Commit Graph

476 Commits

Author SHA1 Message Date
kobergj
341cdc9dd3 Merge pull request #5207 from kobergj/AsyncPostprocessing
[full-ci] Async Postprocessing
2022-12-16 11:58:24 +01:00
Jörn Friedrich Dreyer
70a6323c42 token middleware: use constant time comparison (#5225)
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-12-14 14:04:02 +01:00
Jörn Friedrich Dreyer
53d15d329e remove deprecated use of ioutil (#5205)
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-12-08 14:44:53 +01:00
jkoberg
06f3f5adb3 start pp service in single binary
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2022-12-08 11:49:04 +01:00
Michael Barz
ab57daf462 prepare release, bump version 2022-11-29 23:16:49 +01:00
Michael Barz
65849896b7 prepare release, bump version 2022-11-25 17:46:14 +01:00
Ralf Haferkamp
ee54a4c30c Update/align a few TLS variable description
Fixes: 5073
2022-11-23 13:07:29 +01:00
Willy Kloucek
3e4068e2a0 fix OCIS_GRPC_CLIENT_TLS_CACERT annotation 2022-11-15 14:49:31 +01:00
Michael Barz
736f513cfc prepare changelog, bump version 2022-11-05 10:53:41 +01:00
Ralf Haferkamp
b24d126b30 Introduce TLS Settings for go-micro based http services
TLS for the services can be configure by setting the "OCIS_HTTP_TLS_ENABLED",
"OCIS_HTTP_TLS_CERTIFICATE" and "OCIS_HTTP_TLS_KEY" environment variables.
Currently the ocis proxy is this only service that directly accesses backend
services. It determines whether to use TLS or not by looking a the new registry
metadata "use_tls". As specific CA Cert for certificate verification
can be set with the "PROXY_HTTPS_CACERT" environment variable.
2022-11-03 11:58:53 +01:00
Ralf Haferkamp
cbe41fb85f Add method for creating in-memory certificates 2022-11-03 11:58:53 +01:00
Ralf Haferkamp
ee974afebf [full-ci] Introduce TLS Settings for go-micro based grpc services and clients (#4901)
* Introduce TLS Settings for go-micro based grpc services and clients

TLS for the services can be configure by setting the OCIS_MICRO_GRPC_TLS_ENABLED"
"OCIS_MICRO_GRPC_TLS_CERTIFICATE" and "OCIS_MICRO_GRPC_TLS_KEY"
enviroment variables.

TLS for the clients can configured by setting the "OCIS_MICRO_GRPC_CLIENT_TLS_MODE"
and "OCIS_MICRO_GRPC_CLIENT_TLS_CACERT" variables.

By default TLS is disabled.

Co-authored-by: Martin <github@diemattels.at>

* Unify TLS configuration for all grpc services

All grpc service (whether they're based on reva) or go-micro use the
same set of config vars now.

TLS for the services can be configure by setting the OCIS_GRPC_TLS_ENABLED,
OCIS_GRPC_TLS_CERTIFICATE and OCIS_GRPC_TLS_KEY enviroment variables.

TLS for the clients can configured by setting the OCIS_GRPC_CLIENT_TLS_MODE
and OCIS_MICRO_GRPC_CLIENT_TLS_CACERT variables.

There are no individual per service config vars currently. If really
needed, per service tls configurations can be specified via config file.

Co-authored-by: Martin <github@diemattels.at>

Co-authored-by: Martin <github@diemattels.at>
2022-11-03 10:17:08 +01:00
Ralf Haferkamp
89f2f2a87f Add documentation tags for grpc server TLS options 2022-10-25 11:50:08 +02:00
Ralf Haferkamp
3d57f5cc21 Introduce TLS Settings for all reva grpc services and clients 2022-10-25 11:50:08 +02:00
Michael Barz
f84fbdd6ff corrections from code review 2022-10-17 17:22:33 +02:00
Michael Barz
0b7297d1b4 harden drives api and improve logging 2022-10-16 00:38:44 +02:00
David Christofas
4623b6c8e7 Nats tls (#4781)
* use tls for nats connections

* add config options for nats client tls config

* add nats tls config to CI

* add function to create a certpool

* add option to provide a rootCA to validate the server's TLS certificate

* add option to provide a rootCA to validate the server's TLS certificate

* add option to provide a rootCA to validate the server's TLS certificate

* add option to provide a rootCA to validate the server's TLS certificate

* configure nats clients in reva to use tls
2022-10-12 14:56:47 +02:00
Ralf Haferkamp
b5bb6980e2 Fix condition for registry cache
We want caching for all registries except "memory".
2022-10-12 09:28:05 +02:00
Jörn Friedrich Dreyer
e9e9947f88 bring back CORS env vars (#4723)
* bring back CORS env vars

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* update CORS descriptions

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* align writing of 'A comma-separated ...'

