Commit Graph

68 Commits

Author SHA1 Message Date
Jörn Friedrich Dreyer
971dbe8682 bump lico to 0.59.4 (#5768)
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-03-08 17:25:55 +01:00
David Christofas
7750492de4 Merge pull request #5721 from owncloud/clean-up-code
reduce duplication in configuration code
2023-03-07 10:58:33 +01:00
Benedikt Kulmann
e0d974dda9 chore: update pnpm lock file 2023-03-07 10:10:43 +01:00
dependabot[bot]
58f5845f2a Bump react-redux from 7.2.9 to 8.0.5 in /services/idp
Bumps [react-redux](https://github.com/reduxjs/react-redux) from 7.2.9 to 8.0.5.
- [Release notes](https://github.com/reduxjs/react-redux/releases)
- [Changelog](https://github.com/reduxjs/react-redux/blob/master/CHANGELOG.md)
- [Commits](https://github.com/reduxjs/react-redux/compare/v7.2.9...v8.0.5)

---
updated-dependencies:
- dependency-name: react-redux
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-03-07 10:10:43 +01:00
David Christofas
924c2ca346 add missing comments 2023-03-06 19:01:16 +01:00
David Christofas
63fa35fa50 reduce duplication in configuration code 2023-03-06 16:52:44 +01:00
Ralf Haferkamp
9e73b17a40 idp: Utilize ownCloudUserEnabled Attribute to filter users
This adds support for configuring an LDAP Attribute that can be used as a flag
to disallow users to login. We currently default to 'ownCloudUserEnabled' as
used in the default configuration of the graph service.
2023-02-22 11:23:26 +01:00
Martin
3e39e49a73 Update services/idp/README.md 2023-02-22 11:13:25 +01:00
Martin
9c7bc86902 Update services/idp/README.md 2023-02-22 11:13:25 +01:00
Martin
d30d042ec1 Update services/idp/README.md 2023-02-22 11:13:25 +01:00
Ralf Haferkamp
5dd374eb7a Add README for idp service 2023-02-22 11:13:25 +01:00
mmattel
210cd54817 fix some envvar descriptions 2023-02-03 09:40:35 +01:00
Jörn Friedrich Dreyer
32cc9beb0b walk and log chi routes, ocs cleanup (#5428)
* walk and log chi routes, ocs cleanup

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* make linter happy

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-01-23 12:30:34 +01:00
David Christofas
efe1fc52e0 fix nilerr bugs 2022-12-21 14:45:50 +01:00
Jörn Friedrich Dreyer
53d15d329e remove deprecated use of ioutil (#5205)
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-12-08 14:44:53 +01:00
Willy Kloucek
d3a17bd4be add nodejs dependencies to license tarball 2022-11-25 09:35:57 +01:00
mmattel
3cad3fbf2d env descriptions that needed a fix 2022-11-24 09:56:52 +01:00
Ralf Haferkamp
ee54a4c30c Update/align a few TLS variable description
Fixes: 5073
2022-11-23 13:07:29 +01:00
Willy Kloucek
45de2c6645 lower default access / id / refresh token lifespans 2022-11-18 15:02:02 +01:00
Ralf Haferkamp
b24d126b30 Introduce TLS Settings for go-micro based http services
TLS for the services can be configure by setting the "OCIS_HTTP_TLS_ENABLED",
"OCIS_HTTP_TLS_CERTIFICATE" and "OCIS_HTTP_TLS_KEY" environment variables.
Currently the ocis proxy is this only service that directly accesses backend
services. It determines whether to use TLS or not by looking a the new registry
metadata "use_tls". As specific CA Cert for certificate verification
can be set with the "PROXY_HTTPS_CACERT" environment variable.
2022-11-03 11:58:53 +01:00
Ralf Haferkamp
ee974afebf [full-ci] Introduce TLS Settings for go-micro based grpc services and clients (#4901)
* Introduce TLS Settings for go-micro based grpc services and clients

TLS for the services can be configure by setting the OCIS_MICRO_GRPC_TLS_ENABLED"
"OCIS_MICRO_GRPC_TLS_CERTIFICATE" and "OCIS_MICRO_GRPC_TLS_KEY"
enviroment variables.

TLS for the clients can configured by setting the "OCIS_MICRO_GRPC_CLIENT_TLS_MODE"
and "OCIS_MICRO_GRPC_CLIENT_TLS_CACERT" variables.

By default TLS is disabled.

Co-authored-by: Martin <github@diemattels.at>

* Unify TLS configuration for all grpc services

All grpc service (whether they're based on reva) or go-micro use the
same set of config vars now.

