Commit Graph

569 Commits

Author SHA1 Message Date
Michael Barz
95460ab9a5 prepare changelog, bump version 2023-08-02 12:49:51 +02:00
Daniel Swärd
6a5e21eff4 Replacing implicit grpc client initialization with explicit package local variables. 2023-07-31 12:57:59 +02:00
Daniel Swärd
44d9c50f1e Merge pull request #6907 from owncloud/excds/feature/Separate_out_grpc_client_to_package_local_for_thumbnails_service
Separate out grpc client to package local for thumbnails service.
2023-07-28 09:39:36 +02:00
Daniel Swärd
d21b03b14c Separate out grpc client to package local for thumbnails service. 2023-07-27 12:22:28 +02:00
Daniël Franke
22f5a76829 Add default config to service.
Also modify `GetServiceTraceProvider` to keep working if nil or nil
interface is passed.
2023-07-27 11:25:32 +02:00
Daniël Franke
c76b2e75ef Add another NewNoopTracerProvider 2023-07-26 12:17:30 +02:00
Daniël Franke
162b04f873 Add dummy provider if none is set 2023-07-26 12:17:26 +02:00
kobergj
d8bbe7eeaf Merge pull request #6881 from kobergj/UsePutForNats
Use PUT registry for nats
2023-07-26 12:00:37 +02:00
Daniel Swärd
3c02f3b355 Merge pull request #6856 from owncloud/ainmosni/tracing/idp
Convert IDP service to service trace provider.
2023-07-26 11:18:18 +02:00
jkoberg
c942c7a6dd use "put" registry for nats
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-07-25 11:21:32 +02:00
kobergj
31226e2134 improve documentation
Co-authored-by: Martin <github@diemattels.at>
2023-07-25 11:08:04 +02:00
jkoberg
89785d0976 configurable max message size
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-07-25 11:08:01 +02:00
Daniël Franke
d2d0461375 Convert IDP service to service trace provider.
This converts the IDP service to use the service trace provider.
2023-07-20 13:36:08 +02:00
Michael Barz
d807af752e bump version, prepare changelog 2023-07-18 11:56:32 +02:00
mmattel
f55d4a8e37 Fix envvar descriptions in shared_types.go 2023-07-17 10:45:26 +02:00
Daniël Franke
96557a95ae Add tracing to settings service.
This adds tracing to the settings service. It uses the otelchi package
and passes the tracing provider to the grpc and http servers.
2023-06-27 12:31:19 +02:00
Daniël Franke
8f7521eff7 Move away from global tracers. (#6591)
* Move away from global tracers.

This PR moves away from global tracers and instead initialises
a tracer provider at Service setup and passes it where it needs to be.

* Change tracing provider to be set via options.

Also change name for GetServiceTraceProvider.

* Add changelog.
2023-06-23 14:20:26 +02:00
Michael Barz
d8b937a362 bump version 2023-06-19 10:55:19 +02:00
Michael Barz
8d0e4bf64b Bump version 2023-06-08 22:17:00 +02:00
Florian Schade
4f26424db6 [full-ci] enhancement: use reva client pool selectors (#6452)
* enhancement: use reva client pool selectors

register mock service to registry and pass tests

* enhancement: bump reva

* Fix a couple of linter issues

---------

Co-authored-by: Ralf Haferkamp <rhaferkamp@owncloud.com>
2023-06-08 12:41:04 +02:00
Michael Barz
91d159c56f prepare changelog, bump version 2023-06-06 22:35:39 +02:00
Michael Barz
67294e2c83 prepare changelog, bump version 2023-06-06 15:12:18 +02:00
Jörn Friedrich Dreyer
632b206675 trace proxie middlewares (#6313)
* trace proxie middlewares

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* Update ocis-pkg/service/grpc/client.go

Co-authored-by: Christian Richter <1058116+dragonchaser@users.noreply.github.com>

* default tls is off

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

---------

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
Co-authored-by: Christian Richter <1058116+dragonchaser@users.noreply.github.com>
2023-05-27 10:18:24 +02:00
Jörn Friedrich Dreyer
b8bdd4573a introduce otlp tracing (#5132)
* introduce otel tracing

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* use new trace provider initialization

