Daniël Franke
96557a95ae
Add tracing to settings service.
...
This adds tracing to the settings service. It uses the otelchi package
and passes the tracing provider to the grpc and http servers.
2023-06-27 12:31:19 +02:00
Daniël Franke
8f7521eff7
Move away from global tracers. ( #6591 )
...
* Move away from global tracers.
This PR moves away from global tracers and instead initialises
a tracer provider at Service setup and passes it where it needs to be.
* Change tracing provider to be set via options.
Also change name for GetServiceTraceProvider.
* Add changelog.
2023-06-23 14:20:26 +02:00
Michael Barz
d8b937a362
bump version
2023-06-19 10:55:19 +02:00
Michael Barz
8d0e4bf64b
Bump version
2023-06-08 22:17:00 +02:00
Florian Schade
4f26424db6
[full-ci] enhancement: use reva client pool selectors ( #6452 )
...
* enhancement: use reva client pool selectors
register mock service to registry and pass tests
* enhancement: bump reva
* Fix a couple of linter issues
---------
Co-authored-by: Ralf Haferkamp <rhaferkamp@owncloud.com >
2023-06-08 12:41:04 +02:00
Michael Barz
91d159c56f
prepare changelog, bump version
2023-06-06 22:35:39 +02:00
Michael Barz
67294e2c83
prepare changelog, bump version
2023-06-06 15:12:18 +02:00
Jörn Friedrich Dreyer
632b206675
trace proxie middlewares ( #6313 )
...
* trace proxie middlewares
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
* Update ocis-pkg/service/grpc/client.go
Co-authored-by: Christian Richter <1058116+dragonchaser@users.noreply.github.com >
* default tls is off
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
---------
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
Co-authored-by: Christian Richter <1058116+dragonchaser@users.noreply.github.com >
2023-05-27 10:18:24 +02:00
Jörn Friedrich Dreyer
b8bdd4573a
introduce otlp tracing ( #5132 )
...
* introduce otel tracing
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
* use new trace provider initialization
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
* work
* bump reva
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
* remove commented code
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
* add vendor changes
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
---------
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-05-26 22:21:03 +02:00
Michael Barz
46696bffeb
prepare changelog, bump version
2023-05-22 14:33:15 +02:00
Phil Davis
f19830e919
Reword 'allows to' sentences
2023-05-18 09:46:25 +05:45
Michael Barz
aed04c983f
bump version, prepare changelog
2023-05-08 17:28:42 +02:00
Michael Barz
7615c1546e
Bump version, prepare changelog
2023-05-03 22:38:04 +02:00
jkoberg
7e055e782f
fix newline handling for markdown creation
...
Signed-off-by: jkoberg <jkoberg@owncloud.com >
2023-04-28 15:02:50 +02:00
Christian Richter
b1015b3d2c
fix wrong compile date ( #6132 )
...
* fix wrong compile date
Signed-off-by: Christian Richter <crichter@owncloud.com >
* add changelog
Signed-off-by: Christian Richter <crichter@owncloud.com >
---------
Signed-off-by: Christian Richter <crichter@owncloud.com >
2023-04-27 12:36:43 +02:00
Ralf Haferkamp
b7990875c1
oidc: Remove "aud" claim validation of logout tokens ( #6156 )
...
The "aud" claim of the logout token is supposed to contain the client-id
of the client for which the token was issued. Our current implementation of
validating that claim is somewhat broken. We only allow to configure a single
value for the allowed client id. But we have different client-ids
accessing oCIS.
This completely removes the current validation of the `aud` claim until
we come up with a working solution. As we currently require a session id
to be present in the logout token the risk not validating the `aud`
claim is pretty low.
Related: #6149
2023-04-27 10:34:09 +02:00
Michael Barz
549cd92d97
prepare changelog, bump version
2023-04-24 15:39:36 +02:00
Andre Duffeck
77bb3d8bcd
[full-ci] Refactor stores ( #6019 )
...
* Streamline the store implementation with and into reva
* Adapt to the cache/store refactoring in reva
* Streamline config options and their env vars
* Apply suggestions from code review
Co-authored-by: Martin <github@diemattels.at >
* Use the same database for all stores
* Bump reva
* Configure stat and filemetadata cache separately
* Fix default config
---------
Co-authored-by: Martin <github@diemattels.at >
2023-04-24 15:13:35 +02:00
Christian Richter
4a347e8c13
Fix nil pointer exception in webfinger
...
Co-authoredjby: Jörn Dreyer <jdreyer@owncloud.com >
Signed-off-by: Christian Richter <crichter@owncloud.com >
2023-04-21 16:16:26 +02:00
Ralf Haferkamp
70a80125c3
Fix backchannel logout
...
