 +1,19 @@
* * *
---
title: "Configuration"
date: "2020-09-21T13:14:51+0200"
weight: 20
geekdocRepo: <https://github.com/owncloud/ocis-proxy>
geekdocRepo: https://github.com/owncloud/ocis-proxy
geekdocEditPath: edit/master/docs
geekdocFilePath: configuration.md
---
## geekdocFilePath: configuration.md
{{&lt; toc >}}
{{< toc >}}
## Configuration
oCIS Single Binary is not responsible for configuring extensions. Instead, each extension could either be configured by environment variables, cli flags or config files.
Each extension has its dedicated documentation page (e.g. <https://owncloud.github.io/extensions/ocis_proxy/configuration>) which lists all possible configurations. Config files and environment variables are picked up if you use the `./bin/ocis server` command within the oCIS single binary. Command line flags must be set explicitly on the extensions subcommands.
Each extension has its dedicated documentation page (e.g. https://owncloud.github.io/extensions/ocis_proxy/configuration) which lists all possible configurations. Config files and environment variables are picked up if you use the `./bin/ocis server` command within the oCIS single binary. Command line flags must be set explicitly on the extensions subcommands.
### Configuration using config files
@@ -26,7 +25,7 @@ $HOME/.ocis
./config
```
For this configuration to be picked up, have a look at your extension `root` command and look for which default config name it has assigned. _i.e: ocis-proxy reads `proxy.json | yaml | toml ...`_.
For this configuration to be picked up, have a look at your extension `root` command and look for which default config name it has assigned. *i.e: ocis-proxy reads `proxy.json | yaml | toml ...`*.
So far we support the file formats `JSON` and `YAML`, if you want to get a full example configuration just take a look at [our repository](https://github.com/owncloud/ocis/tree/master/config), there you can always see the latest configuration format. These example configurations include all available options and the default values. The configuration file will be automatically loaded if it's placed at `/etc/ocis/ocis.yml`, `${HOME}/.ocis/ocis.yml` or `$(pwd)/config/ocis.yml`.
@@ -44,16 +43,16 @@ proxy for Reva/oCIS
Usage: `ocis-proxy [global options] command [command options] [arguments...]`
\--config-file | $PROXY_CONFIG_FILE
--config-file | $PROXY_CONFIG_FILE
: Path to config file.
\--log-level | $PROXY_LOG_LEVEL
--log-level | $PROXY_LOG_LEVEL
: Set logging level. Default: `info`.
\--log-pretty | $PROXY_LOG_PRETTY
--log-pretty | $PROXY_LOG_PRETTY
: Enable pretty logging. Default: `true`.
\--log-color | $PROXY_LOG_COLOR
--log-color | $PROXY_LOG_COLOR
: Enable colored logging. Default: `true`.
## Sub Commands
@@ -64,7 +63,7 @@ Check health status
Usage: `ocis-proxy health [command options] [arguments...]`
\--debug-addr | $PROXY_DEBUG_ADDR
--debug-addr | $PROXY_DEBUG_ADDR
: Address to debug endpoint. Default: `0.0.0.0:9109`.
### ocis-proxy server
@@ -73,62 +72,63 @@ Start integrated server
Usage: `ocis-proxy server [command options] [arguments...]`
\--tracing-enabled | $PROXY_TRACING_ENABLED
--tracing-enabled | $PROXY_TRACING_ENABLED
: Enable sending traces.
\--tracing-type | $PROXY_TRACING_TYPE
--tracing-type | $PROXY_TRACING_TYPE
: Tracing backend type. Default: `jaeger`.
\--tracing-endpoint | $PROXY_TRACING_ENDPOINT
--tracing-endpoint | $PROXY_TRACING_ENDPOINT
: Endpoint for the agent.
\--tracing-collector | $PROXY_TRACING_COLLECTOR
--tracing-collector | $PROXY_TRACING_COLLECTOR
: Endpoint for the collector. Default: `http://localhost:14268/api/traces`.
\--tracing-service | $PROXY_TRACING_SERVICE
--tracing-service | $PROXY_TRACING_SERVICE
: Service name for tracing. Default: `proxy`.
\--debug-addr | $PROXY_DEBUG_ADDR
--debug-addr | $PROXY_DEBUG_ADDR
: Address to bind debug server. Default: `0.0.0.0:9205`.
\--debug-token | $PROXY_DEBUG_TOKEN
--debug-token | $PROXY_DEBUG_TOKEN
: Token to grant metrics access.
