Commit Graph

42 Commits

Author SHA1 Message Date
mmattel
bc6241a3dd Improve the description of the OCIS_ADMIN_USER_ID envvar 2023-02-09 12:50:01 +01:00
Ralf Haferkamp
ee54a4c30c Update/align a few TLS variable description
Fixes: 5073
2022-11-23 13:07:29 +01:00
Willy Kloucek
3e4068e2a0 fix OCIS_GRPC_CLIENT_TLS_CACERT annotation 2022-11-15 14:49:31 +01:00
Ralf Haferkamp
b24d126b30 Introduce TLS Settings for go-micro based http services
TLS for the services can be configure by setting the "OCIS_HTTP_TLS_ENABLED",
"OCIS_HTTP_TLS_CERTIFICATE" and "OCIS_HTTP_TLS_KEY" environment variables.
Currently the ocis proxy is this only service that directly accesses backend
services. It determines whether to use TLS or not by looking a the new registry
metadata "use_tls". As specific CA Cert for certificate verification
can be set with the "PROXY_HTTPS_CACERT" environment variable.
2022-11-03 11:58:53 +01:00
Ralf Haferkamp
ee974afebf [full-ci] Introduce TLS Settings for go-micro based grpc services and clients (#4901)
* Introduce TLS Settings for go-micro based grpc services and clients

TLS for the services can be configure by setting the OCIS_MICRO_GRPC_TLS_ENABLED"
"OCIS_MICRO_GRPC_TLS_CERTIFICATE" and "OCIS_MICRO_GRPC_TLS_KEY"
enviroment variables.

TLS for the clients can configured by setting the "OCIS_MICRO_GRPC_CLIENT_TLS_MODE"
and "OCIS_MICRO_GRPC_CLIENT_TLS_CACERT" variables.

By default TLS is disabled.

Co-authored-by: Martin <github@diemattels.at>

* Unify TLS configuration for all grpc services

All grpc service (whether they're based on reva) or go-micro use the
same set of config vars now.

TLS for the services can be configure by setting the OCIS_GRPC_TLS_ENABLED,
OCIS_GRPC_TLS_CERTIFICATE and OCIS_GRPC_TLS_KEY enviroment variables.

TLS for the clients can configured by setting the OCIS_GRPC_CLIENT_TLS_MODE
and OCIS_MICRO_GRPC_CLIENT_TLS_CACERT variables.

There are no individual per service config vars currently. If really
needed, per service tls configurations can be specified via config file.

Co-authored-by: Martin <github@diemattels.at>

Co-authored-by: Martin <github@diemattels.at>
2022-11-03 10:17:08 +01:00
Ralf Haferkamp
89f2f2a87f Add documentation tags for grpc server TLS options 2022-10-25 11:50:08 +02:00
Ralf Haferkamp
3d57f5cc21 Introduce TLS Settings for all reva grpc services and clients 2022-10-25 11:50:08 +02:00
Jörn Friedrich Dreyer
e9e9947f88 bring back CORS env vars (#4723)
* bring back CORS env vars

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* update CORS descriptions

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* align writing of 'A comma-separated ...'

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* fix some desc quotes

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* Apply suggestions from code review

Co-authored-by: Martin <github@diemattels.at>

* Apply more suggestions from code review

Co-authored-by: Martin <github@diemattels.at>

* Apply final suggestions from code review

Co-authored-by: Martin <github@diemattels.at>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
Co-authored-by: Martin <github@diemattels.at>
2022-10-04 16:56:05 +02:00
Juan Pablo Villafañez
6ee4a084a2 Use go-micro store to cache the roles (#4337)
* Use go-micro store to cache the roles