TLS for the services can be configure by setting the OCIS_GRPC_TLS_ENABLED,
OCIS_GRPC_TLS_CERTIFICATE and OCIS_GRPC_TLS_KEY enviroment variables.

TLS for the clients can configured by setting the OCIS_GRPC_CLIENT_TLS_MODE
and OCIS_MICRO_GRPC_CLIENT_TLS_CACERT variables.

There are no individual per service config vars currently. If really
needed, per service tls configurations can be specified via config file.

Co-authored-by: Martin <github@diemattels.at>

Co-authored-by: Martin <github@diemattels.at>
2022-11-03 10:17:08 +01:00
Benedikt Kulmann
2b27b0c8bf Merge pull request #4892 from owncloud/pnpm-2
[full-ci] Build idp and settings frontends with pnpm
2022-10-27 10:35:12 +02:00
Benedikt Kulmann
b3225a0dc9 fix: clear loading state if consent or logon received 2022-10-25 14:53:00 +02:00
Ralf Haferkamp
3d57f5cc21 Introduce TLS Settings for all reva grpc services and clients 2022-10-25 11:50:08 +02:00
Ralf Haferkamp
e373e48383 Get rid of duplicated Reva config struct
Consolidate all services to use the Reva config struct for the shared package.
This works because all services (except 'notifications', 'thumbnails' and
'webdav') where using the same config keys and environment variables for
setting the reva gateway.
2022-10-25 11:50:08 +02:00
Dominik Schmidt
8d342851d7 Do not set store-dir in Makefiles 2022-10-25 11:12:51 +02:00
Dominik Schmidt
b195c6bb0d Build idp and settings frontends with pnpm 2022-10-24 20:31:56 +02:00
David Christofas
3babaf1a4d remove the graph-explorer servier from ocis (#4733) 2022-10-04 15:55:30 +02:00
David Christofas
cb7d26d061 remove the Open Sans font 2022-09-15 13:39:26 +02:00
Jannik Stehle
213a68ec69 Fix translations on login page 2022-09-02 15:07:54 +02:00
Jannik Stehle
a9fd209da8 Use cv11 as font feature setting 2022-09-02 13:51:59 +02:00
Jannik Stehle
99255c1cdd Add 'Inter' font, change placeholder color to grey 2022-09-02 13:47:52 +02:00
Jannik Stehle
52b58cd1d9 Move background-size after the background css prop 2022-09-02 09:56:53 +02:00
Jannik Stehle
dff588a621 Improve login screen design 2022-09-02 09:46:32 +02:00
Willy Kloucek
9f2be9f4f9 remove Log prefix from configlog functions 2022-08-22 08:08:18 +02:00
Willy Kloucek
e58eaabdeb move config parse error logging into function to ensure new lines and don't parse config for help 2022-08-18 15:27:28 +02:00
Willy Kloucek
60689c9c1a improve unsupervised description 2022-08-18 10:59:35 +02:00
Willy Kloucek
6154466bbc rename extensions to services (leftover occurences) 2022-08-17 15:36:52 +02:00
Willy Kloucek
19e3169800 let idp init private key also if the file already exists and is empty 2022-08-15 11:15:38 +02:00
Ralf Haferkamp
946f3e8feb Remove unused BindEnv code
We dropped this in favour of envdecode a while ago.
2022-07-14 16:34:25 +02:00
Martin
d2ec1187bc Apply suggestions from code review 2022-07-08 16:03:17 +02:00
Willy Kloucek
02774a5378 add missing config descriptions 2022-07-08 15:32:26 +02:00
mmattel
246377b35b Env variable text fixes 2022-07-07 19:53:27 +05:45
Jörn Friedrich Dreyer
2e640424cf Merge pull request #4076 from aduffeck/enabled-machine-auth-in-ocdav
[full-ci] Enable machine auth in ocdav
2022-07-05 18:14:41 +00:00
Ralf Haferkamp
4a09d8a948 Remove redundant setting of cli.HelpFlag
The help flag is configured automatically by default already. We don't
need to redo that for every single service.

This also addresses one of the finding of "go race" (#4088)
2022-07-05 14:59:06 +02:00
André Duffeck
c2b163afe6 Improve description of the machine auth api key config options 2022-07-05 11:05:33 +02:00
David Christofas
a9b66d4189 Merge pull request #4093 from wkloucek/improve-startup-errors
improve startup error logging
2022-07-05 10:56:36 +02:00
Willy Kloucek
f02591b5c3 improve startup error logging 2022-07-05 10:12:46 +02:00
David Christofas
2f1cdfac62 fix linter warning 2022-07-04 18:25:54 +02:00
David Christofas
530d8f3bda change eslint parser 2022-07-04 18:03:20 +02:00