Commit Graph

23 Commits

Author SHA1 Message Date
Ralf Haferkamp
8b704085ce Allow ADMIN_USER_ID being empty (#5842)
For certain setups we don't need the ADMIN_USER_ID to be set. It is
mainly needed for bootstrapping the internal idm and the initial role
assignment.  If roles are assigned by other means (e.g. OIDC claims
in the future) we don't need it.

This makes the ADMIN_USER_ID optional, also if ADMIN_USER_ID is unset
we don't need to configure a password for the admin user. We will still
generated the admin_id and password when running 'ocis init', but it is
ok to run manual setups without those settings.
2023-03-15 16:15:18 +01:00
David Christofas
63fa35fa50 reduce duplication in configuration code 2023-03-06 16:52:44 +01:00
Ralf Haferkamp
b24d126b30 Introduce TLS Settings for go-micro based http services
TLS for the services can be configure by setting the "OCIS_HTTP_TLS_ENABLED",
"OCIS_HTTP_TLS_CERTIFICATE" and "OCIS_HTTP_TLS_KEY" environment variables.
Currently the ocis proxy is this only service that directly accesses backend
services. It determines whether to use TLS or not by looking a the new registry
metadata "use_tls". As specific CA Cert for certificate verification
can be set with the "PROXY_HTTPS_CACERT" environment variable.
2022-11-03 11:58:53 +01:00
Ralf Haferkamp
ee974afebf [full-ci] Introduce TLS Settings for go-micro based grpc services and clients (#4901)
* Introduce TLS Settings for go-micro based grpc services and clients

TLS for the services can be configure by setting the OCIS_MICRO_GRPC_TLS_ENABLED"
"OCIS_MICRO_GRPC_TLS_CERTIFICATE" and "OCIS_MICRO_GRPC_TLS_KEY"
enviroment variables.

TLS for the clients can configured by setting the "OCIS_MICRO_GRPC_CLIENT_TLS_MODE"
and "OCIS_MICRO_GRPC_CLIENT_TLS_CACERT" variables.

By default TLS is disabled.

Co-authored-by: Martin <github@diemattels.at>

* Unify TLS configuration for all grpc services

All grpc service (whether they're based on reva) or go-micro use the
same set of config vars now.

TLS for the services can be configure by setting the OCIS_GRPC_TLS_ENABLED,
OCIS_GRPC_TLS_CERTIFICATE and OCIS_GRPC_TLS_KEY enviroment variables.

TLS for the clients can configured by setting the OCIS_GRPC_CLIENT_TLS_MODE
and OCIS_MICRO_GRPC_CLIENT_TLS_CACERT variables.

There are no individual per service config vars currently. If really
needed, per service tls configurations can be specified via config file.

Co-authored-by: Martin <github@diemattels.at>

Co-authored-by: Martin <github@diemattels.at>
2022-11-03 10:17:08 +01:00
Ralf Haferkamp
c6664cfe61 Fix share/space link in notification mail
Use OCIS_URL as the link base. This change also makes sure that the
top-level OcisURL config value gets a default assigned, even when
OCIS_URL is unset.

Fixes: #4688
2022-09-29 16:26:21 +02:00
Juan Pablo Villafañez
6ee4a084a2 Use go-micro store to cache the roles (#4337)
* Use go-micro store to cache the roles

Add custom in-memory implementation

* replace redis with custom etcd implementation

* adjust table name for the cache in the roles manager

* Fix tests

* Fix sonarcloud issues

* Refactor for sonarcloud

* Allow configuration of cache per service

* Reuse parent context in etcd implementation
2022-09-16 15:42:47 +02:00
Willy Kloucek
6154466bbc rename extensions to services (leftover occurences) 2022-08-17 15:36:52 +02:00
Willy Kloucek
27b2fbe7e0 fix configuration validation for extensions' server commands 2022-06-02 09:57:45 +02:00
Michael Barz
4b71cd40af Merge pull request #3678 from owncloud/v2
Update ocis packages and imports to V2
2022-05-04 16:36:01 +02:00
kobergj
eb59d2291e MachineAuthAPIKey -> SystemUserAPIKey (#3672)
* split machineauthapikey and systemuserapikey

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* changelog

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* specific errors and some reverts

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* use correct machine auth api key

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Co-authored-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-05-04 15:48:02 +02:00
Michael Barz
189987bcbd Bump major version to v2 2022-05-04 14:49:59 +02:00
Ralf Haferkamp
d6bf26c744 Rename ADMIN_USER_ID env var to OCIS_ADMIN_USER_ID
Also let the top-level ocis config validator error out if admin_user_id
is unset at start.
2022-05-04 12:42:28 +02:00
Ralf Haferkamp
7ef205d232 Get rid of hardcoded admin user uuid
The UUID is generated by `ocs init` now and stored in the config file.
To avoid that every ocis install uses the same UUID

Closes: #3524
2022-05-04 12:42:28 +02:00
kobergj
5346299e6d MetadataUserID -> SystemUserID (#3671)
* replace MetadataUserID with SystemUserID

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* the missing change

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* changelog

Signed-off-by: jkoberg <jkoberg@owncloud.com>
2022-05-04 11:41:37 +02:00
Jörn Friedrich Dreyer
f88c000bac generate metadata user id
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-05-02 12:36:30 +00:00
Christian Richter
72688b3650 move generic secret errors to shared, fix edgecase in cli flags
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-29 11:15:13 +02:00
Willy Kloucek
4e531ca442 fix ocis startup with debugging config / environment variables only 2022-04-28 16:28:12 +02:00
Willy Kloucek
3a9ba10dc4 fix and restructure ocis-pkg config parser 2022-04-28 15:34:31 +02:00
Christian Richter
58a24e620e Move reva transfer secret to shared.Commons
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-26 14:10:03 +02:00
Christian Richter
a4d7696232 Move machine-auth-api-key to shared.Commons
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-26 10:20:15 +02:00
Christian Richter
acf75afebc Move Tokenmanager to shared.Commons
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-25 16:35:10 +02:00
Willy Kloucek
6ef6d1117c fix condition for nil pointer in common config 2022-01-13 08:13:14 +01:00
Willy Kloucek
55bf175bea move config parsing in separate package for each service 2022-01-03 15:21:56 +01:00