Add custom in-memory implementation

* replace redis with custom etcd implementation

* adjust table name for the cache in the roles manager

* Fix tests

* Fix sonarcloud issues

* Refactor for sonarcloud

* Allow configuration of cache per service

* Reuse parent context in etcd implementation
2022-09-16 15:42:47 +02:00
Willy Kloucek
6154466bbc rename extensions to services (leftover occurences) 2022-08-17 15:36:52 +02:00
André Duffeck
c2b163afe6 Improve description of the machine auth api key config options 2022-07-05 11:05:33 +02:00
Willy Kloucek
627c79dea1 mask sensitive values in /config proxy debug server endpoint 2022-07-04 14:22:44 +02:00
Willy Kloucek
6bebfabb65 improve descriptions 2022-06-28 08:19:13 +02:00
Willy Kloucek
9bf2661395 add more config doc descriptions 2022-06-21 09:13:38 +02:00
Willy Kloucek
444ffa5e75 add more configuration descriptions 2022-06-14 14:58:27 +02:00
Willy Kloucek
7bc96443f6 unify log and tracing descriptions 2022-06-14 11:48:46 +02:00
Willy Kloucek
61e89ea48f fix tracing collecotr and endpoint descriptions 2022-06-14 10:57:36 +02:00
Willy Kloucek
751b90f332 add more config option documentation 2022-06-13 15:45:24 +02:00
Michael Barz
f6e2f46ebb Exit when encountering config parsing errors 2022-05-09 11:49:15 +02:00
Michael Barz
20e687f094 fix naming in error message 2022-05-04 17:36:43 +02:00
Michael Barz
4b71cd40af Merge pull request #3678 from owncloud/v2
Update ocis packages and imports to V2
2022-05-04 16:36:01 +02:00
kobergj
eb59d2291e MachineAuthAPIKey -> SystemUserAPIKey (#3672)
* split machineauthapikey and systemuserapikey

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* changelog

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* specific errors and some reverts

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* use correct machine auth api key

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Co-authored-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-05-04 15:48:02 +02:00
Michael Barz
189987bcbd Bump major version to v2 2022-05-04 14:49:59 +02:00
Ralf Haferkamp
d6bf26c744 Rename ADMIN_USER_ID env var to OCIS_ADMIN_USER_ID
Also let the top-level ocis config validator error out if admin_user_id
is unset at start.
2022-05-04 12:42:28 +02:00
Ralf Haferkamp
7ef205d232 Get rid of hardcoded admin user uuid
The UUID is generated by `ocs init` now and stored in the config file.
To avoid that every ocis install uses the same UUID

Closes: #3524
2022-05-04 12:42:28 +02:00
kobergj
5346299e6d MetadataUserID -> SystemUserID (#3671)
* replace MetadataUserID with SystemUserID

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* the missing change

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* changelog

Signed-off-by: jkoberg <jkoberg@owncloud.com>
2022-05-04 11:41:37 +02:00
Jörn Friedrich Dreyer
f88c000bac generate metadata user id
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-05-02 12:36:30 +00:00
Christian Richter
59c96413d9 beautify error messages
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-29 13:45:12 +02:00
Willy Kloucek
4ff313b0a5 check for more secrets need to be set 2022-04-29 13:07:25 +02:00
Christian Richter
bc6cd9141d [WIP] add missing secret checks
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-29 11:55:56 +02:00
Christian Richter
72688b3650 move generic secret errors to shared, fix edgecase in cli flags
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-29 11:15:13 +02:00
Willy Kloucek
9095b11d6c load reva gateway and token manager from common config 2022-04-27 13:58:59 +02:00
Christian Richter
58a24e620e Move reva transfer secret to shared.Commons
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-26 14:10:03 +02:00
Christian Richter
a4d7696232 Move machine-auth-api-key to shared.Commons
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-26 10:20:15 +02:00
Christian Richter
acf75afebc Move Tokenmanager to shared.Commons
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-25 16:35:10 +02:00
Christian Richter
42a4e017c8 Add reference implementation for health & readiness endpoint in IDP
Signed-off-by: Christian Richter <crichter@owncloud.com>
2022-04-11 16:09:09 +02:00
Willy Kloucek
1232f26fe4 use yaml tag instead of ocisConfig #2 2022-03-29 15:06:58 +02:00
Willy Kloucek
fe1672a000 migrate ocis-pkg to envdecode 2022-01-03 07:49:25 +01:00
Willy Kloucek
7abcf96ea8 revert storage, remove tracing.service and bring back common 2022-01-03 07:49:24 +01:00
A.Unger
aa67106e04 sane common configurations 2021-11-11 12:51:57 +01:00
A.Unger
0e9b6d8c52 fix log inheritance 2021-11-08 11:35:41 +01:00
A.Unger
6f27c1a100 refactor env unbinding to ocis-pkg 2021-11-07 20:52:36 +01:00