Commit Graph

532 Commits

Author SHA1 Message Date
Michael Barz e2c7b3f7f8 Merge pull request #5065 from rhafer/issue/5045
Allow initial self-assignemnt of UserRole
2022-11-21 12:11:34 +01:00
Dominik Schmidt 59c19b825a web: embed all files from assets folder.
Recent web assets include an underscore prefixed file that is not packaged without all:.
2022-11-21 11:37:10 +01:00
Willy Kloucek 5d91dea414 adjust cache related configuration options 2022-11-21 09:56:22 +01:00
Benedikt Kulmann a32be07844 chore: update web to v6.0.0-rc.7 2022-11-21 09:19:16 +01:00
Willy Kloucek 45de2c6645 lower default access / id / refresh token lifespans 2022-11-18 15:02:02 +01:00
Michael Barz d1ff976aad improve the code style 2022-11-17 16:27:13 +01:00
Ralf Haferkamp 07a78287a7 Allow initial self-assignemnt of UserRole
When using an external user management we need to allow users to self-assign
the default role. This adds an explicit check for that to the settings service.
This also means we no longer need to fiddle with the account id in the proxy
upon first login.

Fixes: #5045
2022-11-16 16:23:32 +01:00
Michael Barz 94c212e331 use interface from graph pkg 2022-11-16 16:19:53 +01:00
Michael Barz fd562b36b5 refactor permissions service to make creating drives testable 2022-11-16 15:19:22 +01:00
Michael Barz d9fa7455b6 add more unit tests for the drives operations 2022-11-16 15:19:22 +01:00
Andre Duffeck 60b979d1d4 Find spaces (#5044)
* Use the node name for the name field in the index instead of the path

* Add changelog

* Fix tests

* Adapt expected failures
2022-11-15 16:52:55 +01:00
Jörn Friedrich Dreyer 7443a9a225 Make permission and role ids unique (#5051)
* make permission ids unique

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* deduplicate roleids after listing permissions

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-15 16:51:49 +01:00
Ralf Haferkamp 4971330477 Remove no longer needed bootstrap code (#5057)
This we moved the settings service to the metadata storage with its
own gateway and permissions service, we no longer need the hardcoded
initial replies in order to bootstrap the role assignments.

This fixes a panic in the settings service when the first request to
the service is a read request on anything else but an existing role or
assignment.
2022-11-15 16:51:10 +01:00
Willy Kloucek d74b879d4f update tooling (#5038)
* update tooling

* update nodejs version
2022-11-11 15:01:45 +01:00
Andre Duffeck a0762e248e Filter hidden files (#5018)
* Filter hidden files from search results

* Add changelog

* Do not filter hidden files by default

* Set the hidden fields when converting fields to an entity

* Fix test
2022-11-10 17:05:43 +01:00
Martin 321004d62f Merge pull request #4998 from wkloucek/fix-notifications-ocis-url
add NOTIFICATIONS_WEB_UI_URL
2022-11-08 15:24:13 +01:00
Andre Duffeck 925790d64b Dont reindex twice (#5001)
* Only reindex a space once at a time

* Add changelog
2022-11-08 15:20:38 +01:00
Willy Kloucek 61be11a651 improve description 2022-11-08 13:41:57 +01:00
Willy Kloucek 4db9d060b7 add NOTIFICATIONS_WEB_UI_URL 2022-11-07 15:46:29 +01:00
Benedikt Kulmann 317f230280 chore: update web assets to v6.0.0-rc.6 2022-11-04 15:58:13 +01:00
Benedikt Kulmann 572bcc20a7 chore: update web assets to v6.0.0-rc.5 2022-11-04 15:58:12 +01:00
Jörn Friedrich Dreyer a542aad999 [docs-only] add auth bearer readme (#4982)
* add auth bearer readme

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* Apply suggestions from code review

Co-authored-by: Christian Richter <1058116+dragonchaser@users.noreply.github.com>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
Co-authored-by: Christian Richter <1058116+dragonchaser@users.noreply.github.com>
2022-11-04 15:05:32 +01:00
Martin 226f39a445 Merge pull request #4981 from owncloud/auth_basic_readme_fix_env_var_rename
[docs-only] Auth basic readme fix env var rename
2022-11-04 13:19:36 +01:00
Michael Barz 6c2a1999c4 add requestID middleware (#4974)
* add requestID middleware

* Update services/ocdav/pkg/config/config.go

* remove unnecessary config structs

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
Co-authored-by: Jörn Friedrich Dreyer <jfd@owncloud.com>
Co-authored-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-04 13:01:18 +01:00
Jörn Friedrich Dreyer 791c2e2494 fix docs
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-04 11:51:21 +00:00
Jörn Friedrich Dreyer 6bb2f74690 auth basic readme fix env var rename
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-04 11:21:38 +00:00
Jörn Friedrich Dreyer d4643bf98c fix typo
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-03 17:18:16 +01:00
Jörn Friedrich Dreyer b559466703 document default preferred sha1 checksum
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-03 17:18:16 +01:00
Jörn Friedrich Dreyer 13dbbd8440 fix env var name
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-03 17:18:16 +01:00
mmattel d8de307fda fix checksum type descriptions 2022-11-03 17:18:16 +01:00
mmattel a23eaf9395 Improve frontend env descriptions 2022-11-03 17:18:16 +01:00
Martin 1f53ec5253 Improve Auth Basic service descriptions (#4971) 2022-11-03 17:00:34 +01:00
Jörn Friedrich Dreyer 0f7dba53fb use min tls 1.2 (#4969)
* use min tls 1.2

