Commit Graph

582 Commits

Author SHA1 Message Date
Florian Schade c0553c7273 [full-ci] enhancement: add more kql spec tests and simplify ast normalization (#7254)
* enhancement: add more kql spec tests and simplify ast normalization

* enhancement: kql parser error if query starts with AND

* enhancement: add kql docs and support for date and time only dateTimeRestriction queries

* enhancement: add the ability to decide how kql nodes get connected

connecting nodes (with edges) seem straight forward when not using group, the default connection for nodes with the same node is always OR. THis only applies for first level nodes, for grouped nodes it is defined differently. The KQL docs are saying, nodes inside a grouped node, with the same key are connected by a AND edge.

* enhancement: explicit error handling for falsy group nodes and queries with leading binary operator

* enhancement: use optimized grammar for kql parser and toolify pigeon

* enhancement: simplify error handling

* fix: kql implicit 'AND' and 'OR' follows the ms html spec instead of the pdf spec
2023-09-11 13:49:53 +02:00
jkoberg 732228ed88 add clientlog service
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-09-07 10:56:58 +02:00
Jörn Friedrich Dreyer f1d09af547 support AD FS (#7140)
* support AD FS

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* drop unnecessary else

Co-authored-by: kobergj <jkoberg@owncloud.com>

---------

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
Co-authored-by: kobergj <jkoberg@owncloud.com>
2023-09-01 15:25:06 +02:00
jkoberg 90ce1a7ad0 add auth-service
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-08-31 12:11:44 +02:00
kobergj 9eb73f0ba3 Merge pull request #6992 from fschade/sse-service
enhancement: add sse service skeleton
2023-08-30 09:36:49 +02:00
Ralf Haferkamp 6dac1285f1 Fix GoCloak interface defintion for 13.8.0 2023-08-30 09:32:48 +02:00
Florian Schade 96292ba4b6 enhancement: add sse service skeleton 2023-08-29 13:59:39 +02:00
jkoberg 4d3b7355f1 release 4.0.0
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-08-23 15:15:44 +02:00
Jörn Friedrich Dreyer 5422586bfa allow skipping userinfo call
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-08-23 13:56:48 +02:00
Christian Richter d7139d4127 remove deprecated variables
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-08-22 17:25:24 +02:00
Daniel Swärd f805589e9d Update sharing and ocdav tracing. (#7014) 2023-08-21 12:27:37 +02:00
Daniel Swärd f0e2b50675 Partially revert removal of believed unused reva tracing initialization. 2023-08-21 10:37:12 +02:00
Daniel Swärd d41f1ac8f4 Remove unused reva tracing initialization. (#7011) 2023-08-14 09:34:27 +02:00
Michael Barz 95460ab9a5 prepare changelog, bump version 2023-08-02 12:49:51 +02:00
Daniel Swärd 6a5e21eff4 Replacing implicit grpc client initialization with explicit package local variables. 2023-07-31 12:57:59 +02:00
Daniel Swärd 44d9c50f1e Merge pull request #6907 from owncloud/excds/feature/Separate_out_grpc_client_to_package_local_for_thumbnails_service
Separate out grpc client to package local for thumbnails service.
2023-07-28 09:39:36 +02:00
Daniel Swärd d21b03b14c Separate out grpc client to package local for thumbnails service. 2023-07-27 12:22:28 +02:00
Daniël Franke 22f5a76829 Add default config to service.
Also modify `GetServiceTraceProvider` to keep working if nil or nil
interface is passed.
2023-07-27 11:25:32 +02:00
Daniël Franke c76b2e75ef Add another NewNoopTracerProvider 2023-07-26 12:17:30 +02:00
Daniël Franke 162b04f873 Add dummy provider if none is set 2023-07-26 12:17:26 +02:00
kobergj d8bbe7eeaf Merge pull request #6881 from kobergj/UsePutForNats
Use PUT registry for nats
2023-07-26 12:00:37 +02:00
Daniel Swärd 3c02f3b355 Merge pull request #6856 from owncloud/ainmosni/tracing/idp
Convert IDP service to service trace provider.
2023-07-26 11:18:18 +02:00
jkoberg c942c7a6dd use "put" registry for nats
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-07-25 11:21:32 +02:00
kobergj 31226e2134 improve documentation
Co-authored-by: Martin <github@diemattels.at>
2023-07-25 11:08:04 +02:00
jkoberg 89785d0976 configurable max message size
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-07-25 11:08:01 +02:00
Daniël Franke d2d0461375 Convert IDP service to service trace provider.
This converts the IDP service to use the service trace provider.
2023-07-20 13:36:08 +02:00
Michael Barz d807af752e bump version, prepare changelog 2023-07-18 11:56:32 +02:00
mmattel f55d4a8e37 Fix envvar descriptions in shared_types.go 2023-07-17 10:45:26 +02:00
Daniël Franke 96557a95ae Add tracing to settings service.
This adds tracing to the settings service. It uses the otelchi package
and passes the tracing provider to the grpc and http servers.
2023-06-27 12:31:19 +02:00
Daniël Franke 8f7521eff7 Move away from global tracers. (#6591)
* Move away from global tracers.