\--debug-pprof | $PROXY_DEBUG_PPROF
--debug-pprof | $PROXY_DEBUG_PPROF
: Enable pprof debugging.
\--debug-zpages | $PROXY_DEBUG_ZPAGES
--debug-zpages | $PROXY_DEBUG_ZPAGES
: Enable zpages debugging.
\--http-addr | $PROXY_HTTP_ADDR
--http-addr | $PROXY_HTTP_ADDR
: Address to bind http server. Default: `0.0.0.0:9200`.
\--http-root | $PROXY_HTTP_ROOT
--http-root | $PROXY_HTTP_ROOT
: Root path of http server. Default: `/`.
\--asset-path | $PROXY_ASSET_PATH
--asset-path | $PROXY_ASSET_PATH
: Path to custom assets.
\--http-namespace | $PROXY_HTTP_NAMESPACE
--http-namespace | $PROXY_HTTP_NAMESPACE
: Set the base namespace for the http namespace. Default: `com.owncloud`.
\--transport-tls-cert | $PROXY_TRANSPORT_TLS_CERT
--transport-tls-cert | $PROXY_TRANSPORT_TLS_CERT
: Certificate file for transport encryption.
\--transport-tls-key | $PROXY_TRANSPORT_TLS_KEY
--transport-tls-key | $PROXY_TRANSPORT_TLS_KEY
: Secret file for transport encryption.
\--tls | $PROXY_TLS
--tls | $PROXY_TLS
: Use TLS (disable only if proxy is behind a TLS-terminating reverse-proxy).. Default: `true`.
\--jwt-secret | $PROXY_JWT_SECRET
--jwt-secret | $PROXY_JWT_SECRET
: Used to create JWT to talk to reva, should equal reva's jwt-secret. Default: `Pive-Fumkiu4`.
\--reva-gateway-addr | $PROXY_REVA_GATEWAY_ADDR
--reva-gateway-addr | $PROXY_REVA_GATEWAY_ADDR
: REVA Gateway Endpoint. Default: `127.0.0.1:9142`.
\--oidc-issuer | $PROXY_OIDC_ISSUER
--oidc-issuer | $PROXY_OIDC_ISSUER
: OIDC issuer. Default: `https://localhost:9200`.
\--oidc-insecure | $PROXY_OIDC_INSECURE
--oidc-insecure | $PROXY_OIDC_INSECURE
: OIDC allow insecure communication. Default: `true`.

View File

@@ -1,14 +1,13 @@
* * *
---
title: "Getting Started"
date: 2018-05-02T00:00:00+00:00
weight: 15
geekdocRepo: <https://github.com/owncloud/ocis-proxy>
geekdocRepo: https://github.com/owncloud/ocis-proxy
geekdocEditPath: edit/master/docs
geekdocFilePath: getting-started.md
---
## geekdocFilePath: getting-started.md
{{&lt; toc >}}
{{< toc >}}
## Installation
@@ -16,7 +15,7 @@ So far we are offering two different variants for the installation. You can choo
### Docker
Docker images for ocis-reva are hosted on <https://hub.docker.com/r/owncloud/ocis-proxy>.
Docker images for ocis-reva are hosted on https://hub.docker.com/r/owncloud/ocis-proxy.
The `latest` tag always reflects the current master branch.
@@ -26,7 +25,7 @@ docker pull owncloud/ocis-proxy
### Binaries
The pre-built binaries for different platforms are downloadable at <https://download.owncloud.com/ocis/ocis-proxy/> . Specific releases are organized in separate folders. They are in sync which every release tag on GitHub. The binaries from the current master branch can be found in <https://download.owncloud.com/ocis/ocis-proxy/testing/>
The pre-built binaries for different platforms are downloadable at https://download.owncloud.com/ocis/ocis-proxy/ . Specific releases are organized in separate folders. They are in sync which every release tag on GitHub. The binaries from the current master branch can be found in https://download.owncloud.com/ocis/ocis-proxy/testing/
```console
curl https://download.owncloud.com/ocis/ocis-proxy/1.0.0-beta1/ocis-proxy-1.0.0-beta1-darwin-amd64 --output ocis-proxy
@@ -42,6 +41,6 @@ The program provides a few sub-commands on execution. The available configuratio
The server command is used to start the http server. For further help please execute:
{{&lt; highlight txt >}}
{{< highlight txt >}}
ocis-proxy server --help
{{&lt; / highlight >}}
{{< / highlight >}}