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* fix some desc quotes

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* Apply suggestions from code review

Co-authored-by: Martin <github@diemattels.at>

* Apply more suggestions from code review

Co-authored-by: Martin <github@diemattels.at>

* Apply final suggestions from code review

Co-authored-by: Martin <github@diemattels.at>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
Co-authored-by: Martin <github@diemattels.at>
2022-10-04 16:56:05 +02:00
David Christofas
3babaf1a4d remove the graph-explorer servier from ocis (#4733) 2022-10-04 15:55:30 +02:00
Ralf Haferkamp
c6664cfe61 Fix share/space link in notification mail
Use OCIS_URL as the link base. This change also makes sure that the
top-level OcisURL config value gets a default assigned, even when
OCIS_URL is unset.

Fixes: #4688
2022-09-29 16:26:21 +02:00
Ralf Haferkamp
8f2bf0ed9c Default to in-memory registry in single-binary mode
This avoids various issues of the old "mdns" default. At least for the simple
single process setup (#3134, #4597). When starting the services individually we
still default to "mdns".
2022-09-26 16:25:56 +02:00
Ralf Haferkamp
01650a5023 Use lazy initialization for the default grpc client
This avoids using a public global variable. It allows us to initialize
the default client a bit later (outside of init()). That way we can e.g.
properly initialize the in-memory registry.
2022-09-26 16:25:56 +02:00
Juan Pablo Villafañez
6ee4a084a2 Use go-micro store to cache the roles (#4337)
* Use go-micro store to cache the roles

Add custom in-memory implementation

* replace redis with custom etcd implementation

* adjust table name for the cache in the roles manager

* Fix tests

* Fix sonarcloud issues

* Refactor for sonarcloud

* Allow configuration of cache per service

* Reuse parent context in etcd implementation
2022-09-16 15:42:47 +02:00
Ralf Haferkamp
fffd49fc4e Introduce "noop" go-micro broker
This introduces a no op broker for go-micro. It is set as the default
broker for all ocis http services. To avoid starting the default http
broker, which opens an unused random http port.

Fixes: https://github.com/owncloud/ocis/issues/3829
2022-09-14 12:22:23 +02:00
Michael Barz
826d45877c prepare release, bump version 2022-09-13 10:17:43 +02:00
Phil Davis
b79de5f356 Merge pull request #4462 from owncloud/fix-typo-2022-08-26
[docs-only] Fix typo 2022-08-26
2022-08-26 18:33:53 +05:45
Phil Davis
ef04aebc90 Fix grammar in README 2022-08-26 10:35:47 +05:45
Benedikt Kulmann
590f3bcbaa chore: prepare release bump version 2022-08-25 21:40:08 +02:00
Willy Kloucek
9f2be9f4f9 remove Log prefix from configlog functions 2022-08-22 08:08:18 +02:00
Willy Kloucek
e58eaabdeb move config parse error logging into function to ensure new lines and don't parse config for help 2022-08-18 15:27:28 +02:00
Willy Kloucek
6154466bbc rename extensions to services (leftover occurences) 2022-08-17 15:36:52 +02:00
Michael Barz
7c31082ed5 prepare release, bump version 2022-08-11 15:29:00 +02:00
jkoberg
f64ea7dc1b make runset a map
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2022-07-21 16:19:36 +02:00
kobergj
db363b6800 Update ocis-pkg/config/config.go
Co-authored-by: Phil Davis <phil@jankaritech.com>
2022-07-21 15:54:56 +02:00
jkoberg
4b8d1acdf4 allow providing list of services not to start
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2022-07-21 15:51:17 +02:00
Michael Barz
4340711b15 prepare release, bump version 2022-07-19 12:35:13 +02:00
Ralf Haferkamp
946f3e8feb Remove unused BindEnv code
We dropped this in favour of envdecode a while ago.
2022-07-14 16:34:25 +02:00
Willy Kloucek
9f0a31140f Merge pull request #4102 from wkloucek/fix-logging-levels
fix logging levels and go micro default log level
2022-07-11 09:31:19 +02:00
Bishop Clark
001b4301ab adjective order
Adjective order nit-correction in prepositions.
2022-07-09 12:48:15 -07:00
Ralf Haferkamp
875ad911db Fixup previous commit to avoid using blank imports 2022-07-07 17:16:28 +02:00
Willy Kloucek
ab960dcf97 fix OCIS_RUN_SERVICES 2022-07-07 15:21:29 +02:00
David Christofas
ce6f85de61 Merge pull request #4117 from owncloud/ldap-escape-dn
escape DN attribute values
2022-07-07 09:25:23 +02:00
David Christofas
00a27bfff4 fix the null byte replace 2022-07-06 17:25:49 +02:00
David Christofas
2707c2f4b4 escape DN attribute values 2022-07-06 15:16:43 +02:00
Willy Kloucek
33f6ee34fc fix logging levels and go-micro logging format 2022-07-05 13:49:30 +02:00
André Duffeck
c2b163afe6 Improve description of the machine auth api key config options 2022-07-05 11:05:33 +02:00
Willy Kloucek
627c79dea1 mask sensitive values in /config proxy debug server endpoint 2022-07-04 14:22:44 +02:00
Ralf Haferkamp
8d11ba02d3 Remove unused OpenID connect middleware
The proxy comes with it's own middleware. This implementation was used
by the graph service at some point but that went away with commit
5070941dc4.
2022-06-30 16:04:34 +02:00
Willy Kloucek
8f3b0c50cd Merge branch 'master' into config-doc-descriptions 2022-06-28 13:03:19 +02:00