This PR moves away from global tracers and instead initialises
a tracer provider at Service setup and passes it where it needs to be.

* Change tracing provider to be set via options.

Also change name for GetServiceTraceProvider.

* Add changelog.
2023-06-23 14:20:26 +02:00
Michael Barz d8b937a362 bump version 2023-06-19 10:55:19 +02:00
Michael Barz 8d0e4bf64b Bump version 2023-06-08 22:17:00 +02:00
Florian Schade 4f26424db6 [full-ci] enhancement: use reva client pool selectors (#6452)
* enhancement: use reva client pool selectors

register mock service to registry and pass tests

* enhancement: bump reva

* Fix a couple of linter issues

---------

Co-authored-by: Ralf Haferkamp <rhaferkamp@owncloud.com>
2023-06-08 12:41:04 +02:00
Michael Barz 91d159c56f prepare changelog, bump version 2023-06-06 22:35:39 +02:00
Michael Barz 67294e2c83 prepare changelog, bump version 2023-06-06 15:12:18 +02:00
Jörn Friedrich Dreyer 632b206675 trace proxie middlewares (#6313)
* trace proxie middlewares

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* Update ocis-pkg/service/grpc/client.go

Co-authored-by: Christian Richter <1058116+dragonchaser@users.noreply.github.com>

* default tls is off

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

---------

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
Co-authored-by: Christian Richter <1058116+dragonchaser@users.noreply.github.com>
2023-05-27 10:18:24 +02:00
Jörn Friedrich Dreyer b8bdd4573a introduce otlp tracing (#5132)
* introduce otel tracing

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* use new trace provider initialization

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* work

* bump reva

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* remove commented code

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* add vendor changes

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

---------

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-05-26 22:21:03 +02:00
Michael Barz 46696bffeb prepare changelog, bump version 2023-05-22 14:33:15 +02:00
Phil Davis f19830e919 Reword 'allows to' sentences 2023-05-18 09:46:25 +05:45
Michael Barz aed04c983f bump version, prepare changelog 2023-05-08 17:28:42 +02:00
Michael Barz 7615c1546e Bump version, prepare changelog 2023-05-03 22:38:04 +02:00
jkoberg 7e055e782f fix newline handling for markdown creation
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-04-28 15:02:50 +02:00
Christian Richter b1015b3d2c fix wrong compile date (#6132)
* fix  wrong compile date

Signed-off-by: Christian Richter <crichter@owncloud.com>

* add changelog

Signed-off-by: Christian Richter <crichter@owncloud.com>

---------

Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-27 12:36:43 +02:00
Ralf Haferkamp b7990875c1 oidc: Remove "aud" claim validation of logout tokens (#6156)
The "aud" claim of the logout token is supposed to contain the client-id
of the client for which the token was issued. Our current implementation of
validating that claim is somewhat broken. We only allow to configure a single
value for the allowed client id. But we have different client-ids
accessing oCIS.

This completely removes the current validation of the `aud` claim until
we come up with a working solution. As we currently require a session id
to be present in the logout token the risk not validating the `aud`
claim is pretty low.

Related: #6149
2023-04-27 10:34:09 +02:00
Michael Barz 549cd92d97 prepare changelog, bump version 2023-04-24 15:39:36 +02:00
Andre Duffeck 77bb3d8bcd [full-ci] Refactor stores (#6019)
* Streamline the store implementation with and into reva

* Adapt to the cache/store refactoring in reva

* Streamline config options and their env vars

* Apply suggestions from code review

Co-authored-by: Martin <github@diemattels.at>

* Use the same database for all stores

* Bump reva

* Configure stat and filemetadata cache separately

* Fix default config

---------

Co-authored-by: Martin <github@diemattels.at>
2023-04-24 15:13:35 +02:00
Christian Richter 4a347e8c13 Fix nil pointer exception in webfinger
Co-authoredjby: Jörn Dreyer <jdreyer@owncloud.com>
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-21 16:16:26 +02:00
Ralf Haferkamp 70a80125c3 Fix backchannel logout
Use access token to lookup session id. The userinfo endpoint does
not return the session id. Also add some debug logging.

Co-authored-by: Christian Richter <crichter@owncloud.com>
Co-authored-by: Michael Barz <mbarz@owncloud.com>
2023-04-20 18:04:52 +02:00
Christian Richter ed59d25464 Merge pull request #6007 from dragonchaser/backchannellogout
[full-ci] Implement backchannel logout
2023-04-20 13:23:23 +02:00
Christian Richter a6ced1f99f Simplifiy Unmarshall function for stringAsBool struct
Co-authored-by: Julian Koberg <jkoberg@owncloud.com>
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-20 11:45:13 +02:00