Commit Graph

94 Commits

Author SHA1 Message Date
mmattel
d7b447b791 [docs-only] Increase readability for tracing values in the description 2023-07-07 09:50:39 +02:00
Daniel Swärd
571d2318c0 Add missing span kind for tracing. (#6471)
* Add missing span kind for tracing.

* Add missing spanKind for tracing.
2023-06-22 10:09:10 +02:00
mmattel
758192bd6d [docs-only] Fix some envvar descriptions 2023-06-09 13:03:17 +02:00
Willy Kloucek
733e5efdda Merge pull request #6444 from owncloud/remove-references-to-oc.ios-protocol
remove references to oc.ios://ios.owncloud.com since it is no longer used
2023-06-05 15:28:03 +02:00
Willy Kloucek
0f3dddafab remove references to oc.ios://ios.owncloud.com since it is no longer used 2023-06-05 13:57:05 +02:00
jkoberg
d347448ec0 remove duplicated sutureservice code
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-06-02 12:02:27 +02:00
Ralf Haferkamp
7a4bc71e65 Revert "idp/proxy: Match users by ID instead of name by default"
This reverts commit 52951b42b0.

The change broke authentication for at least the desktop client when
using the builtin idp. There seem to be issues in the IDP (lico) which
result in the implicit scoped not being added correctly in some case.
When that scope is missing the `lg.uuid` claim will not be present in
the userinfo and we can correctly match users by id.

This reverts back to the old behaviour of matching users by name. Which
also brings some aspects of https://github.com/owncloud/ocis/issues/904

Fixes #6415
2023-06-01 11:13:47 +02:00
Sawjan Gurung
14de04cb52 update idp pnpm-lock file (#6385) 2023-05-25 12:30:04 +05:45
Ralf Haferkamp
52951b42b0 idp/proxy: Match users by ID instead of name by default
Reconfigure the oidc clients for lico, so that lico adds the "lg.uuid" to
tokens and userinfo by default. That claim will contain the userid. So
we can now use the userid for matching users when using the default
idm/idp configuration. This fixes further problems so that users being
recreated with the same name are correctly treated as differnt users.

Fixes: #904
2023-05-23 09:48:47 +02:00
Ralf Haferkamp
2baf86900d idp: Use the UUID attribute for computing the "sub" claim
This avoids that recreating the user with the same name will create the
same "sub" claim. Even though it gets a new UUID

Fixes: #904
2023-05-16 17:25:55 +02:00
mmattel
67b7b6bad5 [docs-only] Fix IDP envvar description 2023-05-04 08:39:32 +02:00
Martin
33e712f0ff Update services/idp/README.md
Co-authored-by: Benedikt Kulmann <benedikt@kulmann.biz>
2023-04-27 16:40:08 +02:00
mmattel
ea9e2e479d [docs-only] Fix idp readme.md 2023-04-27 16:33:08 +02:00
mmattel
4b7722a32b [docs-only] Update IDP README.md 2023-04-27 15:36:46 +02:00
mmattel
8ed34926ef [docs-only] Correct the removal version according semver to 4.0.0 2023-04-19 10:16:06 +02:00
mmattel
b2504035e0 fix readme service names 2023-04-12 18:40:41 +02:00
Martin
a5e99d39b1 Update IDM config.go
Fixes: 5906

After clarification and renaming th envvar and post a discussion with @rhafer, we should align the yaml name to the envvar name. Note that the backend name (`Insecure`) is not changed.
* In the deployment examples, we use ennvars and no yaml
* ocis init does not use it
2023-04-06 11:58:09 +02:00
Daniel Swärd
afbfd2d6b2 Deprecating and renaming many environment variables
Fixes #5767
Fixes #5905
Fixes #5532
2023-04-05 11:05:48 +02:00
mmattel
949e5c228f [docs-only] Rename / Deprecate userlog and eventhistory envvars 2023-04-04 11:07:31 +02:00
Daniel Swärd
f09d3c5a19 idp: Change name of environment variable to be more consistent. 2023-04-04 09:24:14 +02:00
Dominik Schmidt
cb39839641 idp: fix pnpm build for Node >= 17 and remove obsolete targets 2023-04-03 12:01:59 +02:00
Benedikt Kulmann
ca05862279 Delete .DS_Store 2023-03-31 11:18:53 +02:00
Dennis Sieben
e28603e633 - fixed typos 2023-03-27 08:54:51 +02:00
mmattel
d25102c11e update 2023-03-22 17:02:34 +01:00
mmattel
777c302bc9 [docs-only] Clarify the description of the TLS_IDP envvar 2023-03-22 16:53:14 +01:00
dependabot[bot]
e7fd4f93f4 Bump i18next from 21.10.0 to 22.0.4 in /services/idp (#4941)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Florian Schade <f.schade@icloud.com>
Co-authored-by: mmattel <github@diemattels.at>
2023-03-21 10:03:59 +01:00
Jörn Friedrich Dreyer
971dbe8682 bump lico to 0.59.4 (#5768)
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-03-08 17:25:55 +01:00
David Christofas
7750492de4 Merge pull request #5721 from owncloud/clean-up-code
reduce duplication in configuration code
2023-03-07 10:58:33 +01:00
Benedikt Kulmann
e0d974dda9 chore: update pnpm lock file 2023-03-07 10:10:43 +01:00
dependabot[bot]
58f5845f2a Bump react-redux from 7.2.9 to 8.0.5 in /services/idp
Bumps [react-redux](https://github.com/reduxjs/react-redux) from 7.2.9 to 8.0.5.
- [Release notes](https://github.com/reduxjs/react-redux/releases)
- [Changelog](https://github.com/reduxjs/react-redux/blob/master/CHANGELOG.md)
- [Commits](https://github.com/reduxjs/react-redux/compare/v7.2.9...v8.0.5)