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* work

* bump reva

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* remove commented code

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* add vendor changes

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

---------

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-05-26 22:21:03 +02:00
Michael Barz
46696bffeb prepare changelog, bump version 2023-05-22 14:33:15 +02:00
Phil Davis
f19830e919 Reword 'allows to' sentences 2023-05-18 09:46:25 +05:45
Michael Barz
aed04c983f bump version, prepare changelog 2023-05-08 17:28:42 +02:00
Michael Barz
7615c1546e Bump version, prepare changelog 2023-05-03 22:38:04 +02:00
jkoberg
7e055e782f fix newline handling for markdown creation
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2023-04-28 15:02:50 +02:00
Christian Richter
b1015b3d2c fix wrong compile date (#6132)
* fix  wrong compile date

Signed-off-by: Christian Richter <crichter@owncloud.com>

* add changelog

Signed-off-by: Christian Richter <crichter@owncloud.com>

---------

Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-27 12:36:43 +02:00
Ralf Haferkamp
b7990875c1 oidc: Remove "aud" claim validation of logout tokens (#6156)
The "aud" claim of the logout token is supposed to contain the client-id
of the client for which the token was issued. Our current implementation of
validating that claim is somewhat broken. We only allow to configure a single
value for the allowed client id. But we have different client-ids
accessing oCIS.

This completely removes the current validation of the `aud` claim until
we come up with a working solution. As we currently require a session id
to be present in the logout token the risk not validating the `aud`
claim is pretty low.

Related: #6149
2023-04-27 10:34:09 +02:00
Michael Barz
549cd92d97 prepare changelog, bump version 2023-04-24 15:39:36 +02:00
Andre Duffeck
77bb3d8bcd [full-ci] Refactor stores (#6019)
* Streamline the store implementation with and into reva

* Adapt to the cache/store refactoring in reva

* Streamline config options and their env vars

* Apply suggestions from code review

Co-authored-by: Martin <github@diemattels.at>

* Use the same database for all stores

* Bump reva

* Configure stat and filemetadata cache separately

* Fix default config

---------

Co-authored-by: Martin <github@diemattels.at>
2023-04-24 15:13:35 +02:00
Christian Richter
4a347e8c13 Fix nil pointer exception in webfinger
Co-authoredjby: Jörn Dreyer <jdreyer@owncloud.com>
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-21 16:16:26 +02:00
Ralf Haferkamp
70a80125c3 Fix backchannel logout
Use access token to lookup session id. The userinfo endpoint does
not return the session id. Also add some debug logging.

Co-authored-by: Christian Richter <crichter@owncloud.com>
Co-authored-by: Michael Barz <mbarz@owncloud.com>
2023-04-20 18:04:52 +02:00
Christian Richter
ed59d25464 Merge pull request #6007 from dragonchaser/backchannellogout
[full-ci] Implement backchannel logout
2023-04-20 13:23:23 +02:00
Christian Richter
a6ced1f99f Simplifiy Unmarshall function for stringAsBool struct
Co-authored-by: Julian Koberg <jkoberg@owncloud.com>
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-20 11:45:13 +02:00
Christian Richter
30bcf32062 incorporate requested changes
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-20 09:00:58 +02:00
Michael Barz
8b8859950f Merge pull request #6067 from owncloud/ainmosni/feature/search-keycloak-by-username
Search users by username instead of by email
2023-04-19 22:00:30 +02:00
Christian Richter
e88a0d7bc3 add tests for oidc backchannel logout
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-19 17:32:49 +02:00
Christian Richter
15691ae78a fix contexts, render result
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
d2d7c49df4 properly parse logout request
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
a98a880e7d move code, delete duplicate lines
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
dc399a61ac implement backchannel logout, reuse useringo cache
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
bc15b8a396 work on logout
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
b608d0b0f9 move verify access token code to oidc client
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
469534b321 small cleanup
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
58dce9bed8 use our oidc client
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-04-19 17:32:25 +02:00
Jörn Friedrich Dreyer
014308ddc9 introduce oidc client, based on coreos go-oidc
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2023-04-19 17:32:25 +02:00
Christian Richter
a3640b0565 extract full claims from jwt token to get session id
Signed-off-by: Christian Richter <crichter@owncloud.com>
2023-04-19 17:32:23 +02:00