Use access token to lookup session id. The userinfo endpoint does
not return the session id. Also add some debug logging.
Co-authored-by: Christian Richter <crichter@owncloud.com >
Co-authored-by: Michael Barz <mbarz@owncloud.com >
2023-04-20 18:04:52 +02:00
Christian Richter
ed59d25464
Merge pull request #6007 from dragonchaser/backchannellogout
...
[full-ci] Implement backchannel logout
2023-04-20 13:23:23 +02:00
Christian Richter
a6ced1f99f
Simplifiy Unmarshall function for stringAsBool struct
...
Co-authored-by: Julian Koberg <jkoberg@owncloud.com >
Signed-off-by: Christian Richter <crichter@owncloud.com >
2023-04-20 11:45:13 +02:00
Christian Richter
30bcf32062
incorporate requested changes
...
Signed-off-by: Christian Richter <crichter@owncloud.com >
2023-04-20 09:00:58 +02:00
Michael Barz
8b8859950f
Merge pull request #6067 from owncloud/ainmosni/feature/search-keycloak-by-username
...
Search users by username instead of by email
2023-04-19 22:00:30 +02:00
Christian Richter
e88a0d7bc3
add tests for oidc backchannel logout
...
Signed-off-by: Christian Richter <crichter@owncloud.com >
2023-04-19 17:32:49 +02:00
Christian Richter
15691ae78a
fix contexts, render result
...
Signed-off-by: Christian Richter <crichter@owncloud.com >
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
d2d7c49df4
properly parse logout request
...
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
a98a880e7d
move code, delete duplicate lines
...
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
dc399a61ac
implement backchannel logout, reuse useringo cache
...
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
bc15b8a396
work on logout
...
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
b608d0b0f9
move verify access token code to oidc client
...
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
469534b321
small cleanup
...
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
58dce9bed8
use our oidc client
...
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
014308ddc9
introduce oidc client, based on coreos go-oidc
...
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de >
2023-04-19 17:32:25 +02:00
Christian Richter
a3640b0565
extract full claims from jwt token to get session id
...
Signed-off-by: Christian Richter <crichter@owncloud.com >
2023-04-19 17:32:23 +02:00
mmattel
eacc17e99b
[docs-only] Improve special envvar description
2023-04-19 13:44:58 +02:00
Daniël Franke
a52ebd1f79
Make getUserByParams private.
2023-04-19 10:46:50 +02:00
Daniël Franke
81491efdc7
Remove GetUserByEmail method.
2023-04-19 10:19:07 +02:00
jkoberg
0f99a8071b
more test fixes
...
Signed-off-by: jkoberg <jkoberg@owncloud.com >
2023-04-18 11:59:00 +02:00
Michael Barz
e73d5493db
add optional services and fix config slice parser
2023-04-18 11:58:02 +02:00
Daniël Franke
30edab9f69
Search users by username instead of by email
...
As some setups don't have email addresses setup or reuse email
addresses, the keycloak search has to be done by username as that
is guaranteed to always be unique and defined.
This PR changes that.
2023-04-18 11:43:13 +02:00
Michael Barz
3ed6786185
add sessions to report
2023-04-17 14:37:06 +02:00
Daniël Franke
d81065c1b6
Adds JSON tags to PII report.
...
This will make the JSON export look a bit prettier.
2023-04-14 15:09:54 +02:00
Daniël Franke
3ec5c0f6ed
Don't check for attributes if no attributes set.
...
If no attributes are set, the attributes property is nil. This
causes a panic if keycloak has no custom attributes.
This patch checks for nil before accessing the attributes.
2023-04-14 15:09:54 +02:00
jkoberg
c9d0e876f7
use mail instead id to get user
...
Signed-off-by: jkoberg <jkoberg@owncloud.com >
2023-04-14 15:09:54 +02:00
Daniel Swärd
32937d0977
Apply suggestions from code review
...
Co-authored-by: Martin <github@diemattels.at >
2023-04-05 12:48:37 +02:00
Daniel Swärd
afbfd2d6b2
Deprecating and renaming many environment variables
...
Fixes #5767
Fixes #5905
Fixes #5532
2023-04-05 11:05:48 +02:00
Michael Barz
ef27b7695a
bump alpha version
2023-04-04 09:10:24 +02:00
Daniël Franke
a0686c4f47
Fix feedback from @kobergj
2023-03-30 12:41:57 +02:00
Daniël Franke
bc9ba63b06
Fix tests for invitations service.
2023-03-30 11:12:00 +02:00