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* add changelog

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>

Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-03 16:08:56 +01:00
Michael Barz 353240ed7c Merge pull request #4599 from owncloud/privatelink-capability
enable private links
2022-11-03 15:58:09 +01:00
jkoberg 2443d7d687 use private link syntax for spaceinvite link
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2022-11-03 15:18:03 +01:00
kobergj d55d132f26 Merge pull request #4966 from kobergj/ReadmeForAuthBasic
Improve AuthBasic Readme
2022-11-03 15:15:49 +01:00
kobergj 69c60135e4 Merge pull request #4965 from kobergj/MaxAcuireLockCycles
Max AcquireLock Cycles and Bump Reva
2022-11-03 15:11:18 +01:00
jkoberg c2cc1e105c improve auth-basic docu and rename envvar
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2022-11-03 14:40:21 +01:00
jkoberg 12c7308fdf update envvar description
Signed-off-by: jkoberg <jkoberg@owncloud.com>
2022-11-03 14:27:54 +01:00
kobergj 92d3f77ab8 Readme for Auth-Basic (#4919)
* readme for the auth-basic service

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* Apply suggestions from code review

* Apply suggestions from code review

Co-authored-by: Jörn Friedrich Dreyer <jfd@butonic.de>

* Update services/auth-basic/README.md

Co-authored-by: Martin <github@diemattels.at>

Signed-off-by: jkoberg <jkoberg@owncloud.com>
Co-authored-by: Martin <github@diemattels.at>
Co-authored-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2022-11-03 14:24:22 +01:00
Florian Schade 51376b584b add option to configure max_acquire_lock_cycles 2022-11-03 14:22:46 +01:00
Michael Barz 8371de7056 Merge pull request #4964 from aduffeck/rescan-less-aggressively
Reindex less aggressively
2022-11-03 14:11:53 +01:00
David Christofas 3125459415 [full-ci]fallback to stored roles (#4890)
* fallback to stored roles

If there are no roles in the current context load the user's roles from the storage.

* some code clean up
2022-11-03 13:25:21 +01:00
André Duffeck cfb4f45f8d Fix indentation 2022-11-03 13:22:44 +01:00
André Duffeck 12bdf29ac4 Change the default reindex debounce duration to 1s.
Also make it configurable using an env var.
2022-11-03 13:15:54 +01:00
Martin 5602668634 Add the missing auth providers to AUTH_BASIC_AUTH_PROVIDER description (#4923)
* Add the missing auth providers to AUTH_BASIC_AUTH_PROVIDER description

* fix strings on more locations

* WOPIDriver

* Apply suggestions from code review

* Update services/users/pkg/config/config.go
2022-11-03 12:31:57 +01:00
Ralf Haferkamp b24d126b30 Introduce TLS Settings for go-micro based http services
TLS for the services can be configure by setting the "OCIS_HTTP_TLS_ENABLED",
"OCIS_HTTP_TLS_CERTIFICATE" and "OCIS_HTTP_TLS_KEY" environment variables.
Currently the ocis proxy is this only service that directly accesses backend
services. It determines whether to use TLS or not by looking a the new registry
metadata "use_tls". As specific CA Cert for certificate verification
can be set with the "PROXY_HTTPS_CACERT" environment variable.
2022-11-03 11:58:53 +01:00
Ralf Haferkamp a4f5682851 Switch proxy defaults to use go-micro registry everywhere
This makes the default configuration somewhat easier. There doesn't
seem to be a specific reason why some services were still using a
static backend configuration.
2022-11-03 11:58:53 +01:00
kobergj a5bccc2807 Validate Space Names (#4955)
* validate space names

Signed-off-by: jkoberg <jkoberg@owncloud.com>

* Update services/graph/pkg/service/v0/drives.go

Co-authored-by: Michael Barz <michael.barz@zeitgestalten.eu>

Signed-off-by: jkoberg <jkoberg@owncloud.com>
Co-authored-by: Michael Barz <michael.barz@zeitgestalten.eu>
2022-11-03 11:39:02 +01:00
Ralf Haferkamp ee974afebf [full-ci] Introduce TLS Settings for go-micro based grpc services and clients (#4901)
* Introduce TLS Settings for go-micro based grpc services and clients

TLS for the services can be configure by setting the OCIS_MICRO_GRPC_TLS_ENABLED"
"OCIS_MICRO_GRPC_TLS_CERTIFICATE" and "OCIS_MICRO_GRPC_TLS_KEY"
enviroment variables.

TLS for the clients can configured by setting the "OCIS_MICRO_GRPC_CLIENT_TLS_MODE"
and "OCIS_MICRO_GRPC_CLIENT_TLS_CACERT" variables.

By default TLS is disabled.

Co-authored-by: Martin <github@diemattels.at>

* Unify TLS configuration for all grpc services

All grpc service (whether they're based on reva) or go-micro use the
same set of config vars now.

TLS for the services can be configure by setting the OCIS_GRPC_TLS_ENABLED,
OCIS_GRPC_TLS_CERTIFICATE and OCIS_GRPC_TLS_KEY enviroment variables.

TLS for the clients can configured by setting the OCIS_GRPC_CLIENT_TLS_MODE
and OCIS_MICRO_GRPC_CLIENT_TLS_CACERT variables.

There are no individual per service config vars currently. If really
needed, per service tls configurations can be specified via config file.

Co-authored-by: Martin <github@diemattels.at>

Co-authored-by: Martin <github@diemattels.at>
2022-11-03 10:17:08 +01:00