---
updated-dependencies:
- dependency-name: react-redux
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
2023-03-07 10:10:43 +01:00
David Christofas
924c2ca346 add missing comments 2023-03-06 19:01:16 +01:00
David Christofas
63fa35fa50 reduce duplication in configuration code 2023-03-06 16:52:44 +01:00
Ralf Haferkamp
9e73b17a40 idp: Utilize ownCloudUserEnabled Attribute to filter users
This adds support for configuring an LDAP Attribute that can be used as a flag
to disallow users to login. We currently default to 'ownCloudUserEnabled' as
used in the default configuration of the graph service.
2023-02-22 11:23:26 +01:00
Martin
3e39e49a73 Update services/idp/README.md 2023-02-22 11:13:25 +01:00
Martin
9c7bc86902 Update services/idp/README.md 2023-02-22 11:13:25 +01:00
Martin
d30d042ec1 Update services/idp/README.md 2023-02-22 11:13:25 +01:00
Ralf Haferkamp
5dd374eb7a Add README for idp service 2023-02-22 11:13:25 +01:00
mmattel
210cd54817 fix some envvar descriptions 2023-02-03 09:40:35 +01:00
Jörn Friedrich Dreyer
32cc9beb0b walk and log chi routes, ocs cleanup (#5428)
* walk and log chi routes, ocs cleanup

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* make linter happy

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-01-23 12:30:34 +01:00
David Christofas
efe1fc52e0 fix nilerr bugs 2022-12-21 14:45:50 +01:00
Jörn Friedrich Dreyer
53d15d329e remove deprecated use of ioutil (#5205)
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-12-08 14:44:53 +01:00
Willy Kloucek
d3a17bd4be add nodejs dependencies to license tarball 2022-11-25 09:35:57 +01:00
mmattel
3cad3fbf2d env descriptions that needed a fix 2022-11-24 09:56:52 +01:00
Ralf Haferkamp
ee54a4c30c Update/align a few TLS variable description
Fixes: 5073
2022-11-23 13:07:29 +01:00
Willy Kloucek
45de2c6645 lower default access / id / refresh token lifespans 2022-11-18 15:02:02 +01:00
Ralf Haferkamp
b24d126b30 Introduce TLS Settings for go-micro based http services
TLS for the services can be configure by setting the "OCIS_HTTP_TLS_ENABLED",
"OCIS_HTTP_TLS_CERTIFICATE" and "OCIS_HTTP_TLS_KEY" environment variables.
Currently the ocis proxy is this only service that directly accesses backend
services. It determines whether to use TLS or not by looking a the new registry
metadata "use_tls". As specific CA Cert for certificate verification
can be set with the "PROXY_HTTPS_CACERT" environment variable.
2022-11-03 11:58:53 +01:00
Ralf Haferkamp
ee974afebf [full-ci] Introduce TLS Settings for go-micro based grpc services and clients (#4901)
* Introduce TLS Settings for go-micro based grpc services and clients

TLS for the services can be configure by setting the OCIS_MICRO_GRPC_TLS_ENABLED"
"OCIS_MICRO_GRPC_TLS_CERTIFICATE" and "OCIS_MICRO_GRPC_TLS_KEY"
enviroment variables.

TLS for the clients can configured by setting the "OCIS_MICRO_GRPC_CLIENT_TLS_MODE"
and "OCIS_MICRO_GRPC_CLIENT_TLS_CACERT" variables.

By default TLS is disabled.

Co-authored-by: Martin <github@diemattels.at>

* Unify TLS configuration for all grpc services

All grpc service (whether they're based on reva) or go-micro use the
same set of config vars now.

TLS for the services can be configure by setting the OCIS_GRPC_TLS_ENABLED,
OCIS_GRPC_TLS_CERTIFICATE and OCIS_GRPC_TLS_KEY enviroment variables.

TLS for the clients can configured by setting the OCIS_GRPC_CLIENT_TLS_MODE
and OCIS_MICRO_GRPC_CLIENT_TLS_CACERT variables.

There are no individual per service config vars currently. If really
needed, per service tls configurations can be specified via config file.

Co-authored-by: Martin <github@diemattels.at>

Co-authored-by: Martin <github@diemattels.at>
2022-11-03 10:17:08 +01:00
Benedikt Kulmann
2b27b0c8bf Merge pull request #4892 from owncloud/pnpm-2
[full-ci] Build idp and settings frontends with pnpm
2022-10-27 10:35:12 +02:00
Benedikt Kulmann
b3225a0dc9 fix: clear loading state if consent or logon received 2022-10-25 14:53:00 +02:00
Ralf Haferkamp
3d57f5cc21 Introduce TLS Settings for all reva grpc services and clients 2022-10-25 11:50:08 +02:00